<?xml version='1.0' encoding='UTF-8'?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>0963706f270d4f1eb3b4ad5c1c75457d</id>
  <title>www.filescan.io feed</title>
  <updated>2026-04-13T04:37:17Z</updated>
  <author>
    <name>Filescan.io</name>
    <email>admin@filescan.io</email>
  </author>
  <link href="https://www.filescan.io"/>
  <generator>Filescan.io feed generator</generator>
  <logo>https://www.filescan.io/assets/logo.png</logo>
  <entry>
    <id>2cd5a0dbf86521333ee905521c3941ecd067b0fbd83f1d248a8d9b14a8bd82be</id>
    <title>Analysis Report for 2cd5a0dbf86521333ee905521c3941ecd067b0fbd83f1d248a8d9b14a8bd82be</title>
    <updated>2026-04-13T04:33:52Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc724280678438b878b005</_id>
        <file_type>text/html</file_type>
        <flow_id>69dc722e5ea31bc68a24be42</flow_id>
        <hash>2cd5a0dbf86521333ee905521c3941ecd067b0fbd83f1d248a8d9b14a8bd82be</hash>
        <iocs>
          <urls>
            <value>
              <url>https://www.cerdas.com/video/134598/mi-prima-me-entrega-su-apretado-culo&amp;ved=0CBYQjRxqGAoTCOC2vMX_6ZMDFQAAAAAdAAAAABCoAQ&amp;opi=89978449</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://www.google.com/url</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.google.com/url?sa=t&amp;source=web&amp;rct=j&amp;url=https%3A%2F%2Fwww.cerdas.com%2Fvideo%2F134598%2Fmi-prima-me-entrega-su-apretado-culo&amp;ved=0CBYQjRxqGAoTCOC2vMX_6ZMDFQAAAAAdAAAAABCoAQ&amp;opi=89978449</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://www.cerdas.com/video/134598/mi-prima-me-entrega-su-apretado-culo</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.google.com/favicon.ico</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.google.com/url</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.google.com/url?</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.google.com/url?sa=t&amp;source=web&amp;rct=j&amp;url=https%3A%2F%2Fwww.cerdas.com%2Fvideo%2F134598%2Fmi-prima-me-entrega-su-apretado-culo&amp;ved=0CBYQjRxqGAoTCOC2vMX_6ZMDFQAAAAAdAAAAABCoAQ&amp;opi=89978449</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.google.com/url?sa=t&amp;source=web&amp;rct=j&amp;url=https%3A%2F%2Fwww.cerdas.com%2Fvideo%2F134598%2Fmi-prima-me-entrega-su-apretado-culo&amp;ved=0CBYQjRxqGAoTCOC2vMX_6ZMDFQAAAAAdAAAAABCoAQ&amp;opi=89978449#</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.cerdas.com/video/134598/mi-prima-me-entrega-su-apretado-culo&amp;ved=0CBYQjRxqGAoTCOC2vMX_6ZMDFQAAAAAdAAAAABCoAQ&amp;opi=89978449</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.cerdas.com/video/134598/mi-prima-me-entrega-su-apretado-culo</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
          </urls>
          <domains>
            <value>
              <url>www.cerdas.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.google.com</url>
              <origin>URL_RENDER</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>142.251.157.119</ip>
              <origin>URL_RENDER</origin>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>46a7352fda434dba9f9e0302095256218ded19f9fc3e9d8563d8059a3c89ebcb</SHA-256>
              <SHA-1>50a8a8ee73c1c4ebd9b5bfd025a7e47362473ec4</SHA-1>
              <MD5>3bf8fb77e1a2bc2509a2df475402bdb4</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>application/xhtml+xml</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
        </iocs>
        <name>hxxps://www.google.com/url?sa=t&amp;source=web&amp;rct=j&amp;url=https%3A%2F%2Fwww.cerdas.com%2Fvideo%2F134598%2Fmi-prima-me-entrega-su-apretado-culo&amp;ved=0CBYQjRxqGAoTCOC2vMX_6ZMDFQAAAAAdAAAAABCoAQ&amp;opi=89978449</name>
        <report_id>3b7b6cc7-3700-4f85-a71e-1d7b0ca469dc</report_id>
        <tags>
          <value>html</value>
          <value>xml</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>cd39fa9de2981fda0cdec6a3e587187f2642656f064933d700cb87e7d0111638</id>
    <title>Analysis Report for cd39fa9de2981fda0cdec6a3e587187f2642656f064933d700cb87e7d0111638</title>
    <updated>2026-04-13T04:32:43Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc7226f9522792fdaf82fb</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc71e8d920e19044f93b7f</flow_id>
        <hash>cd39fa9de2981fda0cdec6a3e587187f2642656f064933d700cb87e7d0111638</hash>
        <iocs/>
        <name>HBL-NBV77830488.js</name>
        <report_id>9dae96e1-60a5-421a-b151-23f9952c00df</report_id>
        <tags>
          <value>javascript</value>
          <value>anti-vm</value>
          <value>base64</value>
          <value>encrypted</value>
          <value>obfuscated</value>
          <value>repaired</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>bb4442f5efdc1fea1ed75ba8b4356ddac5044355c93b1ace6c47367ae9ec6a99</id>
    <title>Analysis Report for bb4442f5efdc1fea1ed75ba8b4356ddac5044355c93b1ace6c47367ae9ec6a99</title>
    <updated>2026-04-13T04:32:09Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc71e180678438b878aff3</_id>
        <file_type>text/plain</file_type>
        <flow_id>69dc71c9d920e19044f93b5b</flow_id>
        <hash>bb4442f5efdc1fea1ed75ba8b4356ddac5044355c93b1ace6c47367ae9ec6a99</hash>
        <iocs>
          <files>
            <value>
              <SHA-256>0ad1cf3c494114efa5158905b00d40673fe67fca35dfc441b95db2903d78490d</SHA-256>
              <SHA-1>c029b9944a8780d87bfdcd28702f774f70c770dd</SHA-1>
              <MD5>84c1f3f708f441cee7e507c5aba7a5b0</MD5>
              <origin>BASE64_DECODED</origin>
              <file_type>application/zip</file_type>
            </value>
          </files>
          <btc_wallets>
            <value>
              <btc_wallet>4U8jS67WYfPisnB1n6yfHpvXa</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>PdTG9sEnfNrbrjr5E9ZpknaCWNfy</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>bWeoruVRc2z4m7G43effbVae</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>bbpK2vDxWd7WPU9cavFqEtuVTJy</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>cAXHwR49WLh796NEvf3DYoM746K</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>gSBszmfszxvFhV6FQksu9QGhuqYM</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>rXo8SGDdRHHPDsNb93MbUzmndkFsR23u</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>rgNVVviae42sRR3edqRLTbZ7bV3WxL</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>vKY5SuSzBw66Z5aFz9MXrmgp</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>yS43yzr4UjTGevkb2wqbGTi3</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
          </btc_wallets>
        </iocs>
        <name>a4w4X000000cmRQQAY_0684X00000VoCcJQAV.png</name>
        <report_id>7075ee42-1572-4db0-8b83-e7e2dd8d3255</report_id>
        <tags>
          <value>txt</value>
          <value>base64</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>acad9a2d0effb20ec450d2fca9329a39f81be52829737d2ee32bc4a056e209d8</id>
    <title>Analysis Report for acad9a2d0effb20ec450d2fca9329a39f81be52829737d2ee32bc4a056e209d8</title>
    <updated>2026-04-13T04:32:04Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc71d33040601e24ad6075</_id>
        <file_type>application/x-dosexec</file_type>
        <flow_id>69dc71c25ea31bc68a24bce9</flow_id>
        <hash>acad9a2d0effb20ec450d2fca9329a39f81be52829737d2ee32bc4a056e209d8</hash>
        <iocs>
          <ips>
            <value>
              <ip>1.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>063a47b083a92a0c8547a9adca78e89add421b9f73d8f86d959ba2e55be314a0</SHA-256>
              <SHA-1>bacfa110cd17c065399fa28c921a895445302210</SHA-1>
              <MD5>aa3877ce3ea864793430c734e4751e07</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>0af5f402d0b26ab544614614985a913bd0a36096daf85af7e29d4acc143ad7b2</SHA-256>
              <SHA-1>2725c61b5bcbb07270522c5c76337fd13ce7d1ec</SHA-1>
              <MD5>498745d88d7d011477735cf2c59d584d</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>3b0dd7091806660246737152034f23013958d726a6be9c32717428c15c1b5a3d</SHA-256>
              <SHA-1>1ee8416f43bf301b605ba53a40ec7ab4410a6cf1</SHA-1>
              <MD5>c04dc29281f096d213f55351642f9f37</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>3f921d65d0ba465f97f4d44efb8a13ebb76f8df0dde7d69b42f78a9e8318b239</SHA-256>
              <SHA-1>3318c5cac272603074afea437f074fd6cefcef6a</SHA-1>
              <MD5>3ecf6a0cb6b6734b55a5d50a5ec9526d</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload; format=pe32</file_type>
            </value>
            <value>
              <SHA-256>6f88bc7cb02ccb2dbc26b5f4ce53e355b331e31bb920b2ba8cbbcd1b5d4cd5a0</SHA-256>
              <SHA-1>dc9804dd3aa348fb0c05f53c53c698518af514a0</SHA-1>
              <MD5>9ce8c70178061cc4cf4a6bb1e291df93</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>b5fae454eae83931e8508b3c158b122f7100b65d70065e8af2aaeddb639a5c40</SHA-256>
              <SHA-1>f51d2ad16dc79373001160a2b5e7a2f861f60d5c</SHA-1>
              <MD5>0d62df6f0138e145185b2c1c45bf72bc</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f</SHA-256>
              <SHA-1>879dcf690e5bf1941b27cf13c8bcf72f8356c650</SHA-1>
              <MD5>a19a2658ba69030c6ac9d11fd7d7e3c1</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>c49db3fb9a74c55628b2cf900ca305ede59e01d6332a000d23d0b44be9be06bf</SHA-256>
              <SHA-1>bbe465451083ea2dba8ac4bdf7bcce1e38df3c8c</SHA-1>
              <MD5>ad4e7a7a96e8a94df215a45a172ce7cb</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
          </files>
          <uuids>
            <value>
              <uuid>3fe8fa79-5dce-4503-ab23-464ea24babff</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </registry>
        </iocs>
        <name>xacad9a2d0effb20ec450d2fca9329a39f81be52829737d2ee32bc4a056e209d8.exe</name>
        <report_id>25e8b590-32dd-4ec5-98de-5708a4d3e10a</report_id>
        <tags>
          <value>peexe</value>
          <value>xworm</value>
          <value>njrat</value>
          <value>unsafe</value>
          <value>virus</value>
          <value>anti-vm</value>
          <value>fingerprint</value>
          <value>obfuscated</value>
          <value>overlay</value>
          <value>base64</value>
          <value>reconnaissance</value>
          <value>anti-debug</value>
          <value>microsoft_visual_cc</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>6d0759189f87c2e5ad7347e03bcabbd3190eb23f1746d78d2efd98228f439da9</id>
    <title>Analysis Report for 6d0759189f87c2e5ad7347e03bcabbd3190eb23f1746d78d2efd98228f439da9</title>
    <updated>2026-04-13T04:31:27Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc71b880678438b878afeb</_id>
        <file_type>application/x-executable</file_type>
        <flow_id>69dc719ed920e19044f93b06</flow_id>
        <hash>6d0759189f87c2e5ad7347e03bcabbd3190eb23f1746d78d2efd98228f439da9</hash>
        <iocs>
          <ips>
            <value>
              <ip>45.128.119.160</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
        </iocs>
        <name>zyre.m68k.elf</name>
        <report_id>a8de28c8-0705-441a-bf3f-2f68f6fdb022</report_id>
        <tags>
          <value>elf</value>
          <value>gafgyt</value>
          <value>mirai</value>
          <value>masquerade</value>
          <value>gcc</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>ecb6ba7a1e8f39f25108d38b029d1c085e39460523524e9733a45ec2cc693b9a</id>
    <title>Analysis Report for ecb6ba7a1e8f39f25108d38b029d1c085e39460523524e9733a45ec2cc693b9a</title>
    <updated>2026-04-13T04:31:24Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc71bbf9522792fdaf82e7</_id>
        <file_type>application/java-archive</file_type>
        <flow_id>69dc718dd920e19044f93afc</flow_id>
        <hash>ecb6ba7a1e8f39f25108d38b029d1c085e39460523524e9733a45ec2cc693b9a</hash>
        <iocs>
          <uuids>
            <value>
              <uuid>a225e47e-63cf-4588-8519-2cfd90ac3127</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
          </uuids>
        </iocs>
        <name>DamageColour1.21.11-1.21.11.jar</name>
        <report_id>593f7926-f294-4003-bce0-418fe00ce642</report_id>
        <tags>
          <value>java</value>
          <value>anti-debug</value>
          <value>obfuscated</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>db9e20a723c83cd226c3f3af57d6cc218f9626edb4b8dde92aba1ecf34970cd3</id>
    <title>Analysis Report for db9e20a723c83cd226c3f3af57d6cc218f9626edb4b8dde92aba1ecf34970cd3</title>
    <updated>2026-04-13T04:31:09Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc71a63040601e24ad606b</_id>
        <file_type>application/java-archive</file_type>
        <flow_id>69dc718a5ea31bc68a24bc3a</flow_id>
        <hash>db9e20a723c83cd226c3f3af57d6cc218f9626edb4b8dde92aba1ecf34970cd3</hash>
        <iocs>
          <uuids>
            <value>
              <uuid>cc5b0b28-6707-4527-97c3-4ef1e9d43c1d</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
          </uuids>
        </iocs>
        <name>Motionblur.jar</name>
        <report_id>5cdb9513-1c6a-4b9b-bb62-9355fdfcce57</report_id>
        <tags>
          <value>java</value>
          <value>anti-debug</value>
          <value>obfuscated</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>aa156e5d47f58644cb8ee521c3bf09308f29b388b5e8949c2304389241a43b2a</id>
    <title>Analysis Report for aa156e5d47f58644cb8ee521c3bf09308f29b388b5e8949c2304389241a43b2a</title>
    <updated>2026-04-13T04:30:30Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc718080678438b878afe0</_id>
        <file_type>application/x-dosexec</file_type>
        <flow_id>69dc7163d920e19044f93aba</flow_id>
        <hash>aa156e5d47f58644cb8ee521c3bf09308f29b388b5e8949c2304389241a43b2a</hash>
        <iocs>
          <urls>
            <value>
              <url>http://schemas.microsoft.com/SMI/2016/WindowsSettings</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>schemas.microsoft.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>1.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>6.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>150.171.109.101</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>150.171.109.101</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>024b4a7568f96815a00ac4a23d03fe36c05bff4f51e9e422a3658b3859c375c9</SHA-256>
              <SHA-1>545bb0d75690375b69b1f13e072d19b8c34533f6</SHA-1>
              <MD5>bea00803c4ede8d2251c884844750262</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>08e8855a36fc1336d08c0e76ea927247454281c26affb384756aa203e38a1edb</SHA-256>
              <SHA-1>2a98391fb3beb82b1751024135fdaa1e058b8f9a</SHA-1>
              <MD5>3c358365777d042efc15836b428e2b7d</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>0af5f402d0b26ab544614614985a913bd0a36096daf85af7e29d4acc143ad7b2</SHA-256>
              <SHA-1>2725c61b5bcbb07270522c5c76337fd13ce7d1ec</SHA-1>
              <MD5>498745d88d7d011477735cf2c59d584d</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>1638535f3e508ffe19183efcd62236eb8be18a0d053c0fe9b9c28285ff327a60</SHA-256>
              <SHA-1>a7ef57ed58a95a24e460860df6169b0a9f3882ec</SHA-1>
              <MD5>405f5ca5aac592e0ba8a37cff739d41d</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>18b83eadaaf13479b6fb8f0f124aa387a6cba2f14f25d39a5eee330a923f82fd</SHA-256>
              <SHA-1>fb51705467eb3bf1154ac797fced04510e73cf35</SHA-1>
              <MD5>665e8f81b96f72fb2d27aa280764e59e</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/png</file_type>
            </value>
            <value>
              <SHA-256>308fe655352242f0ade0f0ffcfd3aafe6bc700c11f1b89fbc8c0f2f736f826c9</SHA-256>
              <SHA-1>5f11641d140ddedf42a80268a5b9572a8876088c</SHA-1>
              <MD5>4092e6a3b79bc32b6438af16cafd500f</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>3bc718ac8a3b1187d6af01e77671794c7abed19724026a1d6de2103419f49de7</SHA-256>
              <SHA-1>47f49ac1aeef1385adfae6954825d3b79ac4f66b</SHA-1>
              <MD5>796ed7d584657f06b6d84b9b07daa9f5</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/zlib</file_type>
            </value>
            <value>
              <SHA-256>3c831b686a09b6dab401a293345f428004b0a0aef48a3e2ad68f86d781eda111</SHA-256>
              <SHA-1>d5ba7fcf7d8cc5017612c8c000dc059ac3095711</SHA-1>
              <MD5>d0a8bcb99163c4ca4f3f2745d773b60c</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>3f921d65d0ba465f97f4d44efb8a13ebb76f8df0dde7d69b42f78a9e8318b239</SHA-256>
              <SHA-1>3318c5cac272603074afea437f074fd6cefcef6a</SHA-1>
              <MD5>3ecf6a0cb6b6734b55a5d50a5ec9526d</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload; format=pe32</file_type>
            </value>
            <value>
              <SHA-256>4064e30101f4d625e202d63e4d6d34470f7acf81ec4a7f7093d3bf53748b44e6</SHA-256>
              <SHA-1>00bec2999e7f6bbe928b69cefa5d5095cdc297b9</SHA-1>
              <MD5>2c822f2e5320e5986153788aaaa2243a</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>56f3ceef85009e84be861df143a0c0c302feb844a413db729b5f5d517b697fa8</SHA-256>
              <SHA-1>0cef6019f647f212d4a9a3087ea4a5b3ef49bee9</SHA-1>
              <MD5>206fa184cd62f15f5eb4789e12522a71</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>5d487a74756d85580bb33222695c3bc24dea6a4118c10fab0aeccc2ed25b61af</SHA-256>
              <SHA-1>4c01af085339e8c0b71833f84f832d1f07a0c5bf</SHA-1>
              <MD5>953c7b1dafcf4f6b3fe399c23d70ecd7</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>62b1624e8755456263e6e88bb90a7e69617c126da26570e75e44c76db93085ea</SHA-256>
              <SHA-1>19c5a396c51467b7bfe6ef012a376cbe8ff39dfe</SHA-1>
              <MD5>4ca45b28289339918721a7526bff63db</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>6408b8b4ebaa63790e77e5b658a6f9f257f27d77990eba24a44fca06217d0060</SHA-256>
              <SHA-1>7ddf1b731e4a501c173abdedafce7e8d3cc18d2a</SHA-1>
              <MD5>c1da9aaaad66e599490da5f74cd5a2c5</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>6f88bc7cb02ccb2dbc26b5f4ce53e355b331e31bb920b2ba8cbbcd1b5d4cd5a0</SHA-256>
              <SHA-1>dc9804dd3aa348fb0c05f53c53c698518af514a0</SHA-1>
              <MD5>9ce8c70178061cc4cf4a6bb1e291df93</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>7ddd375c36c62d0325cc42e25d9f58b8577c99e9de41ffc4acf56f2e8750e9c5</SHA-256>
              <SHA-1>efc03fb4b54fde274d59fc7472818e3a12b06a16</SHA-1>
              <MD5>f3aff9efb7b7032a93f50fa7b2832b2b</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>8cc5e9843ad0540777b852e290dbd45d210246de3cf18065b3a6edad28cc014a</SHA-256>
              <SHA-1>f758856f517604393d901e7faf25f17554e831a8</SHA-1>
              <MD5>032718c7f33597169d03714dac10547b</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>97dd0526360ab6bf93c28c78348db93f080163953851281e9f0158170cf78384</SHA-256>
              <SHA-1>5ac4ef5c57e3e5a13903620cc00976b4658a8339</SHA-1>
              <MD5>84fffc8a94860d93e1deb5a9fb50acb4</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>b2d37cc4f7a916d8d220c15ef638147d692377d9abf733be5c0c9a863e996381</SHA-256>
              <SHA-1>32c8d086f87700e1a3ee7f572869d78eacfd93d0</SHA-1>
              <MD5>551482bc8147de2351d05011bc66d94c</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>b5fae454eae83931e8508b3c158b122f7100b65d70065e8af2aaeddb639a5c40</SHA-256>
              <SHA-1>f51d2ad16dc79373001160a2b5e7a2f861f60d5c</SHA-1>
              <MD5>0d62df6f0138e145185b2c1c45bf72bc</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>bc7ffe541ff39591f1cf909961a82ae885416a2de21bd4bcf885bf69394b6ed0</SHA-256>
              <SHA-1>bbe6167b36c7bd12a0e8c895c824d60108c3775b</SHA-1>
              <MD5>48ab12c97a65390521375a40d4181f12</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f</SHA-256>
              <SHA-1>879dcf690e5bf1941b27cf13c8bcf72f8356c650</SHA-1>
              <MD5>a19a2658ba69030c6ac9d11fd7d7e3c1</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>c49db3fb9a74c55628b2cf900ca305ede59e01d6332a000d23d0b44be9be06bf</SHA-256>
              <SHA-1>bbe465451083ea2dba8ac4bdf7bcce1e38df3c8c</SHA-1>
              <MD5>ad4e7a7a96e8a94df215a45a172ce7cb</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>d2117afded4fbdf1a2d627d80a8cd0613cc9c126aee339b37ac1bfe75c734309</SHA-256>
              <SHA-1>cb02e01328547c5a50403288bfabd3e8e9fed53f</SHA-1>
              <MD5>b8b0928ac254441278247d78f556fd3c</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>d5c0715baedc141a2acae93e32d330833e2809650552e664fbcb2c116a5b8010</SHA-256>
              <SHA-1>b0235c805219d82258b07c9efc266bbe735a3ce1</SHA-1>
              <MD5>ba89c2b142cb274cb5d895697df69ed7</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>e493564b4f476dc30a96e660eb7e505ea5205e4c7f705cf43e76300e2d012a5c</SHA-256>
              <SHA-1>e33d324fdd1610fb71dd211d84b7e781539fdf48</SHA-1>
              <MD5>09bd7726af84de58b7153dad7690c09b</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>ee595a1794fee8500e0e3ac97a6cb147b3a942ca61f18b95ef9d811b284f9145</SHA-256>
              <SHA-1>5766b602f233889794b69c35153e9b9ec483ed6f</SHA-1>
              <MD5>6956e5831cfb8089d59b2c623ff07d0c</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>efd0d20d83f07c4ea271a93ed5476dac683686b51e1defb670382bd8c4aa7fcd</SHA-256>
              <SHA-1>3f9150eaae1d8ccb128af5587810b5248b842263</SHA-1>
              <MD5>cc0a8cd4ba293c7c10794ee9c92698f1</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>fd1365921bdd4e891ca4f92b6afbda791a42b37c63d7c734b0c9caf1692093cf</SHA-256>
              <SHA-1>7607ae83ffd60717fb13ff729128cd3f36c9046d</SHA-1>
              <MD5>d63aeb0dfc4e1a3e265ec48a2ca6d2ea</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
          </files>
          <uuids>
            <value>
              <uuid>1f676c76-80e1-4239-95bb-83d0f6d0da78</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>35138b9a-5d96-4fbd-8e2d-a2440225f93a</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>3fe8fa79-5dce-4503-ab23-464ea24babff</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>e2011457-1546-43c5-a5fe-008deee3d3f0</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
          </registry>
        </iocs>
        <name>xaa156e5d47f58644cb8ee521c3bf09308f29b388b5e8949c2304389241a43b2a.exe</name>
        <report_id>a1cc3c5b-8822-4f42-b058-424429c4b084</report_id>
        <tags>
          <value>peexe</value>
          <value>xworm</value>
          <value>njrat</value>
          <value>unsafe</value>
          <value>packed</value>
          <value>anti-vm</value>
          <value>fingerprint</value>
          <value>obfuscated</value>
          <value>overlay</value>
          <value>base64</value>
          <value>reconnaissance</value>
          <value>anti-debug</value>
          <value>expand</value>
          <value>lolbin</value>
          <value>microsoft_visual_cc</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>496efdbca2c49e19ac8bd25cea7a16ff9b51478ef156412362a9a448f3abf8e7</id>
    <title>Analysis Report for 496efdbca2c49e19ac8bd25cea7a16ff9b51478ef156412362a9a448f3abf8e7</title>
    <updated>2026-04-13T04:29:27Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc713080678438b878afd0</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc71255ea31bc68a24bb52</flow_id>
        <hash>496efdbca2c49e19ac8bd25cea7a16ff9b51478ef156412362a9a448f3abf8e7</hash>
        <iocs>
          <domains>
            <value>
              <url>7mcnx.in.net</url>
              <origin>MALWARE_CONFIG</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>104.21.57.5</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>104.21.57.5</ip>
              <origin>MALWARE_CONFIG</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>23202710be8c5fc9672495b0b62bebcf29a087cc7e07236f6bb155efb6e499ad</SHA-256>
              <SHA-1>a60ebbbcae868abd27fc96e22701fae48940e53c</SHA-1>
              <MD5>16ec11406456535d1de48d96513667e8</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>4ff1c75a93b2280dabe75acecade82d644388c9f4412565d846aeb396bfdc133</SHA-256>
              <SHA-1>6a55e1445c1c915664fba385828c5a0078fe460d</SHA-1>
              <MD5>f3d7095de1636559aa56ad81b25bbff9</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>text/xml</file_type>
            </value>
          </files>
          <uuids>
            <value>
              <uuid>1f676c76-80e1-4239-95bb-83d0f6d0da78</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>35138b9a-5d96-4fbd-8e2d-a2440225f93a</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>e2011457-1546-43c5-a5fe-008deee3d3f0</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
          <registry>
            <value>
              <registry>Software\</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
          </registry>
        </iocs>
        <name>mko1.exe</name>
        <report_id>720a0c29-0271-4fb5-ad10-358a39b9cad0</report_id>
        <tags>
          <value>peexe</value>
          <value>dotnet_pe</value>
          <value>asyncrat</value>
          <value>config-extracted</value>
          <value>reg</value>
          <value>fareit</value>
          <value>razy</value>
          <value>samas</value>
          <value>anti-vm</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>reconnaissance</value>
          <value>lolbin</value>
          <value>schtasks</value>
          <value>obfuscated</value>
          <value>vbnet</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>e8c98970a6dc2e3e9b00de7a3415300bba88e04aeb1bfd3d0dcf544e1f30e981</id>
    <title>Analysis Report for e8c98970a6dc2e3e9b00de7a3415300bba88e04aeb1bfd3d0dcf544e1f30e981</title>
    <updated>2026-04-13T04:29:11Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc712c80678438b878afcd</_id>
        <file_type>text/html</file_type>
        <flow_id>69dc7116799d5bf325fa7b16</flow_id>
        <hash>e8c98970a6dc2e3e9b00de7a3415300bba88e04aeb1bfd3d0dcf544e1f30e981</hash>
        <iocs>
          <urls>
            <value>
              <url>https://ak-s-cw.tripcdn.com/modules/ibu/node-microservice/wakeup.5bf428503ed34de1c0650d8792ea136f.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://ak-s-cw.tripcdn.com/modules/ubt/websdk/ubt.minh.8b28b1f6a60e2fbceb4925a1a1db7652.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://aw-s.tripcdn.com/modules/ibu/h5-home/base.e5bf0ec67aa93195517840dad314c338.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://aw-s.tripcdn.com/modules/ibu/h5-home/loading-h5-blue-transparent.811542495a0ba6b48f6ba730bd8ccca1.gif</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://deeplink.trip.com/forward/middlepages/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://deeplink.trip.com/forward/middlepages/?targetUrl=https%3A%2F%2Ftripcom.go.link%3Fadj_t%3D15j9m0tk_15jds8ml%26deep_link%3Dctripglobal%253A%252F%252Fhome%253Fallianceid%253D324048%2526sid%253D1520828%2526ouid%253D375776.VNEDM-Payday-25Mar.2026-03-25_7_0.20260325.vi_VN.%2526trip_in_aid%253D1023%2526trip_in_sid%253D1121%2526trip_in_ouid%253D375776.VNEDM-Payday-25Mar.2026-03-25_7_0.20260325.vi_VN.%26adj_label%3Dplatform%253Demail%2526locale%253Dvi-VN%2526position%253Dedm-install%2526butype%253Dpublic%2526allianceid%253D324048%2526sid%253D1520828%2526ouid%253D375776.VNEDM-Payday-25Mar.2026-03-25_7_0.20260325.vi_VN.%2526trip_in_aid%253D1023%2526trip_in_sid%253D1121%2526trip_in_ouid%253D375776.VNEDM-Payday-25Mar.2026-03-25_7_0.20260325.vi_VN.%2526position%253Dedm%26adj_fallback%3Dhttps%253A%252F%252Fvn.trip.com%252Fm%252Fdownapp%253Flocale%253Dvi-VN%2526allianceid%253D324048%2526sid%253D1520828%2526ouid%253D375776.VNEDM-Payday-25Mar.2026-03-25_7_0.20260325.vi_VN.%2526trip_in_aid%253D1023%2526trip_in_sid%253D1121%2526trip_in_ouid%253D375776.VNEDM-Payday-25Mar.2026-03-25_7_0.20260325.vi_VN.%2526utm_medium%253Dinternal%2526utm_source%253Dpublic%2526utm_campaign%253D0%2526utm_content%253Dplatform%25253Demail%252526locale%25253Dvi-VN%252526position%25253Dedm-install%26adj_adgroup%3D%26adj_creative%3D%26adj_campaign%3D%26%26edm_id%3DSGP-ALI-33981-10154252159-1774405683586.543&amp;bizData=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%3D%3D</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://deeplink.trip.com/restapi/soa2/13618/json/getUniversalLinkH5</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://images3.c-ctrip.com/risk/logo/a.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://ubt-sgp.trip.com/bee/collect?metaSender=1.3.80&amp;contextTs=1776054557370&amp;vid=1776054557352.b8aagrAwNzr9&amp;sid=1&amp;pvId=1&amp;appId=700005</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://vn.trip.com/m/downapp?locale=vi-VN&amp;allianceid=324048&amp;sid=1520828&amp;ouid=375776.VNEDM-Payday-25Mar.2026-03-25_7_0.20260325.vi_VN.&amp;trip_in_aid=1023&amp;trip_in_sid=1121&amp;trip_in_ouid=375776.VNEDM-Payday-25Mar.2026-03-25_7_0.20260325.vi_VN.&amp;utm_medium=internal&amp;utm_source=public&amp;utm_campaign=0&amp;utm_content=platform%3Demail%26locale%3Dvi-VN%26position%3Dedm-install</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://webresource.tripcdn.com/ares2/risk/ubtrms/*/default/rms.js?v=2026413</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://webresource.tripcdn.com/ares2/train/csec/*/default/sec/c-sec.js?v=2026413</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://webresource.tripcdn.com/resaresenglish/risk/ubtrms/dist/d.min.5827b56a.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://webresource.tripcdn.com/resaresenglish/risk/ubtrms/dist/rms.f9480dd0.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.trip.com/restapi/soa2/18088/getAppConfig.json</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>2Fvn.trip.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://tripcom.go.link</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>2Fvn.trip.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://tripcom.go.link</url>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>https://deeplink.trip.com/forward/middlepages/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://deeplink.trip.com/forward/middlepages/?targetUrl=https%3A%2F%2Ftripcom.go.link%3Fadj_t%3D15j9m0tk_15jds8ml%26deep_link%3Dctripglobal%253A%252F%252Fhome%253Fallianceid%253D324048%2526sid%253D1520828%2526ouid%253D375776.VNEDM-Payday-25Mar.2026-03-25_7_0.20260325.vi_VN.%2526trip_in_aid%253D1023%2526trip_in_sid%253D1121%2526trip_in_ouid%253D375776.VNEDM-Payday-25Mar.2026-03-25_7_0.20260325.vi_VN.%26adj_label%3Dplatform%253Demail%2526locale%253Dvi-VN%2526position%253Dedm-install%2526butype%253Dpublic%2526allianceid%253D324048%2526sid%253D1520828%2526ouid%253D375776.VNEDM-Payday-25Mar.2026-03-25_7_0.20260325.vi_VN.%2526trip_in_aid%253D1023%2526trip_in_sid%253D1121%2526trip_in_ouid%253D375776.VNEDM-Payday-25Mar.2026-03-25_7_0.20260325.vi_VN.%2526position%253Dedm%26adj_fallback%3Dhttps%253A%252F%252Fvn.trip.com%252Fm%252Fdownapp%253Flocale%253Dvi-VN%2526allianceid%253D324048%2526sid%253D1520828%2526ouid%253D375776.VNEDM-Payday-25Mar.2026-03-25_7_0.20260325.vi_VN.%2526trip_in_aid%253D1023%2526trip_in_sid%253D1121%2526trip_in_ouid%253D375776.VNEDM-Payday-25Mar.2026-03-25_7_0.20260325.vi_VN.%2526utm_medium%253Dinternal%2526utm_source%253Dpublic%2526utm_campaign%253D0%2526utm_content%253Dplatform%25253Demail%252526locale%25253Dvi-VN%252526position%25253Dedm-install%26adj_adgroup%3D%26adj_creative%3D%26adj_campaign%3D%26%26edm_id%3DSGP-ALI-33981-10154252159-1774405683586.543&amp;bizData=eyJldmVudCI6ImNsaWNrIiwia2V5IjoiU0dQLUFMSS0zMzk4MS0xMDE1NDI1MjE1OS0xNzc0NDA1NjgzNTg2LjU0MyIsInRpdGxlIjoiYXBwLWluc3RhbGwtYnV0dG9uIiwidHlwZSI6InJlYWN0LmNvbXBvbmVudCIsIm5hbWUiOiJAY3RyaXAvY2xvdWQtY29tcG9uZW50LW1haWwtYXBwLWluc3RhbGwiLCJsYWJlbCI6ImFwcC1pbnN0YWxsIiwiaWQiOiJzdHJ1X3NCMW0wNk01a0hiTWxjNSIsImZpbGVJZCI6ImZpbGVfd2dBNjRyaGFORVhhcnVyIiwiYXBwSWQiOiJhcHBsXzRqYXdlMjNVMUlWaGJCMSIsImZveHBhZ2VWZXJzaW9uIjoyLCJmcFRyYWNlSWQiOiJiOTdjMGZhZi0wNWVjLTQyMjMtYjE1Ny0xZDc1YTdmMWI5ZGMiLCJ0ZW1wbGF0ZUlkIjoiY29udF9hZ1Uya2d6dDNYTHQ2U1oiLCJ0ZW1wbGF0ZVZlcnNpb24iOjEsImRhdGEiOnsibmFtZSI6ImFwcC1pbnN0YWxsLWJ1dHRvbiJ9fQ%3D%3D</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://aw-s.tripcdn.com/modules/ibu/node-microservice/wakeup.5bf428503ed34de1c0650d8792ea136f.js</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://aw-s.tripcdn.com/modules/ubt/websdk/ubt.minh.8b28b1f6a60e2fbceb4925a1a1db7652.js</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>aw-s.tripcdn.com</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>ak-s-cw.tripcdn.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>aw-s.tripcdn.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>deeplink.trip.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>images3.c-ctrip.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>ubt-sgp.trip.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>vn.trip.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>webresource.tripcdn.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.trip.com</url>
              <origin>URL_RENDER</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>13.33.187.98</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>18.245.86.2</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>23.2.13.89</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>23.3.89.112</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>92.123.104.45</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>18.245.86.2</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>18.245.86.2</ip>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>a07337f0cc975ec52e5af8301e3525e917efd12a5e0dc5d8ca7a2baba3c8a9d2</SHA-256>
              <SHA-1>8e3f4abe0eb5c8daec1c59a758538ac7cf42d405</SHA-1>
              <MD5>5189fa49e6a395aad91eea1a3589ff88</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/json</file_type>
            </value>
            <value>
              <SHA-256>ea5bcac9b9298b69e5f4fc6ed042290f3055a844239d4220c7c568c12ec247bc</SHA-256>
              <SHA-1>f752fc485e92c9f0a68794208147a086c409881e</SHA-1>
              <MD5>5bf428503ed34de1c0650d8792ea136f</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/javascript</file_type>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <SHA-256>e934b4c5ed7875e9ae4d2767576e9c50bd29c43901370834ca7a3a3a80ac42fa</SHA-256>
              <SHA-1>21c1eeba42e051bc70f521cd0dd001199e11293f</SHA-1>
              <MD5>8b28b1f6a60e2fbceb4925a1a1db7652</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/javascript</file_type>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </files>
        </iocs>
        <name>hxxps://deeplink.trip.com/forward/middlepages/?targetUrl=https%3A%2F%2Ftripcom.go.link%3Fadj_t%3D15j9m0tk_15jds8ml%26deep_link%3Dctripglobal%253A%252F%252Fhome%253Fallianceid%253D324048%2526sid%253D1520828%2526ouid%253D375776.VNEDM-Payday-25Mar.2026-03-25_7_0.20260325.vi_VN.%2526trip_in_aid%253D1023%2526trip_in_sid%253D1121%2526trip_in_ouid%253D375776.VNEDM-Payday-25Mar.2026-03-25_7_0.20260325.vi_VN.%26adj_label%3Dplatform%253Demail%2526locale%253Dvi-VN%2526position%253Dedm-install%2526butype%253Dpublic%2526allianceid%253D324048%2526sid%253D1520828%2526ouid%253D375776.VNEDM-Payday-25Mar.2026-03-25_7_0.20260325.vi_VN.%2526trip_in_aid%253D1023%2526trip_in_sid%253D1121%2526trip_in_ouid%253D375776.VNEDM-Payday-25Mar.2026-03-25_7_0.20260325.vi_VN.%2526position%253Dedm%26adj_fallback%3Dhttps%253A%252F%252Fvn.trip.com%252Fm%252Fdownapp%253Flocale%253Dvi-VN%2526allianceid%253D324048%2526sid%253D1520828%2526ouid%253D375776.VNEDM-Payday-25Mar.2026-03-25_7_0.20260325.vi_VN.%2526trip_in_aid%253D1023%2526trip_in_sid%253D1121%2526trip_in_ouid%253D375776.VNEDM-Payday-25Mar.2026-03-25_7_0.20260325.vi_VN.%2526utm_medium%253Dinternal%2526utm_source%253Dpublic%2526utm_campaign%253D0%2526utm_content%253Dplatform%25253Demail%252526locale%25253Dvi-VN%252526position%25253Dedm-install%26adj_adgroup%3D%26adj_creative%3D%26adj_campaign%3D%26%26edm_id%3DSGP-ALI-33981-10154252159-1774405683586.543&amp;bizData=eyJldmVudCI6ImNsaWNrIiwia2V5IjoiU0dQLUFMSS0zMzk4MS0xMDE1NDI1MjE1OS0xNzc0NDA1NjgzNTg2LjU0MyIsInRpdGxlIjoiYXBwLWluc3RhbGwtYnV0dG9uIiwidHlwZSI6InJlYWN0LmNvbXBvbmVudCIsIm5hbWUiOiJAY3RyaXAvY2xvdWQtY29tcG9uZW50LW1haWwtYXBwLWluc3RhbGwiLCJsYWJlbCI6ImFwcC1pbnN0YWxsIiwiaWQiOiJzdHJ1X3NCMW0wNk01a0hiTWxjNSIsImZpbGVJZCI6ImZpbGVfd2dBNjRyaGFORVhhcnVyIiwiYXBwSWQiOiJhcHBsXzRqYXdlMjNVMUlWaGJCMSIsImZveHBhZ2VWZXJzaW9uIjoyLCJmcFRyYWNlSWQiOiJiOTdjMGZhZi0wNWVjLTQyMjMtYjE1Ny0xZDc1YTdmMWI5ZGMiLCJ0ZW1wbGF0ZUlkIjoiY29udF9hZ1Uya2d6dDNYTHQ2U1oiLCJ0ZW1wbGF0ZVZlcnNpb24iOjEsImRhdGEiOnsibmFtZSI6ImFwcC1pbnN0YWxsLWJ1dHRvbiJ9fQ%3D%3D</name>
        <report_id>88c1d947-482f-459e-92ae-3a863b1c5084</report_id>
        <tags>
          <value>html</value>
          <value>javascript</value>
          <value>obfuscated</value>
          <value>base64</value>
          <value>soft-404</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>bbfb442a0f1735d69e9c7ef60835fc69d9f59090256de01f6beee4e516dd2701</id>
    <title>Analysis Report for bbfb442a0f1735d69e9c7ef60835fc69d9f59090256de01f6beee4e516dd2701</title>
    <updated>2026-04-13T04:25:46Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc706980678438b878afaa</_id>
        <file_type>application/x-dosexec</file_type>
        <flow_id>69dc70495ea31bc68a24b942</flow_id>
        <hash>bbfb442a0f1735d69e9c7ef60835fc69d9f59090256de01f6beee4e516dd2701</hash>
        <iocs>
          <ips>
            <value>
              <ip>192.0.2.2</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>6.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>12598188b44d76a8828aa7a8211c4c1bfa8093f617928f5c8f3da9cd81a42d64</SHA-256>
              <SHA-1>67c460a036df79419b3f280eaef622319e0504b3</SHA-1>
              <MD5>8f86676bbba888f4c3c4c7e3b4fdb4b2</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>1a3c94b10aafd9707c9bf6258e2273c5cab8afbd953fe78c3f5e4317c5185a77</SHA-256>
              <SHA-1>44e97678a53c0c9a55a87c053b1dee4d720acccf</SHA-1>
              <MD5>b8779e11030231fba116bb9ea23daf66</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>text/plain</file_type>
            </value>
            <value>
              <SHA-256>245fc49e4e955e1db3975b826dcf27ad2eb32a6831caa4cb6b501a3914bcfaa9</SHA-256>
              <SHA-1>29a1f0faadc42f1b9f9767d8c724fdc58dd165c8</SHA-1>
              <MD5>ad424f5f5d5ff4460343686c61e4f75e</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>317bb0b285a5fea8986b4dd1abd9f7d524bd261c83298daacc0f972a8b7958d7</SHA-256>
              <SHA-1>cc4a710ff293b6793d94735b9f7f398d31000119</SHA-1>
              <MD5>6bf932e136993cd49459de108295e09a</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>text/plain</file_type>
            </value>
            <value>
              <SHA-256>3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c</SHA-256>
              <SHA-1>8bc0f1596c986179b82585c703bacae6d2a00316</SHA-1>
              <MD5>6087bf6af59b9c531f2c9bb421d5e902</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload; format=pe32</file_type>
            </value>
            <value>
              <SHA-256>3c4ecd16d6cdf2edd24c2ea651ea7dfcad691c532b50e136810573ff4385b1a0</SHA-256>
              <SHA-1>44698d147f7f339edbd6ae46a5a37e81ab2e1f44</SHA-1>
              <MD5>c02069700be997f065ff003c5da4c294</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>4fe35e21717d34ceb4717f9e9de8fde1b3de80d76a59bb87405910c2f1d6284b</SHA-256>
              <SHA-1>5b2075b778387182bf97314b593e73f30853435d</SHA-1>
              <MD5>d1f824f98742295a66a25225701dd6d8</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>576f68c52cc25923f3ccb589b5bfde4b51993bd8a06d8351027215c0050b55fd</SHA-256>
              <SHA-1>b25f4eeccbf1fa1d6ca213e292e4a87fe0ab99d3</SHA-1>
              <MD5>013aa7ea4e0383d650ba7a0c90626353</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>793efaabe5ceaa5047642c0632208fc00d89f5e97d74d5ca94edaa59e7264dce</SHA-256>
              <SHA-1>d7cd97f6c5116579a8254e62ad8a34eeeadd9f9e</SHA-1>
              <MD5>3b8aebefc73db7a520e59a8588661b53</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>903559c5b0ff6dc4123dac19436a5bf563685c157029847b71d2a15de38c36b1</SHA-256>
              <SHA-1>8ea91d98087e7838f1ca4eeca41bd74aab2e69cf</SHA-1>
              <MD5>3f1f069998ad5bf1c5b433fc24838f73</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>ae172a9a2fd008910b537c92a95b38bfba0e5bbdaaca719bf686e6415a7a2ba1</SHA-256>
              <SHA-1>42945c3496bc4e1943a1a05926a9b5ee31d3e450</SHA-1>
              <MD5>f64c60b749269fcf6659c450dda98486</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>caf31ff678bb95b2e90f30d9451a78138e42dcb169584bba8ce865fd9795759f</SHA-256>
              <SHA-1>1b8fa630eb87d0ea16c8a9587a09c05529da9589</SHA-1>
              <MD5>dc019e2df3ab9db8bc1b84d56c1c355e</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>text/plain</file_type>
            </value>
            <value>
              <SHA-256>da9acfa4567f412e45c461544fcb0fcc2940a06f0980d1a4d75c4f494fb6e72f</SHA-256>
              <SHA-1>6fd981eadf8a89d007924e8101b0b2a49227e927</SHA-1>
              <MD5>2b66b74bec1548d7971bea17f5d9f070</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload; format=pe32</file_type>
            </value>
            <value>
              <SHA-256>e133e559b524338311212dacf4235440ab833614e4063dc597e46ad17b19048c</SHA-256>
              <SHA-1>7d5f87f0c9f5a41ae8e5315e194bcce62fa65179</SHA-1>
              <MD5>262226f2952a36700daa29c7180fe1cb</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>f83fa955aafb4f7c870927de5cdce598634768c4117d618b95207ce325d90841</SHA-256>
              <SHA-1>aef92f3766093bde1bfac03af9cb63637fc1927d</SHA-1>
              <MD5>c0b2b523c7b4130d99ad56d9ecfce3ec</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>4c711feef1547ba84b3217c671889b6f166f10eee7415e58428b70d0a1b5465e</SHA-256>
              <SHA-1>fdf906735307486817e4d278a0f7d5e55dde7ce2</SHA-1>
              <MD5>987f0eaa667a5bc9042ca208e6e3f688</MD5>
              <origin>AUTOIT_DECOMPILATION</origin>
              <file_type>text/x-autoit-script</file_type>
            </value>
          </files>
          <uuids>
            <value>
              <uuid>1f676c76-80e1-4239-95bb-83d0f6d0da78</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>35138b9a-5d96-4fbd-8e2d-a2440225f93a</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>abe2869f-9b47-4cd9-a358-c22904dba7f7</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>e2011457-1546-43c5-a5fe-008deee3d3f0</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
          <registry>
            <value>
              <registry>SOFTWARE\Classes\</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\Nls\Language</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Internet Explorer\IntelliForms\Storage2</registry>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </registry>
        </iocs>
        <name>xbbfb442a0f1735d69e9c7ef60835fc69d9f59090256de01f6beee4e516dd2701.exe</name>
        <report_id>91c3e243-b0cb-49d8-bb16-d3e45bf40548</report_id>
        <tags>
          <value>peexe</value>
          <value>netwire</value>
          <value>unsafe</value>
          <value>virus</value>
          <value>windows</value>
          <value>wirenet</value>
          <value>keylogger</value>
          <value>packed</value>
          <value>stealer</value>
          <value>anti-debug</value>
          <value>overlay</value>
          <value>compiled-script</value>
          <value>crypto</value>
          <value>fingerprint</value>
          <value>autoit</value>
          <value>microsoft_visual_cc</value>
          <value>base64</value>
          <value>installer-heuristic</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>9c29e71e10ddabb61be6c991c7c4530c41dcd1d0f6acf75232e51d7d2880c139</id>
    <title>Analysis Report for 9c29e71e10ddabb61be6c991c7c4530c41dcd1d0f6acf75232e51d7d2880c139</title>
    <updated>2026-04-13T04:21:27Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6f5b80678438b878af79</_id>
        <file_type>application/x-dosexec</file_type>
        <flow_id>69dc6f46799d5bf325fa785c</flow_id>
        <hash>9c29e71e10ddabb61be6c991c7c4530c41dcd1d0f6acf75232e51d7d2880c139</hash>
        <iocs>
          <urls>
            <value>
              <url>http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0</url>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0</url>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://crl3.digicert.com/DigiCertTrustedRootG4.crl0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://crl3.digicert.com/sha2-assured-cs-g1.crl05</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://crl4.digicert.com/sha2-assured-cs-g1.crl0K</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://schemas.microsoft.com/SMI/2005/WindowsSettings</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://schemas.microsoft.com/SMI/2016/WindowsSettings</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.digicert.com/CPS0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.digicert.com/CPS0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>cacerts.digicert.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>crl3.digicert.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>crl4.digicert.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>digicert.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>schemas.microsoft.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>1.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>6.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>23.11.41.157</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>45.60.131.229</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>150.171.109.100</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>172.66.2.5</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>172.66.2.5</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>23.11.41.157</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>45.60.131.229</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>150.171.109.100</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>0af5f402d0b26ab544614614985a913bd0a36096daf85af7e29d4acc143ad7b2</SHA-256>
              <SHA-1>2725c61b5bcbb07270522c5c76337fd13ce7d1ec</SHA-1>
              <MD5>498745d88d7d011477735cf2c59d584d</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>36de64b43bbe158a5edbd2eb82bbf9bc769b4e98fabde8bf0f929b9e176396c3</SHA-256>
              <SHA-1>d99d831ae3eeef8f3d27afbab9a9abe90b578445</SHA-1>
              <MD5>18617d2db2fe0955c9aa13f617f038c2</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>37b452ed84f4777ebb5a6130a6dd6e791729d1b5d5071244ee0dfa40493c408e</SHA-256>
              <SHA-1>19eeac9fafbf7d6817e9a7ffbcea128d9a63ec86</SHA-1>
              <MD5>b04071df851d97459160ae607e6d1934</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>text/plain</file_type>
            </value>
            <value>
              <SHA-256>3f921d65d0ba465f97f4d44efb8a13ebb76f8df0dde7d69b42f78a9e8318b239</SHA-256>
              <SHA-1>3318c5cac272603074afea437f074fd6cefcef6a</SHA-1>
              <MD5>3ecf6a0cb6b6734b55a5d50a5ec9526d</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload; format=pe32</file_type>
            </value>
            <value>
              <SHA-256>505918b191943a5fd9bb3f19627aea834754e0ea214a1d8d7f037cd113bc95d1</SHA-256>
              <SHA-1>bf675c28f0c1ba271ef7e9fabf121dd14fadd937</SHA-1>
              <MD5>f44482cd30ec2d444a528fa219beb313</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>6f88bc7cb02ccb2dbc26b5f4ce53e355b331e31bb920b2ba8cbbcd1b5d4cd5a0</SHA-256>
              <SHA-1>dc9804dd3aa348fb0c05f53c53c698518af514a0</SHA-1>
              <MD5>9ce8c70178061cc4cf4a6bb1e291df93</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>7cd0cd67fb570f5aef1a5374f11f6c0569e4907d210289511749c210b1608da5</SHA-256>
              <SHA-1>fa34087ba8fdef1abc85cecfbb3468a283fe67ef</SHA-1>
              <MD5>f35f4c2aac0bd27cb36382b163f1cee6</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>b5fae454eae83931e8508b3c158b122f7100b65d70065e8af2aaeddb639a5c40</SHA-256>
              <SHA-1>f51d2ad16dc79373001160a2b5e7a2f861f60d5c</SHA-1>
              <MD5>0d62df6f0138e145185b2c1c45bf72bc</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f</SHA-256>
              <SHA-1>879dcf690e5bf1941b27cf13c8bcf72f8356c650</SHA-1>
              <MD5>a19a2658ba69030c6ac9d11fd7d7e3c1</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
          </files>
          <uuids>
            <value>
              <uuid>1f676c76-80e1-4239-95bb-83d0f6d0da78</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>3fe8fa79-5dce-4503-ab23-464ea24babff</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </registry>
        </iocs>
        <name>x9c29e71e10ddabb61be6c991c7c4530c41dcd1d0f6acf75232e51d7d2880c139.exe</name>
        <report_id>71fb16c7-4296-4a4f-ac4c-baf6c0aa609f</report_id>
        <tags>
          <value>peexe</value>
          <value>xworm</value>
          <value>loveletter</value>
          <value>njrat</value>
          <value>unsafe</value>
          <value>anti-vm</value>
          <value>fingerprint</value>
          <value>obfuscated</value>
          <value>overlay</value>
          <value>base64</value>
          <value>reconnaissance</value>
          <value>anti-debug</value>
          <value>microsoft_visual_cc</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>fc761ed488a21b9e476b6656bc2ce594baec3dada3046e838cbe6c40a65dec82</id>
    <title>Analysis Report for fc761ed488a21b9e476b6656bc2ce594baec3dada3046e838cbe6c40a65dec82</title>
    <updated>2026-04-13T04:20:09Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6f1c80678438b878af6c</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc6ef6cf2dcc2ba2622242</flow_id>
        <hash>fc761ed488a21b9e476b6656bc2ce594baec3dada3046e838cbe6c40a65dec82</hash>
        <iocs>
          <files>
            <value>
              <SHA-256>025fc246f13759c192cbbae2a68f2b59b6478f21b31a05d77483a87e417906dd</SHA-256>
              <SHA-1>d5d5370bbe3e3ce247c6f0825a9e16db2b8cd5c5</SHA-1>
              <MD5>ed5a964e00f4a03ab201efe358667914</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>07e7aaaa6c4c7ebcd6f795b27a806984827dd18eb32f9f3db3973a665ec45dd3</SHA-256>
              <SHA-1>71c440bc78dcdf523749710f2b10d8db55a56bc1</SHA-1>
              <MD5>57f7b2d8d88b866215e2adb92f7f6035</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>1f49b4a74b27c9150887a46884e133a6e7e23faf1985529ad64ddfff32288acc</SHA-256>
              <SHA-1>ecb0986ad735b40053ac2b2be38789fcb9e46354</SHA-1>
              <MD5>597e170584a4d801ce41bc5faaefb848</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>83051e05f7b9639d4f9a0f7a73fc2909d9e46bc11375c4383ce3cc218d6c210e</SHA-256>
              <SHA-1>8c5ade64a3652c8c6d4160bf9a67cb0ff3bdbf53</SHA-1>
              <MD5>2b84617d284847c087d35103c9bb8b13</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>85d740759c6fe524d1ac1e7cde79739ceaba3aeecb348e5a538fba7ab383019b</SHA-256>
              <SHA-1>34431ddb9baa47236be9079fcfa58a256bf47c0d</SHA-1>
              <MD5>72e6af2af67d07a2d07ee85ac0026a5e</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>8f46c438b05089cb9fc6b3bad4eaae89f1a0f20f4ab5abc236d3e518384ebad9</SHA-256>
              <SHA-1>edacf7746bf4892e1b1a5b2a992d2a9007bc578b</SHA-1>
              <MD5>a87b8d19e03bcd2a26e236981d143de3</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>90f77653f6a116257d44caec1c1d0060f044f5bb8178a27150390e72019f6cd7</SHA-256>
              <SHA-1>bc90e8a53e320a79eec773a9d04ae10d72f218c5</SHA-1>
              <MD5>a9eb3e798a6090781b1266ef7b0bf70a</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload; format=pe32</file_type>
            </value>
            <value>
              <SHA-256>918a9200e6fa6ff91e48102b4f08ec73d502ca61ee1cde89c894701d00740712</SHA-256>
              <SHA-1>100c1d461dfbe1b534995089a6bbce515da04cad</SHA-1>
              <MD5>3518aefb4200a27189a6f3aea0ecc88f</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>e74e1a8c7fb9301e0cd38e1fbf5ae23d522636b243090855a35395d72688250c</SHA-256>
              <SHA-1>a7873465a50ab9b3828541f10cb4a80e21df4d08</SHA-1>
              <MD5>7e0a41d59ba54e58bba3b2ed088cbc65</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload; format=pe32</file_type>
            </value>
            <value>
              <SHA-256>f2d3e972ab0f20f5a5672b2c663d5575c1143111623503564193a7d2201d6791</SHA-256>
              <SHA-1>b672a283c2988b88dc81fc8e9c1f1bdb57e3f242</SHA-1>
              <MD5>f2036602156bda4656c3f68868ebf51d</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>9e2571fb0cc51eebf91612962854e9c084a79f6bf871e35235f1610dec7f1f45</SHA-256>
              <SHA-1>ed417e80a34e08efac3148df493901b4273e33af</SHA-1>
              <MD5>2838892484b7d8b1d15b9e8e3c066e66</MD5>
              <origin>PE_UNPACKING</origin>
              <file_type>application/x-msdownload; format=pe32</file_type>
            </value>
          </files>
          <registry>
            <value>
              <registry>Software\Microsoft\Windows NT\CurrentVersion\Winlogon</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </registry>
        </iocs>
        <name>xfc761ed488a21b9e476b6656bc2ce594baec3dada3046e838cbe6c40a65dec82.exe</name>
        <report_id>aec542e3-2686-4367-bc0e-1e8532ed6036</report_id>
        <tags>
          <value>peexe</value>
          <value>redline</value>
          <value>crypt</value>
          <value>snojan</value>
          <value>dcrat</value>
          <value>nemucod</value>
          <value>unsafe</value>
          <value>packed</value>
          <value>overlay</value>
          <value>anti-debug</value>
          <value>cscript</value>
          <value>explorer</value>
          <value>lolbin</value>
          <value>schtasks</value>
          <value>fingerprint</value>
          <value>crypto</value>
          <value>mingw</value>
          <value>upx</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>aad358911156a63110215ae285cc1a6b360bbeb6c69b1a5f62f4cf07800dc92e</id>
    <title>Analysis Report for aad358911156a63110215ae285cc1a6b360bbeb6c69b1a5f62f4cf07800dc92e</title>
    <updated>2026-04-13T04:19:02Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6ecc80678438b878af5c</_id>
        <file_type>text/plain</file_type>
        <flow_id>69dc6eb35ea31bc68a24b519</flow_id>
        <hash>aad358911156a63110215ae285cc1a6b360bbeb6c69b1a5f62f4cf07800dc92e</hash>
        <iocs>
          <urls>
            <value>
              <url>https://eaedadlsgen2.blob.core.windows.net/sfdc2richtext/a4w4X000000cmRQQAY_0684X00000VoCcJQAV.png</url>
              <origin>INPUT_FILE</origin>
            </value>
          </urls>
          <files>
            <value>
              <SHA-256>0ad1cf3c494114efa5158905b00d40673fe67fca35dfc441b95db2903d78490d</SHA-256>
              <SHA-1>c029b9944a8780d87bfdcd28702f774f70c770dd</SHA-1>
              <MD5>84c1f3f708f441cee7e507c5aba7a5b0</MD5>
              <origin>BASE64_DECODED</origin>
              <file_type>application/zip</file_type>
            </value>
          </files>
          <btc_wallets>
            <value>
              <btc_wallet>4U8jS67WYfPisnB1n6yfHpvXa</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>PdTG9sEnfNrbrjr5E9ZpknaCWNfy</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>bWeoruVRc2z4m7G43effbVae</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>bbpK2vDxWd7WPU9cavFqEtuVTJy</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>cAXHwR49WLh796NEvf3DYoM746K</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>gSBszmfszxvFhV6FQksu9QGhuqYM</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>rXo8SGDdRHHPDsNb93MbUzmndkFsR23u</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>rgNVVviae42sRR3edqRLTbZ7bV3WxL</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>vKY5SuSzBw66Z5aFz9MXrmgp</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>yS43yzr4UjTGevkb2wqbGTi3</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
          </btc_wallets>
        </iocs>
        <name>hxxps://eaedadlsgen2.blob.core.windows.net/sfdc2richtext/a4w4X000000cmRQQAY_0684X00000VoCcJQAV.png</name>
        <report_id>b5916777-4b7e-4657-b1e5-8e5368fefa0d</report_id>
        <tags>
          <value>txt</value>
          <value>base64</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>3e1102af12c223b2506b16e37a787977a98a24b31f655e7f7010a8f318e73114</id>
    <title>Analysis Report for 3e1102af12c223b2506b16e37a787977a98a24b31f655e7f7010a8f318e73114</title>
    <updated>2026-04-13T04:18:23Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6ea780678438b878af55</_id>
        <file_type>text/x-shellscript</file_type>
        <flow_id>69dc6e8c799d5bf325fa772c</flow_id>
        <hash>3e1102af12c223b2506b16e37a787977a98a24b31f655e7f7010a8f318e73114</hash>
        <iocs>
          <urls>
            <value>
              <url>http://45.95.147.178/x</url>
              <origin>INPUT_FILE</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://45.95.147.178/k.php</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>MALICIOUS</verdict>
            </value>
          </urls>
          <ips>
            <value>
              <ip>45.95.147.178</ip>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <ip>45.95.147.178</ip>
              <origin>INPUT_FILE</origin>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>b506fc828bf9ca224cea60258358857e054a4bc78a2763530eb7998e6c00eb26</SHA-256>
              <SHA-1>71c8df0a623d2dcdfe6ea5e15a2afe8f6082222a</SHA-1>
              <MD5>59bc1dfe73834d904ac45e43c10bc51f</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/x-shellscript</file_type>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <SHA-256>ee8de45c181df34eaf926c3fbfd49fb309fac91157d426fbd2f8cacb805c0828</SHA-256>
              <SHA-1>337e7d8944d6a957e8ee5340e4a53c8f0c7770c5</SHA-1>
              <MD5>52163605288ef584d75de671732ead3a</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/x-shellscript</file_type>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
          </files>
        </iocs>
        <name>k.php.sh</name>
        <report_id>d9eaa4a7-1427-4f7b-afcf-4480e8a48916</report_id>
        <tags>
          <value>shell</value>
          <value>base64</value>
          <value>obfuscated</value>
          <value>evasive</value>
          <value>bash</value>
          <value>lolbin</value>
          <value>masquerade</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>d12f279bfad6d9d1b555894e597173081240dd1d62b9a4833afa4f2452ddb281</id>
    <title>Analysis Report for d12f279bfad6d9d1b555894e597173081240dd1d62b9a4833afa4f2452ddb281</title>
    <updated>2026-04-13T04:17:16Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6e823040601e24ad5fde</_id>
        <file_type>text/html</file_type>
        <flow_id>69dc6e4a799d5bf325fa76cb</flow_id>
        <hash>d12f279bfad6d9d1b555894e597173081240dd1d62b9a4833afa4f2452ddb281</hash>
        <iocs>
          <urls>
            <value>
              <url>http://chuteinicial.corinthians.com.br/</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://ouvidoria.corinthians.com.br</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://www.esm.com.br</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://www.neoquimicaarena.com.br</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://www.w3.org/2000/svg</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://agencia.corinthians.com.br</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://agencia.corinthians.com.br/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://avacr7.com/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://cadastro.corinthians.com.br/user/login</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://censodotimao.com.br</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://code.jquery.com/jquery-3.3.1.min.js</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://connect.facebook.net/en_US/fbevents.js</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://fieltorcedor.com.br</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://fieltorcedor.com.br/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://fonts.googleapis.com/css?family=Raleway:100,300i,400,700,800,900</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://goo.gl/WrB5QN</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://invasaocorinthiana.com.br/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://motoristapx.com.br/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://news.google.com/publications/CAAqBwgKMNzssAsw6YfIAw?hl=pt-BR&amp;gl=BR&amp;ceid=BR%3Apt-419</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://ohaagua.com.br</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://soccergrass.com.br/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/files/assets/dist/css/libs.min.css</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/files/assets/dist/js/libs.min.js</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://static.corinthians.com.br/files/assets/dist/js/main.min.js</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://static.corinthians.com.br/files/assets/fonts/fontawesome-pro-5.15.4/css/all.css</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/files/assets/js/cookies.js</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/corinthians-tv-120x120.png</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/corinthians-tv-180x180.png</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/corinthians-tv-32x32.png</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/corinthians-tv-96x96.png</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://twitter.com/corinthians</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://whatsapp.com/channel/0029VaCskai4SpkH0Ja2ss2E</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.bancobmg.com.br</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.brahma.com.br/pt-br</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.byd.com/br</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/apoiocultural</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/app</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/calendario</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/contatos</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/departamento-cultural</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/departamento-social</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/espaco-kids</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/esportes-aquaticos</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/esportes-terrestres</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/fiel-movel</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/historia</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/identidade</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/responsabilidade-social</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/salao-nobre</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/sede-social</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/skate-park</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/teatro-corinthians</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/titulos</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/conselho-deliberativo</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/conselho-fiscal</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/cori</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/presidencia-e-diretoria</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/visitas</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/coworking</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/departamento-medico</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/feed/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Andr</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Breno</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Fabrizio</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Felipe</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Gabriel</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Gui</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Gustavo</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Hugo</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Joo</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Kaio</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Luiz</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Matheus</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Pedro</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Rodrigo</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Yuri</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/home</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/memorialcorinthians</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/newsletter</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/parquesaojorge</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/search</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.esportesdasorte.com/ptb/bet/main</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.ezzeseguros.com.br/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/corinthians</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.frimesa.com.br</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.googletagmanager.com/gtag/js?id=G-8C3EK0TENH</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.googletagmanager.com/gtm.js?id=</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.googletagmanager.com/ns.html?id=GTM-MG97L9K</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.googletagservices.com/tag/js/gpt.js</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.instagram.com/corinthians/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.instagram.com/thinkersmgmt/?hl=pt-br</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.konami.com/efootball/pt-br/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.linkedin.com/company/sccorinthians</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.matrixfitness.com/br/ptb</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.neoquimicaarena.com.br/ingressos/termos-e-condicoes</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.nike.com.br</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.shoptimao.com.br/busca?nsCat=Natural&amp;q=garro</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.shoptimao.com.br/busca?nsCat=Natural&amp;q=goleiro</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.shoptimao.com.br/busca?nsCat=Natural&amp;q=pedro%20raul</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.shoptimao.com.br/busca?nsCat=Natural&amp;q=raniele</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.shoptimao.com.br/busca?nsCat=Natural&amp;q=yuri</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.shoptimao.com.br/lst/elenco</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.shoptimao.com.br/lst/lingard?sort=new-releases&amp;utm_source=oficial&amp;utm_medium=twttclube&amp;utm_campaign=nik_lingard77_260306</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.shoptimao.com.br/lst/nike-23-24</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.shoptimao.com.br/lst/nike-23-24?genero=feminino</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.tiktok.com/@corinthians</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.uol.com.br</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.urbano.com.br/home</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.youtube.com/@corinthians</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.youtube.com/corinthians</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.youtube.com/iframe_api</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.ze.delivery/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>Https://corinthians.com.br#</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://chuteinicial.corinthians.com.br/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://ouvidoria.corinthians.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://www.esm.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://www.neoquimicaarena.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://agencia.corinthians.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://agencia.corinthians.com.br/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://avacr7.com/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://cadastro.corinthians.com.br/terms</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://cadastro.corinthians.com.br/user/login</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://censodotimao.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://code.jquery.com/jquery-3.3.1.min.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://connect.facebook.net/en_US/fbevents.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://connect.facebook.net/signals/config/550840126185095</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://connect.facebook.net/signals/config/550840126185095?v=2.9.297&amp;r=stable&amp;domain=www.corinthians.com.br&amp;hme=c048e760b3fdc0fbdc117d7607b2c36e13eff2660c515ac72e86dac5ba060bb9&amp;ex_m=104%2C205%2C154%2C22%2C72%2C73%2C145%2C68%2C67%2C11%2C162%2C90%2C16%2C138%2C127%2C39%2C75%2C78%2C134%2C159%2C164%2C8%2C4%2C5%2C7%2C6%2C3%2C91%2C101%2C165%2C170%2C219%2C62%2C186%2C187%2C55%2C277%2C30%2C74%2C231%2C230%2C229%2C23%2C33%2C103%2C61%2C10%2C63%2C97%2C98%2C99%2C105%2C130%2C31%2C29%2C132%2C133%2C129%2C128%2C155%2C76%2C158%2C156%2C157%2C50%2C60%2C123%2C15%2C161%2C45%2C264%2C265%2C263%2C26%2C27%2C28%2C48%2C146%2C77%2C112%2C18%2C20%2C44%2C40%2C42%2C41%2C83%2C92%2C96%2C110%2C144%2C147%2C46%2C111%2C24%2C21%2C119%2C69%2C36%2C149%2C148%2C150%2C141%2C139%2C25%2C35%2C59%2C109%2C160%2C70%2C17%2C152%2C114%2C81%2C66%2C19%2C85%2C86%2C116%2C84%2C136%2C135%2C34%2C279%2C294%2C212%2C201%2C202%2C200%2C297%2C289%2C52%2C213%2C107%2C131%2C80%2C121%2C54%2C47%2C49%2C113%2C120%2C126%2C58%2C64%2C151%2C115%2C37%2C32%2C53%2C56%2C100%2C163%2C1%2C124%2C14%2C122%2C12%2C2%2C57%2C93%2C65%2C118%2C89%2C88%2C166%2C167%2C94%2C95%2C9%2C125%2C102%2C51%2C142%2C87%2C79%2C71%2C117%2C106%2C43%2C143%2C0%2C82%2C137%2C140%2C153%2C38%2C108%2C13%2C168</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://corinthians-tv.s3.sa-east-1.amazonaws.com/img/logo_ava_preta_em_alta.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://corinthians-tv.s3.sa-east-1.amazonaws.com/img/logo_soccer_grass_preto_corte.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://corinthians-tv.s3.sa-east-1.amazonaws.com/img/matrix_logo_preto.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://ep1.adtrafficquality.google/getconfig/sodar?sv=200&amp;tid=gda&amp;tv=r20260408&amp;st=env&amp;sjk=6703470380199560</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://ep1.adtrafficquality.google/pagead/sodar?id=sodar2&amp;v=254&amp;t=2&amp;li=gda_r20260408&amp;jk=6703470380199560&amp;bg=!LC-lL03NAAZuQnBWTkI7AEcBe5WfOChFFxPxqZj4kZTVm66jpMsrOdD5vYfJ1-9IT6AF7UUPUlHq3ukcWPZrIyXb_QcXJp6qMknOopxM47Jcbo3bRzToiwIAAACBUgAAAAloAQd-ADeDLIWad-BATaNbW8sDb8PcVXXqncpor9UvxIrYoo6O6KcgFbLTjgUagv6eiOZVSKVPU41UhKyFCgBVkwSogTP0_PAzj8dkwaSfjghHSgJE-kvjPiP3a2ZbQAVdhJaC07GqhwRKKWMfpfbBmQKKjV7Evq8Z8VM78xmwwbPEyxP2fx-3A4PoL4VN4ndMQRz0PpkCMNCWg_HGhgBSC0llIzXtbspCN3fYWNDifKqz63yiuKZI1WKzheUStUO_z_8u6jCQkMjSZscH3UeziYEI8HdMDAoAGH7bpQoW4iIq5_AFqSIPB6e0NVLUClGtiYQANC8k2PIBwwLmG4VOV79G_a6DeQUfu39u6WolJKBDTGe7r7Ktn6UswEKOWns8bchYFw8MiqQMfS23fl9mSzpFJcNTyFdMmz1X1JwFvcKqmu_nCsJCuNqiaFCGvB_qeaMiBOXxGMFK5DDAVEA_wl8fyfrG_kxrPBdZRg07p9pH8QFfS5-KBJbLwHSvKrLIdw4UXPS_v4czy0cS2PVJhGzaGXOaAFevR7017TmPvyjGKQ4TjTJYgEq7Ls_O1ghnbD8CgtAeJEFV45HKvjCT1-UhF3hLpjdP95LzSyIm50q-yBWaYBJ4nJB6ek9cKo7k8OkO_h-h2PO5NZ3_DpHfIA3siTS4jeSsvZSa8MThq2EVYKg_QeSuIG_lVSBazk_cBh4QnrUmybAu_6hOjWJ_53NBIeilc4xIrhI1CmhR4yEUIkSxCMGSF3AFVe6mN3bQ_ZAZABLbnAl6lwbR4RHut38NNUuR0sxH3SmIFGowXGJV-t4dSTLuDLVkOlb3n7mW3VPB9b7n-Qg9xFASo8nMZR-G9euon4wbJOmQXVaBXHtd9NRE11C_h0kYF6pNWDBvJVzsMGM-JGg8hr-9Hql8pVq_YUgj7enzzKePiKb8Tr1GC5Key19O</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://ep2.adtrafficquality.google/sodar/sodar2.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://ep2.adtrafficquality.google/sodar/sodar2/254/runner.html</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://fieltorcedor.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://fieltorcedor.com.br/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://fonts.googleapis.com/css?family=Raleway:100,300i,400,700,800,900</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://fonts.gstatic.com/s/raleway/v37/1Pt_g8zYS_SKggPNyCgSQamb1W0lwk4S4TbMDrMfIA.woff2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://fonts.gstatic.com/s/raleway/v37/1Ptug8zYS_SKggPNyC0ITw.woff2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://goo.gl/WrB5QN</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://invasaocorinthiana.com.br/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://motoristapx.com.br/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://news.google.com/publications/CAAqBwgKMNzssAsw6YfIAw?hl=pt-BR&amp;gl=BR&amp;ceid=BR%3Apt-419</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://ohaagua.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://pagead2.googlesyndication.com/getconfig/abg_config</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://pagead2.googlesyndication.com/getconfig/abg_config?client=ca-pub-4526378418580199&amp;plah=www.corinthians.com.br&amp;ama_t=adsense</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://pagead2.googlesyndication.com/pagead/ads</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://pagead2.googlesyndication.com/pagead/ads?client=ca-pub-4526378418580199&amp;output=html&amp;adk=1812271804&amp;adf=3025194257&amp;lmt=1776053849&amp;plat=3%3A16%2C4%3A16%2C9%3A134250504%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C41%3A32%2C42%3A32%2C43%3A32&amp;format=0x0&amp;url=https%3A%2F%2Fwww.corinthians.com.br%2Fhome&amp;pra=5&amp;aiof=9&amp;asro=0&amp;itsi=-1&amp;aiapmd=0.0001&amp;aiapmid=0.0001&amp;aiactd=0&amp;aicctd=0&amp;ailctd=0&amp;aimartd=4&amp;aieuf=1&amp;aicrs=1&amp;uach=WyJMaW51eCIsIiIsIiIsIiIsIiIsbnVsbCwwLG51bGwsIiIsbnVsbCwwXQ..&amp;abgtt=8&amp;dt=1776053849719&amp;bpp=16&amp;bdt=1456&amp;idt=53&amp;shv=r20260408&amp;mjsv=m202604070101&amp;ptt=9&amp;saldr=aa&amp;abxe=1&amp;eoidce=1&amp;nras=1&amp;correlator=4254310938095&amp;frm=20&amp;pv=2&amp;u_tz=0&amp;u_his=2&amp;u_h=600&amp;u_w=800&amp;u_ah=600&amp;u_aw=800&amp;u_cd=24&amp;u_sd=1&amp;dmc=8&amp;adx=-12245933&amp;ady=-12245933&amp;biw=1905&amp;bih=1065&amp;scr_x=0&amp;scr_y=0&amp;eid=95385799%2C95387625%2C95388268&amp;oid=2&amp;pvsid=6703470380199560&amp;tmod=143058240&amp;uas=0&amp;nvt=1&amp;fsapi=1&amp;fc=1920&amp;brdim=10%2C10%2C10%2C10%2C800%2C0%2C1920%2C1219%2C1920%2C1080&amp;vis=1&amp;rsz=%7C%7Cs%7C&amp;abl=NS&amp;fu=33792&amp;bc=31&amp;bz=1&amp;ifi=1&amp;uci=a!1&amp;fsb=1&amp;dtd=98</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://pagead2.googlesyndication.com/pagead/html/r20260408/r20190131/zrt_lookup_fy2021.html</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://pagead2.googlesyndication.com/pagead/managed/js/adsense/m202604070101/show_ads_impl_fy2021.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://region1.analytics.google.com/g/collect</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://region1.analytics.google.com/g/collect?v=2&amp;tid=G-8C3EK0TENH&amp;gtm=45je6481v883098796za200zb853761509zd853761509&amp;_p=1776053849560&amp;_gaz=1&amp;gcd=13l3l3l2l1l1&amp;npa=1&amp;dma_cps=a&amp;dma=1&amp;_eu=AAAAAGA&amp;are=1&amp;cid=1005370302.1776053851&amp;frm=0&amp;pscdl=noapi&amp;rcb=17&amp;sr=800x600&amp;uaa=&amp;uab=&amp;uafvl=&amp;uam=&amp;uamb=0&amp;uap=Linux&amp;uapv=&amp;uaw=0&amp;ul=en-us&amp;_s=1&amp;tag_exp=0~115616986~115938465~115938468~118012007&amp;sid=1776053851&amp;sct=1&amp;seg=0&amp;dl=https%3A%2F%2Fwww.corinthians.com.br%2Fhome&amp;dt=Corinthians%20%7C%20Site%20Oficial%20%7C%20%C3%9Altimas%20not%C3%ADcias%2C%20resultados%20e%20pr%C3%B3ximos%20jogos.&amp;en=page_view&amp;_fv=1&amp;_nsi=1&amp;_ss=1&amp;_ee=1&amp;tfd=4786</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://region1.analytics.google.com/g/collect?v=2&amp;tid=G-X1DTEWMFLB&amp;gtm=45je6481v9134490687za20gzd853761509&amp;_p=1776053849560&amp;_gaz=1&amp;gcd=13l3l3l2l1l1&amp;npa=1&amp;dma_cps=a&amp;dma=1&amp;_eu=EAAIAGA&amp;are=1&amp;cid=1005370302.1776053851&amp;frm=0&amp;ir=1&amp;pscdl=noapi&amp;rcb=9&amp;sr=800x600&amp;uaa=&amp;uab=&amp;uafvl=&amp;uam=&amp;uamb=0&amp;uap=Linux&amp;uapv=&amp;uaw=0&amp;ul=en-us&amp;_s=1&amp;tag_exp=0~115616985~115938465~115938469~118131809&amp;sid=1776053851&amp;sct=1&amp;seg=0&amp;dl=https%3A%2F%2Fwww.corinthians.com.br%2Fhome&amp;dt=Corinthians%20%7C%20Site%20Oficial%20%7C%20%C3%9Altimas%20not%C3%ADcias%2C%20resultados%20e%20pr%C3%B3ximos%20jogos.&amp;en=page_view&amp;_fv=1&amp;_ss=1&amp;tfd=4962</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://securepubads.g.doubleclick.net/pagead/managed/dict/m202604090101/gpt</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202604070101/pubads_impl.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://soccergrass.com.br/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/files/assets/dist/css/libs.min.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/files/assets/dist/js/libs.min.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/files/assets/dist/js/main.min.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/files/assets/fonts/fontawesome-pro-5.15.4/css/all.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/files/assets/fonts/fontawesome-pro-5.15.4/webfonts/fa-brands-400.woff2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/files/assets/fonts/fontawesome-pro-5.15.4/webfonts/fa-solid-900.woff2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/files/assets/js/cookies.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/files/assets/svg/facebook.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/files/assets/svg/instagram.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/files/assets/svg/youtube.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/Broto_Legal.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/Ezze-v2.jpg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/PX-v2.jpg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/bmg.jpg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/brahma_preto.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/calendario-cropped.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/corinthians-tv-32x32.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/corinthians_tv-cropped.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/efootball_H_preto.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/escudos/SCCP_escudo-150px.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/esportes_da_sorte_preto_v.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/frimesa_preto_site.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/google-news-symbol.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icon-linkedin.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones-modalidades/asa-delta.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones-modalidades/basquete-cadeirante.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones-modalidades/basquete.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones-modalidades/beach-soccer-futsal.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones-modalidades/bocha.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones-modalidades/boxe.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones-modalidades/corre.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones-modalidades/fut-amputados.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones-modalidades/fut-mesa.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones-modalidades/futebol-americano.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones-modalidades/futsal-feminino.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones-modalidades/handebol.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones-modalidades/mma.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones-modalidades/natacao-esportes-aquaticos-triatlon.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones-modalidades/peteca.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones-modalidades/rally.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones-modalidades/remo.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones-modalidades/skate.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones-modalidades/tamboreu.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones-modalidades/tenis.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones-modalidades/volei.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones-modalidades/xadrez.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones/Logo_neo_quimica_arena_vert_branco.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones/chuteinicial.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones/logo-fieltorcedor-2023-P.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones/search-icon.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/icones/usccp_H_dourado.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/logo-oh-agua-v2.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/logo_BYD.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/logo_ava_preta_em_alta.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/matrix_logo_preto.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/nike.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/soccer_grass_preto.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/thinkers.jpg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/tiktok/footer.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/tiktok/header48x48.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/twitter-x-v2.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/uol-30anos.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/whatsapp_icone.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/img/ze_delivery_preto_new.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/0bf2db855b6f804a1f19ed7deb759c12.jpg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/161408807545fdece2c532a6bc15b110753af17449.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/1645214963e152e282bf41bde2251ea0d5fd9f329a.jpeg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/16b72940c3bc37d30f4468b09673dfe5.jpg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/16zQmaAt/17753226892b838259c99f429ac6e659a76b59fd30.jpg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/17460237851bf90d4a02ed90d2a2abc1acd236e2e2.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/17460241684f74897fa0265ad89cfa30735a749285.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/17460242974c9178c498c5b0dd9d15d1b92bfdcca7.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/1746024344b751c6fabf80fb7b15a37db8379264a7.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/1746024400fcf5eb5b11d3adc30c7258a49076d58e.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/17460246091dcfb616a81ab903e262a8df840d581a.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/174602474203faf90b8ef5ed5b04ed826fdadef9a9.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/1746024875295917b50b77e1a1539c9ad57a7a59b6.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/1746024956f8205b8766c8002f073b40955d999dd6.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/17460249976f3b2755d224d99e8f36a37690812793.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/17460250576d03a7143104797ceb72a8c354f55c47.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/174602515030588d486e7f64ccfa22798722300d15.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/17460252157791624d60ee279dcd406d157a407625.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/17460253095eb4ceaac5b5793f989be1ec24dbc705.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/174602536121e5742c1276d3c9f3b8533f688645aa.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/1746025475cef1c3780f89c8f680755acb33beb8cc.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/1746025501b5ca6edba1907b34c8f6a85b3ac2ce47.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/17551817875bb7476d68fa61002a9a3d4a03cd1000.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/1768228514ae389c5ee4457ab6e70ee6d1539af9ac.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/1768229435f591a530a4d4f283e997a77f4267ab86.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/17682304801986bdb20eb1d7fbf171a3e4ac7c7356.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/1768230579fb1d229119148890514b1bc80971064e.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/1768313432f1a6948a3a18a163ff6be6aeb09d14a8.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/1768313494d467358575b1f761af3f3c8a2b1fe4a3.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/176840182873e4030d6ed947bec8dbf16544bdd865.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/176859931944bb14c1b0cb35a90cfba21ebe7854d1.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/1768833423a666c393855f435b327f755c06da9dd8.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/17688336421cfa486ccbda4751cb279fad71831111.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/176970759222da81b12e681abf6442625bb861ec3e.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/1770837339da732ffcca1505e2ce5ae21c96533485.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/177083736365a5736bc1c5fbcbc27cee280ab336bb.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/177090814516f102c8aeb8c4b40d12b7fd6ddc31a7.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/1772721025f19d68211b41e2a2bd75e76e5ffe8ece.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/17740258782dc6bd30a2d1c0ed10dc6a292fbaf57c.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/17740262266c35a732a622449b7721a98d82c0ff32.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/17740522234bf38d4a8563148936213042fa7b8b8a.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/17740523368609e29abd18cc25c6888a5ccb7786e5.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/17744514275132dee22833d5b8605773bf6b7e955f.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/1c2f2d8079ce8b41954cddf027e70b09.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/273124fbececb8d4536076490d74cca2.jpg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/33b29995c9858c9ba97a9aa0bdb27210.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/38BpxE1j/1774562981891d1d79b0487b6e4e289371b8e032f9.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/467b3372de7b63976185f2b846125a99.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/7CnTktmI/18365a3e0b47913d27de23daf2cd4d60.jpg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/8d491473e6019321af84866baf8f2b72.jpg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/9798c1e3f7debf7ebb0a7c2f0ec3dc9b.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/F3kvE8PS/site_header_desktop.jpg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/JxdlNTQn/WhatsApp-Image-2026-04-02-at-14_46_27.jpeg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/Li3FA9wG/17719390070753025ebdd7f06fd2e85eef2fd20c88.jpg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/M8r1OcwW/565A2501-1_JPG.jpeg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/RLHFxXN1/2777d83a5b8709c52e129338999cd5f9.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/SlIeN9f2/Header_Sabotage_1920x505.jpg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/UJEYKfFH/177587941852173e87401fcfcf7462af1b9297a4a2.jpeg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/V5RNUQSO/17759151686181e2c168be1130ea88270b96f70fde.jpeg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/YbZ6UdVL/1776037064c6eec6c2d1b8dd7edeb9bfb9b8bc4560.jpg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/YbocNHng/45dfc2b266afe590e322ec8b7ae6e364.jpg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/bltPuL5c/site_desktop_ingressos.jpg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/cb4751f83d79a9e5fa8ea897a5ebd251.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/dgMFJlwm/17760509948d3b927bbdb3bdfd7a0816e13c673ea0.JPEG</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/dynWFRUv/17756601360331ba18ce7a4e6eaa08ef556b36336d.jpg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/ePSyQplv/1920x100_banner_rodape_site.jpg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/hzcObw2U/17760497146472f8b874b4be6bc98d6ca0a3b866db.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/jSlDNg2w/C_I_-NQA---Header-Desktop.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/pzDqnrJ9/17759533901db8ae2cf7cfd0cde36288403b5c993e.jpeg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/sMgc0ovy/226A3475.jpg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/trand908/17751538806d2097d4a2733388f737924613008ee3.jpeg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://static.corinthians.com.br/uploads/yOR2zwS4/DESK.jpeg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://stats.g.doubleclick.net/g/collect?v=2&amp;tid=G-8C3EK0TENH&amp;cid=1005370302.1776053851&amp;gtm=45je6481v883098796za200zb853761509zd853761509&amp;rcb=17&amp;aip=1&amp;dma=1&amp;dma_cps=a&amp;gcd=13l3l3l2l1l1&amp;npa=1&amp;frm=0&amp;tag_exp=0~115616986~115938465~115938468~118012007</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://stats.g.doubleclick.net/g/collect?v=2&amp;tid=G-X1DTEWMFLB&amp;cid=1005370302.1776053851&amp;gtm=45je6481v9134490687za20gzd853761509&amp;rcb=9&amp;aip=1&amp;dma=1&amp;dma_cps=a&amp;gcd=13l3l3l2l1l1&amp;npa=1&amp;frm=0&amp;tag_exp=0~115616985~115938465~115938469~118131809</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://twitter.com/corinthians</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://whatsapp.com/channel/0029VaCskai4SpkH0Ja2ss2E</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.bancobmg.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.brahma.com.br/pt-br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.byd.com/br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/ads/pageview</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/ads?size=large&amp;block=Home%20-%20Central%20(Horizontal)</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/ads?size=large&amp;block=Home%20-%20Inferior%20(Horizontal)</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/ads?size=large&amp;block=Home%20-%20Superior%20(Horizontal)</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/apoiocultural</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/app</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/assets/css/ads.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/assets/css/style.min.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/assets/js/ads.js?rand=3249514739</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/calendario</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/calendario-feminino</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/contatos</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/departamento-cultural</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/departamento-social</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/espaco-kids</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/esportes-aquaticos</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/esportes-terrestres</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/fiel-movel</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/historia</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/identidade</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/associativas/arremesso-inicial</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/associativas/basquete-master</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/associativas/beach-tennis</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/associativas/bocha</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/associativas/candinde</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/associativas/chute-inicial</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/associativas/cifac</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/associativas/corre-corinthians</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/associativas/esportes-aquaticos</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/associativas/futebol-de-mesa</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/associativas/futebol-futsal-feminino</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/associativas/futebol-society</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/associativas/futevolei</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/associativas/futsal</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/associativas/hand-inicial</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/associativas/handebol-feminino-master</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/associativas/jiu-jitsu</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/associativas/judo</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/associativas/peteca</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/associativas/skate</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/associativas/taekwondo</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/associativas/tamboreu</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/associativas/tenis</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/associativas/toque-inicial</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/associativas/volei-master</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/competitivas/asa-delta</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/competitivas/basquete</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/competitivas/basquete-feminino</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/competitivas/beach-soccer</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/competitivas/bocha</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/competitivas/boxe</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/competitivas/footgolf</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/competitivas/futebol-americano</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/competitivas/futebol-society</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/competitivas/futsal</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/competitivas/futsal-feminino-tiger</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/competitivas/handebol</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/competitivas/mma</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/competitivas/natacao</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/competitivas/rally</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/competitivas/remo</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/competitivas/skate</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/competitivas/surf</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/competitivas/volei</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/competitivas/xadrez</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/para-desporto/basquete-cadeirante</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/para-desporto/futebol-de-7</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/para-desporto/futebol-de-amputados</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/para-desporto/triatlon-para-desportivo</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/paradesporto/basquete-cadeirante</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/paradesporto/futebol-amputados</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/paradesporto/futebol-de-7</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/modalidades/paradesporto/triatlon-paradesportivo</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/responsabilidade-social</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/salao-nobre</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/sede-social</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/skate-park</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/teatro-corinthians</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/titulos</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/anticorrupcao</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/assembleias</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/calendario-2023</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/calendario-2024</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/cartilha-do-torcedor</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/codigo-de-conduta</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/compras</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/conselho-deliberativo</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/conselho-fiscal</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/conselhos</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/cori</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/demonstracoes-financeiras-e-balancetes-patrimoniais</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/documentos-gerais</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/eleicoes</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/estatutos</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/missao-visao-e-valores</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/negocios</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/orcamentos</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/ouvidoria</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/posicoes-do-endividamento</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/presidencia-e-diretoria</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/projetos-incentivados</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/protecao-de-dados</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/rce</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/regimentos</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/transparencia/responsabilidade-social</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/clube/visitas</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/corinthianslojasoficiais</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/coworking</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/departamento-de-futebol-profissional</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/departamento-medico</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol-feminino-corinthians-domina-o-america-e-goleia-equipe-mexicana-por-8-a-0</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/feminino/elenco</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/feminino/estrutura</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/formacao-de-atletas/calendario</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/formacao-de-atletas/estrutura</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/formacao-de-atletas/sobre</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/formacao-de-atletas/sub-20</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Allan</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/André</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Breno</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Charles</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Dieguinho</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Fabrizio</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Felipe</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Gabriel</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Gui</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Gustavo</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Hugo</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/João</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Kaio</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Kauê</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Kayke</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Labyad</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Lingard</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Luiz</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Matheus</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Matheuzinho</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Memphis</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Pedro</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Raniele</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Rodrigo</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Vitinho</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/elenco/Yuri</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/futebol/profissional/estrutura</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/home</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/imprensa/contato</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/imprensa/credenciamento</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/licenciamento</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/memorialcorinthians</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/nota-oficial-13-04-2026</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/noticias</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/noticias/futebol</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/noticias/futebol+feminino</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/parquesaojorge</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/pelo-campeonato-paulista-sub-11-e-sub-12-vencem-uniao-suzano-na-fazendinha</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/peneiras-2024</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/portal-do-associado</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/search</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/vagas</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.esm.com.br/assets/img/logo-esm-neg.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.esportesdasorte.com/ptb/bet/main</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.ezzeseguros.com.br/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/corinthians</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/privacy_sandbox/pixel/register/trigger/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/privacy_sandbox/pixel/register/trigger/?id=550840126185095&amp;ev=PageView&amp;dl=https%3A%2F%2Fwww.corinthians.com.br%2Fhome&amp;rl=&amp;if=false&amp;ts=1776053849901&amp;sw=800&amp;sh=600&amp;v=2.9.297&amp;r=stable&amp;ec=0&amp;o=4126&amp;fbp=fb.2.1776053849893.975285913328889606&amp;cs_est=true&amp;ler=empty&amp;cdl=API_unavailable&amp;pmd[title]=Corinthians%20%7C%20Site%20Oficial%20%7C%20%C3%9Altimas%20not%C3%ADcias%2C%20resultados%20e%20pr%C3%B3ximos%20jogos.&amp;pmd[locale]=pt_BR&amp;pmd[description]=%C3%9Altimas%20not%C3%ADcias%20do%20Corinthians%2C%20jogos%2C%20resultados%2C%20escala%C3%A7%C3%A3o%2C%20fotos%20de%20treinos%2C%20futebol%20feminino%2C%20Neo%20Qu%C3%ADmica%20Arena%2C%20Fiel%20Torcedor%2C%20basquete%2C%20futsal%2C%20nata%C3%A7%C3%A3o%2C%20eSports%20do%20Tim%C3%A3o.&amp;it=1776053849686&amp;coo=false&amp;expv2[0]=pl1&amp;expv2[1]=el3&amp;expv2[2]=bc1&amp;expv2[3]=ra2&amp;expv2[4]=rp2&amp;expv2[5]=im0&amp;expv2[6]=hf1&amp;rqm=FGET</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/tr/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/tr/?id=550840126185095&amp;ev=PageView&amp;dl=https%3A%2F%2Fwww.corinthians.com.br%2Fhome&amp;rl=&amp;if=false&amp;ts=1776053849901&amp;sw=800&amp;sh=600&amp;v=2.9.297&amp;r=stable&amp;ec=0&amp;o=4126&amp;fbp=fb.2.1776053849893.975285913328889606&amp;cs_est=true&amp;ler=empty&amp;cdl=API_unavailable&amp;pmd[title]=Corinthians%20%7C%20Site%20Oficial%20%7C%20%C3%9Altimas%20not%C3%ADcias%2C%20resultados%20e%20pr%C3%B3ximos%20jogos.&amp;pmd[locale]=pt_BR&amp;pmd[description]=%C3%9Altimas%20not%C3%ADcias%20do%20Corinthians%2C%20jogos%2C%20resultados%2C%20escala%C3%A7%C3%A3o%2C%20fotos%20de%20treinos%2C%20futebol%20feminino%2C%20Neo%20Qu%C3%ADmica%20Arena%2C%20Fiel%20Torcedor%2C%20basquete%2C%20futsal%2C%20nata%C3%A7%C3%A3o%2C%20eSports%20do%20Tim%C3%A3o.&amp;it=1776053849686&amp;coo=false&amp;expv2[0]=pl1&amp;expv2[1]=el3&amp;expv2[2]=bc1&amp;expv2[3]=ra2&amp;expv2[4]=rp2&amp;expv2[5]=im0&amp;expv2[6]=hf1&amp;rqm=GET</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.frimesa.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.google-analytics.com/analytics.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.google.de/ads/ga-audiences?v=1&amp;t=sr&amp;slf_rd=1&amp;_r=4&amp;tid=G-8C3EK0TENH&amp;cid=1005370302.1776053851&amp;gtm=45je6481v883098796za200zb853761509zd853761509&amp;rcb=17&amp;aip=1&amp;dma=1&amp;dma_cps=a&amp;gcd=13l3l3l2l1l1&amp;npa=1&amp;frm=0&amp;tag_exp=0~115616986~115938465~115938468~118012007&amp;z=30113662</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.google.de/ads/ga-audiences?v=1&amp;t=sr&amp;slf_rd=1&amp;_r=4&amp;tid=G-X1DTEWMFLB&amp;cid=1005370302.1776053851&amp;gtm=45je6481v9134490687za20gzd853761509&amp;rcb=9&amp;aip=1&amp;dma=1&amp;dma_cps=a&amp;gcd=13l3l3l2l1l1&amp;npa=1&amp;frm=0&amp;tag_exp=0~115616985~115938465~115938469~118131809&amp;z=1559611831</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.googletagmanager.com/gtag/js?id=G-8C3EK0TENH</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.googletagmanager.com/gtag/js?id=G-8C3EK0TENH&amp;cx=c&amp;gtm=4e6481</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.googletagmanager.com/gtag/js?id=G-X1DTEWMFLB&amp;cx=c&amp;gtm=4e6481</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.googletagmanager.com/gtag/js?id=UA-2341771-5&amp;cx=c&amp;gtm=4e6481</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.googletagmanager.com/gtag/js?id=UA-2341771-58&amp;cx=c&amp;gtm=4e6481</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.googletagmanager.com/gtag/js?id=UA-2341771-60&amp;cx=c&amp;gtm=4e6481</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.googletagmanager.com/gtm.js?id=GTM-MG97L9K</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.googletagservices.com/tag/js/gpt.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.instagram.com/corinthians/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.instagram.com/thinkersmgmt/?hl=pt-br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.konami.com/efootball/pt-br/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.linkedin.com/company/sccorinthians</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.matrixfitness.com/br/ptb</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.neoquimicaarena.com.br/ingressos/termos-e-condicoes</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.nike.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.tiktok.com/@corinthians</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.uol.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.urbano.com.br/home</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.youtube.com/@corinthians</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.youtube.com/corinthians</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.youtube.com/iframe_api</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.youtube.com/s/player/8a6e7bc4/www-widgetapi.vflset/www-widgetapi.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.ze.delivery/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.corinthians.com.br/home&amp;dt=Corinthians</url>
              <origin>URL_RENDER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.corinthians.com.br/home&amp;pra=5&amp;aiof=9&amp;asro=0&amp;itsi=-1&amp;aiapmd=0.0001&amp;aiapmid=0.0001&amp;aiactd=0&amp;aicctd=0&amp;ailctd=0&amp;aimartd=4&amp;aieuf=1&amp;aicrs=1&amp;uach=WyJMaW51eCIsIiIsIiIsIiIsIiIsbnVsbCwwLG51bGwsIiIsbnVsbCwwXQ..&amp;abgtt=8&amp;dt=1776053849719&amp;bpp=16&amp;bdt=1456&amp;idt=53&amp;shv=r20260408&amp;mjsv=m202604070101&amp;ptt=9&amp;saldr=aa&amp;abxe=1&amp;eoidce=1&amp;nras=1&amp;correlator=4254310938095&amp;frm=20&amp;pv=2&amp;u_tz=0&amp;u_his=2&amp;u_h=600&amp;u_w=800&amp;u_ah=600&amp;u_aw=800&amp;u_cd=24&amp;u_sd=1&amp;dmc=8&amp;adx=-12245933&amp;ady=-12245933&amp;biw=1905&amp;bih=1065&amp;scr_x=0&amp;scr_y=0&amp;eid=95385799,95387625,95388268&amp;oid=2&amp;pvsid=6703470380199560&amp;tmod=143058240&amp;uas=0&amp;nvt=1&amp;fsapi=1&amp;fc=1920&amp;brdim=10,10,10,10,800,0,1920,1219,1920,1080&amp;vis=1&amp;rsz</url>
              <origin>URL_RENDER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.corinthians.com.br/home&amp;rl=&amp;if=false&amp;ts=1776053849901&amp;sw=800&amp;sh=600&amp;v=2.9.297&amp;r=stable&amp;ec=0&amp;o=4126&amp;fbp=fb.2.1776053849893.975285913328889606&amp;cs_est=true&amp;ler=empty&amp;cdl=API_unavailable&amp;pmd</url>
              <origin>URL_RENDER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>www.corinthians.com.br</url>
              <origin>URL_RENDER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>Https://corinthians.com.br</url>
              <origin>INPUT_FILE</origin>
            </value>
          </urls>
          <domains>
            <value>
              <url>agencia.corinthians.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>avacr7.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>cadastro.corinthians.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>censodotimao.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>chuteinicial.corinthians.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>code.jquery.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>connect.facebook.net</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>corinthians-tv.s3.sa-east-1.amazonaws.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>corinthians.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>ep1.adtrafficquality.google</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>ep2.adtrafficquality.google</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>fieltorcedor.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>fonts.googleapis.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>fonts.gstatic.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>goo.gl</url>
              <origin>URL_RENDER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>invasaocorinthiana.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>motoristapx.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>news.google.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>ohaagua.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>ouvidoria.corinthians.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>pagead2.googlesyndication.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>region1.analytics.google.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>securepubads.g.doubleclick.net</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>soccergrass.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>static.corinthians.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>stats.g.doubleclick.net</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>twitter.com</url>
              <origin>URL_RENDER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>whatsapp.com</url>
              <origin>URL_RENDER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>www.bancobmg.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.brahma.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.byd.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.corinthians.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.esm.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.esportesdasorte.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.ezzeseguros.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.facebook.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.frimesa.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.google-analytics.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.google.de</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.googletagmanager.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.googletagservices.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.instagram.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.konami.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.linkedin.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.matrixfitness.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.neoquimicaarena.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.nike.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.tiktok.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.uol.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.urbano.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.youtube.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.ze.delivery</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>code.jquery.com</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>corinthians.com.br</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>googletagmanager.com</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>googletagservices.com</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>pagead2.googlesyndication.com</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>static.corinthians.com.br</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </domains>
          <ips>
            <value>
              <ip>13.33.187.87</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>142.251.110.94</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>142.251.127.132</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>142.251.127.154</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>142.251.127.157</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>142.251.13.155</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>142.251.13.95</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>142.251.14.102</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>142.251.14.155</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>142.251.20.94</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>142.251.20.97</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>151.101.66.137</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>157.240.253.1</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>157.240.253.35</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>192.178.183.93</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>216.239.34.36</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>3.5.234.135</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>54.94.99.208</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>13.33.187.99</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>13.33.187.115</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>151.101.194.137</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>142.251.13.154</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>142.250.154.97</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>151.101.194.137</ip>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>13.33.187.99</ip>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>142.250.154.97</ip>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>142.251.13.154</ip>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>13.33.187.115</ip>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>7c5fda4188f3c811d6b0a9438c8b03957a1fc80dcd1d6f4cf8317833282851eb</SHA-256>
              <SHA-1>50206d29d869222723bb4e15ffb0df32ee695948</SHA-1>
              <MD5>cfd24b96019aab5cfdc6bcef4bcf1cfb</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <SHA-256>e8f2ded5d74c0ee5f427a20b6715e65bc79ed5c4fc67fb00d89005515c8efe63</SHA-256>
              <SHA-1>ae56ea57c52d1153cec33cef91cf935d2d3af14d</SHA-1>
              <MD5>fbe36eb2eecf1b90451a3a72701e49d2</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>4eaa4bad400a8561afeca18c1bf104888f55207276880c5d92611781fb5d01c4</SHA-256>
              <SHA-1>64cf2263b78065b3d2b5229990821de3c5aaaf88</SHA-1>
              <MD5>9e8d1abaaadbaaee7f5ddb81f5f53240</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>e8ad7f7dbe5b399089f2c79ed7a6ac082d54d027184649d37b1bfdebfb55a2a6</SHA-256>
              <SHA-1>776a3a3c3927864568da93fc17aac79812f94f29</SHA-1>
              <MD5>421d4a6f7786c82128f5e70d9a264eea</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>b80fff40bfbfcd2bab9fec4318a3b859aa2b6b0c6218c3515be94d8a9360a9dc</SHA-256>
              <SHA-1>f77ed870adbf3593f6a5b34a33695b4bfb4e4c17</SHA-1>
              <MD5>3224b9f76c08733753d79b6911538065</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>0f7fec0aae16b6d5adf48a5353ac3e6cc02de224db5cf0d69f3c003d93b0db60</SHA-256>
              <SHA-1>36ebd65375f1b489c0f0055804e97f4b3316d108</SHA-1>
              <MD5>0bbdfbe9014272b5b946e5f9ef2bac06</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <SHA-256>df1367a1ec8f818a446c467e2ce450ac23da2e62acd508682c5b14aa97261fad</SHA-256>
              <SHA-1>ea9ec9680ac2e90bae4f5ead44a757ee3625d8ea</SHA-1>
              <MD5>a61d6add784a00d58b28a431272ccaa7</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/javascript</file_type>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <SHA-256>1d9ceceff84b8b9650da5cf9cfa8cea307125ab1f669ebf65dfe3d50ce05b82d</SHA-256>
              <SHA-1>44e695b6e0f6ffa7df45924cd2ac6aa38a119da8</SHA-1>
              <MD5>6d607a0193c1b3b20a3cff107bfcd894</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/javascript</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
          </files>
        </iocs>
        <name>Https://corinthians.com.br</name>
        <report_id>e0f9a746-82fd-4e30-893e-db032e1801a0</report_id>
        <tags>
          <value>html</value>
          <value>javascript</value>
          <value>obfuscated</value>
          <value>soft-404</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>16938ba109b3ef1e5fd45a53ae36c3418c2127f9576064db86a6c9ea9e82a70d</id>
    <title>Analysis Report for 16938ba109b3ef1e5fd45a53ae36c3418c2127f9576064db86a6c9ea9e82a70d</title>
    <updated>2026-04-13T04:16:22Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6e2480678438b878af3c</_id>
        <file_type>text/plain</file_type>
        <flow_id>69dc6e155ea31bc68a24b375</flow_id>
        <hash>16938ba109b3ef1e5fd45a53ae36c3418c2127f9576064db86a6c9ea9e82a70d</hash>
        <iocs>
          <urls>
            <value>
              <url>https://www.luenkei.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </urls>
        </iocs>
        <name>hxxps://www.luenkei.com</name>
        <report_id>0521de03-47ab-4a87-92b7-b454257aa023</report_id>
        <tags>
          <value>txt</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>6e4b0e23b42f7e7899284a2cb92c801e92f9a00024e3e81cb2c90ed191f88d67</id>
    <title>Analysis Report for 6e4b0e23b42f7e7899284a2cb92c801e92f9a00024e3e81cb2c90ed191f88d67</title>
    <updated>2026-04-13T04:16:04Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6e1b80678438b878af3a</_id>
        <file_type>application/java-archive</file_type>
        <flow_id>69dc6e02799d5bf325fa7625</flow_id>
        <hash>6e4b0e23b42f7e7899284a2cb92c801e92f9a00024e3e81cb2c90ed191f88d67</hash>
        <iocs>
          <uuids>
            <value>
              <uuid>ef6b8d37-34c5-4124-93ce-be98b61f2504</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
          </uuids>
        </iocs>
        <name>KryptonPlus-Windows-86x-n0wyyy.jar</name>
        <report_id>86c8b825-44f2-4727-a73a-2a22ba1c14f6</report_id>
        <tags>
          <value>java</value>
          <value>anti-debug</value>
          <value>obfuscated</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>820e84c81f0eadd168961c4764749ff68ba7de2aa4971a3012c87ffa9f2e8ae2</id>
    <title>Analysis Report for 820e84c81f0eadd168961c4764749ff68ba7de2aa4971a3012c87ffa9f2e8ae2</title>
    <updated>2026-04-13T04:14:22Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6db680678438b878af26</_id>
        <file_type>application/x-executable</file_type>
        <flow_id>69dc6d9c799d5bf325fa758a</flow_id>
        <hash>820e84c81f0eadd168961c4764749ff68ba7de2aa4971a3012c87ffa9f2e8ae2</hash>
        <iocs>
          <ips>
            <value>
              <ip>83.168.110.191</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
        </iocs>
        <name>iran.arc.elf</name>
        <report_id>dc79e41a-c7e2-4b5c-a6af-995ba93e476a</report_id>
        <tags>
          <value>elf</value>
          <value>mirai</value>
          <value>masquerade</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>9f4e7afff57e23400fb1a589739d0209e9fad3371eb0435dc85826c4293bb758</id>
    <title>Analysis Report for 9f4e7afff57e23400fb1a589739d0209e9fad3371eb0435dc85826c4293bb758</title>
    <updated>2026-04-13T04:11:46Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6d1a3040601e24ad5f9e</_id>
        <file_type>application/x-dosexec</file_type>
        <flow_id>69dc6cfe799d5bf325fa748c</flow_id>
        <hash>9f4e7afff57e23400fb1a589739d0209e9fad3371eb0435dc85826c4293bb758</hash>
        <iocs>
          <urls>
            <value>
              <url>http://crl.comodoca.com/AAACertificateServices.crl04</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://s.symcb.com/universal-root.crl0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://schemas.microsoft.com/SMI/2016/WindowsSettings</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://d.symcb.com/cps0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://d.symcb.com/rpa0.</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://d.symcb.com/rpa0@</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://sectigo.com/CPS0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>crl.comodoca.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>crl.sectigo.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>crt.sectigo.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>d.symcb.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>s.symcb.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>schemas.microsoft.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>sectigo.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>ts-aia.ws.symantec.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>ts-crl.ws.symantec.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>6.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>104.18.38.233</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>23.11.41.157</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>13.107.253.45</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>13.56.82.130</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>91.199.212.90</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>104.18.38.233</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>13.56.82.130</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>23.11.41.157</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>13.107.253.45</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>91.199.212.90</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>375c5c40e74d3cd57204737c700b9f4b33f684e1d4180234aff194893841ccf9</SHA-256>
              <SHA-1>3ac7745f9ae0e72c6ccc957f76d20edbe7a1ab05</SHA-1>
              <MD5>fd48e3305a2c6d49f825fd3741bb1b43</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>62fb544987a73ec859163052fa522f5779c3d4ce01e6bd5e089a0a84147071a2</SHA-256>
              <SHA-1>3e6808eb7965bd33919857148abd5a197437905e</SHA-1>
              <MD5>66fcddfcc1fdb50065ee257d266de26a</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/zlib</file_type>
            </value>
            <value>
              <SHA-256>abf8f2022f12f350789d961aceaf9ccfd53e7ec58d8c9934cfce77779b4eac11</SHA-256>
              <SHA-1>5f8991f3e065fd95614859a293f88b9c70e4bb23</SHA-1>
              <MD5>84da8dee6b319ea0b10b6de5489c6aae</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>2acab1228e8935d5dfdd1756b8a19698b6c8b786c90f87993ce9799a67a96e4e</SHA-256>
              <SHA-1>80c9820ff2efe8aa3d361df7011ae6eee35ec4f0</SHA-1>
              <MD5>4842e206e4cfff2954901467ad54169e</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>application/octet-stream</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <SHA-256>64813e4fe9821119332723c561e5a4d20deee5ac02b55a11a784fd8db450f458</SHA-256>
              <SHA-1>ca832bb8b3926ffe0264dc98dfa1974c8f63dac4</SHA-1>
              <MD5>08ec56db1e660905e10de92983b28c8a</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
          <uuids>
            <value>
              <uuid>1f676c76-80e1-4239-95bb-83d0f6d0da78</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>35138b9a-5d96-4fbd-8e2d-a2440225f93a</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>e2011457-1546-43c5-a5fe-008deee3d3f0</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
        </iocs>
        <name>x9f4e7afff57e23400fb1a589739d0209e9fad3371eb0435dc85826c4293bb758.exe</name>
        <report_id>51f68b0a-53f5-4898-9ff9-a194ac21e96e</report_id>
        <tags>
          <value>peexe</value>
          <value>html</value>
          <value>data</value>
          <value>blank</value>
          <value>python</value>
          <value>redcap</value>
          <value>virus</value>
          <value>packed</value>
          <value>overlay</value>
          <value>anti-debug</value>
          <value>hacktool</value>
          <value>expand</value>
          <value>expired-cert</value>
          <value>lolbin</value>
          <value>microsoft_visual_cc</value>
          <value>pyinstaller</value>
          <value>invalid-signature</value>
          <value>signed</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>6d87dfe041cd0babbd6cb82fefcc49bdf1682edb38b7d383ee503219df58df30</id>
    <title>Analysis Report for 6d87dfe041cd0babbd6cb82fefcc49bdf1682edb38b7d383ee503219df58df30</title>
    <updated>2026-04-13T04:11:15Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6cfc80678438b878af04</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc6ce0799d5bf325fa7454</flow_id>
        <hash>6d87dfe041cd0babbd6cb82fefcc49bdf1682edb38b7d383ee503219df58df30</hash>
        <iocs/>
        <name>x6d87dfe041cd0babbd6cb82fefcc49bdf1682edb38b7d383ee503219df58df30.exe</name>
        <report_id>e60d78d9-7611-48d4-9580-0c3f6fe4940e</report_id>
        <tags>
          <value>peexe</value>
          <value>crypt</value>
          <value>salatstealer</value>
          <value>unsafe</value>
          <value>xpack</value>
          <value>packed</value>
          <value>anti-vm</value>
          <value>stealer</value>
          <value>crypto</value>
          <value>obfuscated</value>
          <value>golang</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>9c979ff36b9092368ef5973cb4ba5dc30a3fbdaf07814ed6d8e760c0bb0aa98d</id>
    <title>Analysis Report for 9c979ff36b9092368ef5973cb4ba5dc30a3fbdaf07814ed6d8e760c0bb0aa98d</title>
    <updated>2026-04-13T04:10:36Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6cd580678438b878aefc</_id>
        <file_type>application/x-executable</file_type>
        <flow_id>69dc6cb95ea31bc68a24b088</flow_id>
        <hash>9c979ff36b9092368ef5973cb4ba5dc30a3fbdaf07814ed6d8e760c0bb0aa98d</hash>
        <iocs>
          <ips>
            <value>
              <ip>83.168.110.191</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
        </iocs>
        <name>iran.x86_64.elf</name>
        <report_id>09c2fc8b-41c6-4c6c-a501-0cb8d81797fa</report_id>
        <tags>
          <value>elf</value>
          <value>mirai</value>
          <value>similar-threat</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>0645d9cf5e5c37148675722dfa0228659bbbff0c97dbac13eb1f63bb7c843084</id>
    <title>Analysis Report for 0645d9cf5e5c37148675722dfa0228659bbbff0c97dbac13eb1f63bb7c843084</title>
    <updated>2026-04-13T04:10:17Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6cc680678438b878aef7</_id>
        <file_type>text/html</file_type>
        <flow_id>69dc6ca85ea31bc68a24b064</flow_id>
        <hash>0645d9cf5e5c37148675722dfa0228659bbbff0c97dbac13eb1f63bb7c843084</hash>
        <iocs>
          <urls>
            <value>
              <url>https://girlstele.org/</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://cdn.jsdelivr.net/npm/@fortawesome/fontawesome-free@6.5.1/css/all.min.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://cdn.jsdelivr.net/npm/@fortawesome/fontawesome-free@6.5.1/webfonts/fa-solid-900.woff2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://cdn.jsdelivr.net/npm/bootstrap@4.6.2/dist/css/bootstrap.min.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://cdn.jsdelivr.net/npm/bootstrap@4.6.2/dist/js/bootstrap.min.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://cdn.jsdelivr.net/npm/jquery@3.7.1/dist/jquery.slim.min.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://cdn.jsdelivr.net/npm/popper.js@1.16.1/dist/umd/popper.min.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://cdn.jsdelivr.net/npm/swiper@11/swiper-bundle.min.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://cdn.jsdelivr.net/npm/swiper@11/swiper-bundle.min.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/#</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/?lang=en</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/?lang=ja</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/?lang=vi</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/?lang=zh_TW</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/categories</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/categories/bdsm</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/categories/chinese-subtitle</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/categories/group-sex</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/categories/insult</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/categories/lesbian</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/categories/pantyhose</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/categories/pov</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/categories/private-cam</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/categories/roleplay</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/categories/sex-only</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/categories/test</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/categories/uniform</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/cdn-cgi/challenge-platform/h/g/jsd/oneshot/b0a7532ac8ec/0.7992019116858529:1776049718:43jheXab4LELZ_X1otk0DbqQ6Y6Ijm2Rfcvl5e5WBlw/9eb79ee38f41d38a</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/cdn-cgi/challenge-platform/h/g/scripts/jsd/b0a7532ac8ec/main.js?</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/cdn-cgi/speculation</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/cdn/thumbs/ABF-326/preview.jpg?v=1776052381</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/cdn/thumbs/ABF-327/preview.jpg?v=1776051763</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/cdn/thumbs/ACHJ-081/preview.jpg?v=1776052200</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/cdn/thumbs/ADN-773/preview.jpg?v=1776039301</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/cdn/thumbs/DASS-862/preview.jpg?v=1776053416</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/cdn/thumbs/DASS-868/preview.jpg?v=1776053342</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/cdn/thumbs/DASS-876/preview.jpg?v=1776053251</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/cdn/thumbs/IPZZ-816/preview.jpg?v=1776041761</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/cdn/thumbs/PFES-120/preview.jpg?v=1776053236</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/cdn/thumbs/PFES-122/preview.jpg?v=1776052366</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/cdn/thumbs/RBK-130/preview.jpg?v=1776043324</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/cdn/thumbs/SDJS-360/preview.jpg?v=1776053251</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/css/app.css?v=1776026966</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/favicon.ico?v=2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/history</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/hot</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/js/app.js?v=1776026966</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/latest-updates</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/login</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/models</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/models/actress-1170902266</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/models/actress-1288226281</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/models/actress-1514001354</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/models/actress-185250198</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/models/actress-2243590504</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/models/actress-2285271393</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/models/actress-2475456215</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/models/actress-2476518950</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/models/actress-2576214749</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/models/actress-2612969981</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/models/actress-2884457188</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/models/actress-3322058639</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/models/actress-3443254402</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/new-release</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/random</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/tags</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/videos/abf-326</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/videos/abf-327</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/videos/achj-081</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/videos/adn-773</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/videos/cawd-960</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/videos/dass-862</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/videos/dass-868</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/videos/dass-876</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/videos/fns-161</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/videos/ipzz-816</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/videos/ipzz-833</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/videos/pfes-120</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/videos/pfes-122</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/videos/rbk-130</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/videos/sdhs-065</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://girlstele.org/videos/sdjs-360</url>
              <origin>URL_RENDER</origin>
            </value>
          </urls>
          <domains>
            <value>
              <url>cdn.jsdelivr.net</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>girlstele.org</url>
              <origin>URL_RENDER</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>151.101.1.229</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>URL_RENDER</origin>
            </value>
          </ips>
        </iocs>
        <name>hxxps://girlstele.org/</name>
        <report_id>668bdb6d-201a-4125-8f84-6c63988505b7</report_id>
        <tags>
          <value>html</value>
          <value>soft-404</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>a8bdc657e98cd6b84ec1185ff178313179b72e13ac8d950c7b00451bf5a6712d</id>
    <title>Analysis Report for a8bdc657e98cd6b84ec1185ff178313179b72e13ac8d950c7b00451bf5a6712d</title>
    <updated>2026-04-13T04:09:26Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6c8f80678438b878aeec</_id>
        <file_type>application/x-executable</file_type>
        <flow_id>69dc6c745ea31bc68a24afd3</flow_id>
        <hash>a8bdc657e98cd6b84ec1185ff178313179b72e13ac8d950c7b00451bf5a6712d</hash>
        <iocs>
          <ips>
            <value>
              <ip>83.168.110.191</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <btc_wallets>
            <value>
              <btc_wallet>1f7cfdd4d3756fca56ca8318f7ad7fb7</btc_wallet>
              <origin>EXTERNAL_PARSER</origin>
            </value>
          </btc_wallets>
        </iocs>
        <name>iran.i486.elf</name>
        <report_id>c027589f-5a93-4745-b1b7-d4d2ea5a002f</report_id>
        <tags>
          <value>elf</value>
          <value>mirai</value>
          <value>masquerade</value>
          <value>rust</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>a5329da1836fa45d0d6c69a77497eee479b28e1600d325e5845bcb5af818e7a3</id>
    <title>Analysis Report for a5329da1836fa45d0d6c69a77497eee479b28e1600d325e5845bcb5af818e7a3</title>
    <updated>2026-04-13T04:06:40Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6bea80678438b878aece</_id>
        <file_type>text/html</file_type>
        <flow_id>69dc6bce5ea31bc68a24ae30</flow_id>
        <hash>a5329da1836fa45d0d6c69a77497eee479b28e1600d325e5845bcb5af818e7a3</hash>
        <iocs>
          <urls>
            <value>
              <url>http://ww1.pelisyseriestv.com/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://ww1.pelisyseriestv.com/favicon.ico</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://l.cdn-fileserver.com/bping.php</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://l.cdn-fileserver.com/bping.php?ugd=4&amp;requrl=https%3A%2F%2Fpelisyseriestv.com&amp;mspa=0&amp;wshp=0&amp;vgd_oreqf=one&amp;vgd_oresf=one&amp;vgd_wlstp=0&amp;cid=8CU7G8B38&amp;hvsid=00001776053211607010686018566660&amp;sc=HE&amp;ssld=%7B%22QQNN%22%3A%22r4%22%2C%22QQN75%22%3A%22kL1zUkxL7n1YnY18z%22%2C%22QQ8E%22%3A%22%22%2C%22QQQN%22%3A%22q4%22%7D&amp;vgd_asn=16509&amp;vgd_cage=6&amp;vgd_cdv=O3056&amp;vgd_l2type=dmola&amp;crid=342704488&amp;vi=1776053211596441979&amp;lf=6&amp;cc=DE&amp;wsip=170764066&amp;vgd_rpth=%2Fola&amp;vgd_setup=c21&amp;prid=8PR11258V&amp;lper=100&amp;gdpr=1&amp;r=1776053211610&amp;vgd_tsce=L1198&amp;vgd_len=548&amp;vgd_end=1</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://searchresultsworld.com/sr/754870121/SAFEFRAME.html?ule=962&amp;%21%284z=W&amp;%21j%28rz=W&amp;%28%28j%2A=%7B%22%28%28QQ%22%3A%22pg%22%2C%22%28%28Qr-%22%3A%228hB1e8chr+BE+EBv1%22%2C%22%28%28vz%22%3A%22%22%2C%22%28%28%28Q%22%3A%22Sg%22%7D&amp;%28Q=Sg&amp;%28f%2AhU%2A=&amp;%28vRa=%29%29XnKClN&amp;%2AEh8=%29&amp;%2AaQEEE=&amp;-%2A%28zh=&amp;-f1qQQqaKz=&amp;-zjz=&amp;1Eahh=%29&amp;1ru=&amp;4rrz%28=%29&amp;5fv%2A=&amp;8%28=&amp;AjB8=A1a&amp;Av%2A=BNaXxXWsMB%2An%29MnnksMffs%2AMXNk%29NxXBNBlX&amp;B%2AAEBv1=&amp;B%2Ar%29=&amp;B%2Arx=&amp;B%2Au=&amp;BQr=YFUBtR1R2n6KKh8%2Fc6s6tsBBt8B6a1t8ahs&amp;Bf8j%21v%2A=ux&amp;Bzbc=&amp;E%28zB=W&amp;Q%2Au=isWXC&amp;Q41Es=%29YilLsHki&amp;Q41Ex=A%28unqv1rQ&amp;QQ=pg&amp;Qhv%2A=snxkWnnll&amp;Qrzv%2A=&amp;Qv%2A=lbPkLlFsl&amp;aQhv%2A=&amp;c%28za18=W&amp;ct%2A=n&amp;e%21h8=&amp;e%2A=&amp;f%2AhU%2A=&amp;fBa=&amp;fa=W&amp;fv%2A=&amp;fv%2Aux=&amp;ha2chj=4rrz%28%3A%2F%2Fzajv%28-%28ahva%28ru~QAE&amp;htmlsrc=1&amp;jxr-za=%2AEAjB&amp;kkdd=3n%7C3%7CHA9n%2A&amp;r%28Qa=O%29%29Nl&amp;t%2Azh=%29&amp;t%2AzhQ1%28r=&amp;tpid=&amp;uv=%29kkCWXsx%29%29XNCnn%29NkN&amp;v%28v%2A=W&amp;v1rQj=l3g5VkXgG%3AilOGdk%7CMalg%3A8Nm~vc~cv9~cST&amp;zv%2A=&amp;eobd=&amp;eoac=RvYbkNvbY&amp;ure=1</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.pelisyseriestv.com/tv/62560/mr-robot.html</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://pelisyseriestv.com</url>
              <origin>URL_RENDER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.pelisyseriestv.com/tv/62560/mr-robot.html?ch=1&amp;js=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhdWQiOiJKb2tlbiIsImV4cCI6MTc3NjA2MDQwMiwiaWF0IjoxNzc2MDUzMjAyLCJpc3MiOiJKb2tlbiIsImpzIjoxLCJqdGkiOiIzMmlzdHVqMDk2dGNtY2p1dWcydTl1OGMiLCJuYmYiOjE3NzYwNTMyMDIsInRzIjoxNzc2MDUzMjAyODIwMDM0fQ.exC-hlnA_J7Y5xT9HJiXHhqGBktWRd38oRIX8i6cEsk&amp;sid=2e1137ca-36ee-11f1-a27e-66611b0e1d4c</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.pelisyseriestv.com/tv/62560/mr-robot.html</url>
              <origin>INPUT_FILE</origin>
            </value>
          </urls>
          <domains>
            <value>
              <url>l.cdn-fileserver.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>searchresultsworld.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>ww1.pelisyseriestv.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.pelisyseriestv.com</url>
              <origin>URL_RENDER</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>188.114.96.3</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>208.91.196.145</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>208.91.196.83</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>74.63.219.251</ip>
              <origin>URL_RENDER</origin>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>7784d7112ac9a898f2a62dd311f63e500e0586dd8a0ded34c0e308a4e03bd2d9</SHA-256>
              <SHA-1>30461b8d1b5032625633ee0ca8fa8069b6ce771c</SHA-1>
              <MD5>0377594ee5f8b98f6266b37d96346557</MD5>
              <origin>EXTERNAL_PARSER</origin>
              <file_type>application/json</file_type>
            </value>
            <value>
              <SHA-256>f39569e6fbbcb4425fc101a5950ced2e103cb9f2370a5589065b23118147940a</SHA-256>
              <SHA-1>4e15f197cb893762f9a53633aa422e0e6ef37972</SHA-1>
              <MD5>c7d2d66f80fa1d22d99f656ed91795db</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
          <uuids>
            <value>
              <uuid>2e1137ca-36ee-11f1-a27e-66611b0e1d4c</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
        </iocs>
        <name>hxxps://www.pelisyseriestv.com/tv/62560/mr-robot.html</name>
        <report_id>ae70d2f5-49b1-448c-87cb-c04c061128d6</report_id>
        <tags>
          <value>html</value>
          <value>base64</value>
          <value>obfuscated</value>
          <value>soft-404</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>53a39b900e3bfbf384acd13f0fc2329fa8d42b61e993d8ed5adf3a1428005d26</id>
    <title>Analysis Report for 53a39b900e3bfbf384acd13f0fc2329fa8d42b61e993d8ed5adf3a1428005d26</title>
    <updated>2026-04-13T04:06:10Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6bbf80678438b878aec5</_id>
        <file_type>application/x-msdownload</file_type>
        <flow_id>69dc6bb2d920e19044f9349a</flow_id>
        <hash>53a39b900e3bfbf384acd13f0fc2329fa8d42b61e993d8ed5adf3a1428005d26</hash>
        <iocs>
          <urls>
            <value>
              <url>http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/pkiops/Docs/Repository.htm0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/pkiops/certs/MicWinProPCA2011_2011-10-19.crt0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/pkiops/certs/Microsoft%20Time-Stamp%20PCA%202010(1).crt0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/pkiops/crl/MicWinProPCA2011_2011-10-19.crl%200a</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl0l</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/windows0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>crl.microsoft.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>microsoft.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>5.1.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>13.107.226.45</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>23.55.110.211</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>23.55.110.211</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>13.107.226.45</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>2605074037e008d982dcdf61af11531a80bbda08c75b755736b17929ee6ccd96</SHA-256>
              <SHA-1>769a4966848c775df061b9b76393f0335bba6830</SHA-1>
              <MD5>4fb43a683ff768aeeeb8980b9d3015f4</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>94c511dfb7111facb08f9c0908f568db2adcb993c7790c1aa3120bd37130b21c</SHA-256>
              <SHA-1>41de5a4147dd2e59aad1266304146fad22b916e5</SHA-1>
              <MD5>df0bac1ab7e8fd8dac31d882615024b3</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>ce0c61a2c2631ef934437c16b616e98511b7772567260100d957bd95d353b1b1</SHA-256>
              <SHA-1>e62709194daa28b7d828a44cccea2de14383211d</SHA-1>
              <MD5>5b2a444d1ae281ea719f54cc05aaf7b8</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
          </files>
          <registry>
            <value>
              <registry>Software\Microsoft\Windows NT\CurrentVersion\Svchost</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Diagnostics\PerfTrack\TraceProfile</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>System\CurrentControlSet\Control\SCMConfig</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>System\CurrentControlSet\Services</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </registry>
        </iocs>
        <name>svchost.exe_</name>
        <report_id>57631736-ab79-4569-accb-d2b61046238c</report_id>
        <tags>
          <value>peexe</value>
          <value>expired-cert</value>
          <value>microsoft_visual_cc</value>
          <value>signed</value>
          <value>adaptive-context</value>
          <value>anti-debug</value>
          <value>anti-vm</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>4c218b8aecfd9707a0153135fe4976224b5163a927f59c6eb150544ac276f6ba</id>
    <title>Analysis Report for 4c218b8aecfd9707a0153135fe4976224b5163a927f59c6eb150544ac276f6ba</title>
    <updated>2026-04-13T04:05:10Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6b9ff9522792fdaf81d5</_id>
        <file_type>application/x-msdownload; format=pe64</file_type>
        <flow_id>69dc6b749124ebc087508e7c</flow_id>
        <hash>4c218b8aecfd9707a0153135fe4976224b5163a927f59c6eb150544ac276f6ba</hash>
        <iocs>
          <urls>
            <value>
              <url>http://github.com/go-ole/go-ole</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://github.com/gorilla/websocket</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://github.com/imroc/req/v3</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://github.com/imroc/req/v3/internal</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://github.com/json-iterator/go</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://github.com/kataras/golog</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://github.com/kataras/pio</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://github.com/kirides/screencapture/d3d</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://github.com/lxn/win</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://github.com/modern-go/concurrent</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://github.com/modern-go/reflect2</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://github.com/shirou/gopsutil/v3/cpu</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://github.com/shirou/gopsutil/v3/disk</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://github.com/shirou/gopsutil/v3/mem</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://github.com/shirou/gopsutil/v3/net</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://github.com/shirou/gopsutil/v3/process</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://github.com/yusufpapurcu/wmi</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://golang.org/x/crypto/cryptobyte</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://golang.org/x/crypto/hkdf</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://golang.org/x/net/html</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://golang.org/x/net/html/atom</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://golang.org/x/net/html/charset</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://golang.org/x/net/http2/hpack</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://golang.org/x/net/idna</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://golang.org/x/net/publicsuffix</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://golang.org/x/sys/cpu</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://golang.org/x/sys/windows</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://golang.org/x/text/encoding</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://golang.org/x/text/encoding/charmap</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://golang.org/x/text/encoding/htmlindex</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://golang.org/x/text/encoding/ianaindex</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://golang.org/x/text/encoding/internal</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://golang.org/x/text/encoding/japanese</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://golang.org/x/text/encoding/korean</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://golang.org/x/text/encoding/unicode</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://golang.org/x/text/internal/language</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://golang.org/x/text/runes</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://golang.org/x/text/transform</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://golang.org/x/text/unicode/bidi</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://golang.org/x/text/unicode/norm</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://time.zone</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>github.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>golang.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>time.zone</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </domains>
          <ips>
            <value>
              <ip>140.82.121.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>142.251.13.141</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>209.196.144.25</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>github.com</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>golang.org</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>time.zone</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <MD5>d3746849b0b7e9183b74d0c0b913efea</MD5>
              <SHA-1>f425b8d899cc1cb09bac9dcd0c876c814497d177</SHA-1>
              <SHA-256>d8562e3082781650d94bce13f4190cce97abe1c4b4194b06167d51442a287a74</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <MD5>e353d1d4ff439ca79a7ee1068eea6865</MD5>
              <SHA-1>759734afdda42ba656e0ba788fe759754a4b12fe</SHA-1>
              <SHA-256>8b88e0e26706f5d3729720f52ef2e46cf9c7281e972799dbf3804e7da39e5bea</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <MD5>540c98410c6ffcc7eacc37a0ef0fcf36</MD5>
              <SHA-1>1e6d9d1c11697e15bdf2d307a79b519437ee69a8</SHA-1>
              <SHA-256>d7937e87503c792a8f66437ed45a59780387715d5f681ec80806e6062e559c20</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <MD5>f4411fefe1669074e68a7cf1ef867eef</MD5>
              <SHA-1>9e841527a5d67a92e1d2e2b2678e0b1df87d6a3b</SHA-1>
              <SHA-256>3751ae4d5f1c6f858f6e0011d530ae151018d7a7fd0bed780e4998206fd4bc24</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <MD5>762bf448598f20ea4cb387cc31304e21</MD5>
              <SHA-1>0bd99fa2389d4829f057e2ce07980543cb16924e</SHA-1>
              <SHA-256>d47a739ce84bb1d694bb9aee030cf413db750d940999954825790789e857d0a4</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <MD5>f64d019a4508c865c5b2b80c2c165689</MD5>
              <SHA-1>6db5f6cde91327628eb7fec975f580fdc36996f3</SHA-1>
              <SHA-256>e486ca474969ad3d824f5deb4ba8be211d59afaaf41ba50d715cecaa5f360d26</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <MD5>fadde8b7195c3adc200779c7103dcdc1</MD5>
              <SHA-1>8288cbe9cad540f201e1f374ef96564ce95d3b12</SHA-1>
              <SHA-256>38e24b252af6c64c56aaebd5c6aa606c6a9b29154405404a310a6af40d249016</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
          </files>
          <btc_wallets>
            <value>
              <btc_wallet>0x45a192:$btc: 1fairwindstuttgartrentinsued</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
          </btc_wallets>
        </iocs>
        <name>client1.exe</name>
        <report_id>a36183a9-741d-4248-bd3c-4a08968d856d</report_id>
        <tags>
          <value>peexe</value>
          <value>txt</value>
          <value>threat</value>
          <value>anti-vm</value>
          <value>golang</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>49091861930dbe0a622b6810f9d139d5431a9c48f97ad1d72cc5ccdc2edfda53</id>
    <title>Analysis Report for 49091861930dbe0a622b6810f9d139d5431a9c48f97ad1d72cc5ccdc2edfda53</title>
    <updated>2026-04-13T04:04:46Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6b9580678438b878aebc</_id>
        <file_type>application/x-dosexec</file_type>
        <flow_id>69dc6b5c9124ebc087508e71</flow_id>
        <hash>49091861930dbe0a622b6810f9d139d5431a9c48f97ad1d72cc5ccdc2edfda53</hash>
        <iocs>
          <urls>
            <value>
              <url>http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl0</url>
              <origin>EXTRACTED_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z</url>
              <origin>EXTRACTED_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://go.microsoft.com/fwlink/?LinkId=79513</url>
              <origin>EXTRACTED_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/pki/certs/MicRooCerAut2011_2011_03_22.crt0</url>
              <origin>EXTRACTED_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0</url>
              <origin>EXTRACTED_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/pkiops/Docs/Repository.htm0</url>
              <origin>EXTRACTED_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/pkiops/certs/MicCodSigPCA2011_2011-07-08.crt0</url>
              <origin>EXTRACTED_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/pkiops/certs/Microsoft%20Time-Stamp%20PCA%202010(1).crt0</url>
              <origin>EXTRACTED_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl0a</url>
              <origin>EXTRACTED_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl0l</url>
              <origin>EXTRACTED_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/pkiops/docs/primarycps.htm0@</url>
              <origin>EXTRACTED_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/pkiops/certs/MicWinProPCA2011_2011-10-19.crt0</url>
              <origin>EXTRACTED_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/pkiops/crl/MicWinProPCA2011_2011-10-19.crl%200a</url>
              <origin>EXTRACTED_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/windows0</url>
              <origin>EXTRACTED_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://jrsoftware.org/ishelp/index.php?topic=setupcmdline</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>jrsoftware.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>crl.microsoft.com</url>
              <origin>EXTRACTED_FILE</origin>
            </value>
            <value>
              <url>microsoft.com</url>
              <origin>EXTRACTED_FILE</origin>
            </value>
            <value>
              <url>go.microsoft.com</url>
              <origin>EXTRACTED_FILE</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>23.216.77.6</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>23.52.181.141</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>13.107.226.45</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>75.119.223.113</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>75.119.223.113</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>23.216.77.6</ip>
              <origin>EXTRACTED_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>23.52.181.141</ip>
              <origin>EXTRACTED_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>13.107.226.45</ip>
              <origin>EXTRACTED_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>0164ceab0da0c13d6fde6f4522d5c8f988ca28ec86171ca759fb0f19fffeb7b4</SHA-256>
              <SHA-1>4057821db8bb88831e51774d28acb8f527efd9f0</SHA-1>
              <MD5>db5b7e56a39e34a64f5fda87cdd6f537</MD5>
              <origin>INSTALLER_EXTRACTION</origin>
              <file_type>application/x-dosexec</file_type>
            </value>
            <value>
              <SHA-256>09db8a70367724c2e3658a206cbe3a3eba1fd986f3c2cb890af4126be3204d41</SHA-256>
              <SHA-1>ac00328b099db843cd2ab201195c14626f65341c</SHA-1>
              <MD5>51d9d8f576f13fd62d05d96f1df20055</MD5>
              <origin>INSTALLER_EXTRACTION</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>473b0532e35429c408bf5b730fe24fa20502fbf36e9bdb2d7dbe5f2efdab187a</SHA-256>
              <SHA-1>4265f273a61b5de77ae2631cab48f988cca37303</SHA-1>
              <MD5>9233bc3cec3a6dfd5b31bfca6aad8cef</MD5>
              <origin>INSTALLER_EXTRACTION</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>576e90d08cb3e0cafc1c515ade4534b763c2da25575fcf2d356423df48b25dcd</SHA-256>
              <SHA-1>7e2d1fcfcaada9b065ddf6837aba51b4459b33ee</SHA-1>
              <MD5>ee06607afc0c0f8e2e219ab60b797704</MD5>
              <origin>INSTALLER_EXTRACTION</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>5aae636f1ebb151d348f6fa709c75daa304f4f46906e042eea725e85be4b8f7d</SHA-256>
              <SHA-1>db5136768d7f653edec8250db0aaa3d696dea25a</SHA-1>
              <MD5>910245691f50404cfea92fa1c0c532f0</MD5>
              <origin>INSTALLER_EXTRACTION</origin>
              <file_type>image/png</file_type>
            </value>
            <value>
              <SHA-256>b144018d8708d6fc6a71dcb889a58f63042ec9d76073e9d1c9d3ac06bbfeb98e</SHA-256>
              <SHA-1>0c20cf4efd0b4752c0d213bec46097a33f272256</SHA-1>
              <MD5>99bb8c31b4b9b5cb1d48825d50cf232b</MD5>
              <origin>INSTALLER_EXTRACTION</origin>
              <file_type>application/x-dosexec</file_type>
            </value>
            <value>
              <SHA-256>c6c785d66da5ca3881c24304d3bbcffd13a95167edc5cc2334ac909702329b31</SHA-256>
              <SHA-1>ccc2b8c23c12356de772b9a25628e106811c766b</SHA-1>
              <MD5>9947fad3116b07a42b0210694f3dd909</MD5>
              <origin>INSTALLER_EXTRACTION</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>e0ad4d1346ce35eb1e6a6c493eb14322225974a009cc63531ab9ffa2f07c68d8</SHA-256>
              <SHA-1>d9b6c48f322c2f7a4c094f53704cbf5a2e0d6c3a</SHA-1>
              <MD5>adcb5805f71b8751204cc2578b269615</MD5>
              <origin>INSTALLER_EXTRACTION</origin>
              <file_type>text/x-innosetup</file_type>
            </value>
            <value>
              <SHA-256>8ddbaef639393f5d833f3f1f769fd650e47c0927454fce3effd061822d050d09</SHA-256>
              <SHA-1>606f35793821320118b4256633833ffe7438eb50</SHA-1>
              <MD5>ceac5f8d2bd8b58db2d11b109c7c517e</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>adb81901042f2654154a003d72e83217aed1403ab25978494cae1df247fec716</SHA-256>
              <SHA-1>be01dc45b5dd45a6ef45a59bd99035b8f5822497</SHA-1>
              <MD5>5decd90cee87bb0ceab8762287b90be0</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
          <uuids>
            <value>
              <uuid>2a0e508a-d974-4ff8-82c7-d998e15c518b</uuid>
              <origin>EXTRACTED_FILE</origin>
            </value>
            <value>
              <uuid>17d14f5c-a337-4978-8281-53493378c107</uuid>
              <origin>EXTRACTED_FILE</origin>
            </value>
            <value>
              <uuid>2a0e508a-d974-4ff8-82c7-d998e15c518b</uuid>
              <origin>CONTENT_PARSE</origin>
            </value>
          </uuids>
          <registry>
            <value>
              <registry>HKLM\Software\Microsoft\Internet Explorer\Registration\DigitalProductID</registry>
              <origin>EXTRACTED_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\Wmi\GlobalLogger</registry>
              <origin>EXTRACTED_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\ALink</registry>
              <origin>EXTRACTED_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\VisualStudio\12.0\General</registry>
              <origin>EXTRACTED_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\VisualStudio\9.0\General</registry>
              <origin>EXTRACTED_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Wow6432Node\Microsoft\PCHealth\ErrorReporting\DW\Installed</registry>
              <origin>EXTRACTED_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\AppV\Subsystem</registry>
              <origin>EXTRACTED_FILE</origin>
            </value>
            <value>
              <registry>Software\Borland\Delphi\Locales</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Borland\Locales</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\CodeGear\Locales</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Embarcadero\Locales</registry>
              <origin>INPUT_FILE</origin>
            </value>
          </registry>
        </iocs>
        <name>i4V9.10.exe</name>
        <report_id>72bb092e-22e7-4569-bdfa-f5d3f7bcbed1</report_id>
        <tags>
          <value>peexe</value>
          <value>html</value>
          <value>mavinject</value>
          <value>packed</value>
          <value>adaptive-context</value>
          <value>fingerprint</value>
          <value>installer</value>
          <value>soft-404</value>
          <value>inno</value>
          <value>embarcadero_delphi</value>
          <value>installer-heuristic</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>d8253a11fc1c65c4e9bbb7f3f240386566166e5d359c2410727ab2c18775c758</id>
    <title>Analysis Report for d8253a11fc1c65c4e9bbb7f3f240386566166e5d359c2410727ab2c18775c758</title>
    <updated>2026-04-13T04:01:36Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6abdf9522792fdaf81ad</_id>
        <file_type>text/x-vbscript</file_type>
        <flow_id>69dc6a8b5ea31bc68a24aaf4</flow_id>
        <hash>d8253a11fc1c65c4e9bbb7f3f240386566166e5d359c2410727ab2c18775c758</hash>
        <iocs/>
        <name>27a9b7381ace896b40a37685cbc184fc</name>
        <report_id>5a8bb87c-e2a9-4349-86ab-7d49c02276c2</report_id>
        <tags>
          <value>vbs</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>b6ce204c9b4fa4e12743abee696519d8e2df8d0ef24b9417542e08df49444ad8</id>
    <title>Analysis Report for b6ce204c9b4fa4e12743abee696519d8e2df8d0ef24b9417542e08df49444ad8</title>
    <updated>2026-04-13T04:01:23Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6aa5f9522792fdaf81a7</_id>
        <file_type>application/x-powershell</file_type>
        <flow_id>69dc6a85c33dc5a985d79d6c</flow_id>
        <hash>b6ce204c9b4fa4e12743abee696519d8e2df8d0ef24b9417542e08df49444ad8</hash>
        <iocs/>
        <name>f11ae1328cd093018f155d4adf83e89b</name>
        <report_id>3857db62-087c-4cf3-860a-05687239d832</report_id>
        <tags>
          <value>powershell</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>a649d9cf39b6d0f1b20a286631c7b010e64d4aa7b82256059bdd0415692627a8</id>
    <title>Analysis Report for a649d9cf39b6d0f1b20a286631c7b010e64d4aa7b82256059bdd0415692627a8</title>
    <updated>2026-04-13T04:01:19Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a9ef9522792fdaf81a1</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc6a7f799d5bf325fa7092</flow_id>
        <hash>a649d9cf39b6d0f1b20a286631c7b010e64d4aa7b82256059bdd0415692627a8</hash>
        <iocs/>
        <name>ee2173d95becbab5c3f902201c58dc6a</name>
        <report_id>aa61f30e-ba21-4238-9f94-054e738981cd</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>b1b9152cc862c6ad76c7c613c58b9fdfc168bede6efff00ceca0965436bd2920</id>
    <title>Analysis Report for b1b9152cc862c6ad76c7c613c58b9fdfc168bede6efff00ceca0965436bd2920</title>
    <updated>2026-04-13T04:01:19Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a9ff9522792fdaf81a2</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc6a7f799d5bf325fa7090</flow_id>
        <hash>b1b9152cc862c6ad76c7c613c58b9fdfc168bede6efff00ceca0965436bd2920</hash>
        <iocs/>
        <name>0d459e1e1eea2b9b7e88719bb28fd0f0</name>
        <report_id>a611fac8-a29c-4e9f-a9c2-e07144cd7a44</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>311535a621d456e3f1b4843f8d66ee7ecbac1b7cbc1df2c3da7fda7b53dcf6bf</id>
    <title>Analysis Report for 311535a621d456e3f1b4843f8d66ee7ecbac1b7cbc1df2c3da7fda7b53dcf6bf</title>
    <updated>2026-04-13T04:01:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a9af9522792fdaf819d</_id>
        <file_type>text/plain</file_type>
        <flow_id>69dc6a789124ebc087508d94</flow_id>
        <hash>311535a621d456e3f1b4843f8d66ee7ecbac1b7cbc1df2c3da7fda7b53dcf6bf</hash>
        <iocs/>
        <name>b26b35f0e82c7b40c221479bd2176cd4</name>
        <report_id>4ac0213a-cb9c-4c91-9e3e-b536f3589f2d</report_id>
        <tags>
          <value>txt</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>3619deff9c76f70e190656324d41b456b4b271c513e901e6311715d80b75176c</id>
    <title>Analysis Report for 3619deff9c76f70e190656324d41b456b4b271c513e901e6311715d80b75176c</title>
    <updated>2026-04-13T04:01:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a98f9522792fdaf819b</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc6a76c33dc5a985d79d5c</flow_id>
        <hash>3619deff9c76f70e190656324d41b456b4b271c513e901e6311715d80b75176c</hash>
        <iocs/>
        <name>773acc494c4c45395b1db02640d08c8b</name>
        <report_id>84b37f36-2fa7-46c8-83a6-d3a72ba18cb7</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>e125ccf1c9e0c44a736b5a0818783ec9da6aedd4ad16aa7434a38582ff3e63b0</id>
    <title>Analysis Report for e125ccf1c9e0c44a736b5a0818783ec9da6aedd4ad16aa7434a38582ff3e63b0</title>
    <updated>2026-04-13T04:01:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a99f9522792fdaf819c</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc6a799124ebc087508d97</flow_id>
        <hash>e125ccf1c9e0c44a736b5a0818783ec9da6aedd4ad16aa7434a38582ff3e63b0</hash>
        <iocs/>
        <name>103640e3f5538481f693bb5aef0ca21b</name>
        <report_id>8e7e6862-b065-41f0-b453-633b7d7f1025</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>749345371afe895b87053c554da937d0039d2f7598651b1ae0eb9fe4b4465a24</id>
    <title>Analysis Report for 749345371afe895b87053c554da937d0039d2f7598651b1ae0eb9fe4b4465a24</title>
    <updated>2026-04-13T04:01:03Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a93f9522792fdaf8196</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc6a6f799d5bf325fa7049</flow_id>
        <hash>749345371afe895b87053c554da937d0039d2f7598651b1ae0eb9fe4b4465a24</hash>
        <iocs/>
        <name>ce5d061ab769b8b910c50aabcee60c3e</name>
        <report_id>4ed1727c-a9af-433b-9dd6-d3cd028961f8</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>878b3639139787b3a941a89b6f29a02a35cb9bfcfabe8b6f5d236577b05f96a4</id>
    <title>Analysis Report for 878b3639139787b3a941a89b6f29a02a35cb9bfcfabe8b6f5d236577b05f96a4</title>
    <updated>2026-04-13T04:01:03Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a91f9522792fdaf8195</_id>
        <file_type>application/x-powershell</file_type>
        <flow_id>69dc6a705ea31bc68a24aaaa</flow_id>
        <hash>878b3639139787b3a941a89b6f29a02a35cb9bfcfabe8b6f5d236577b05f96a4</hash>
        <iocs>
          <urls>
            <value>
              <url>https://github.com/steve02081504/fount</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://github.com/steve02081504/fount/archive/refs/heads/master.zip</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>github.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
        </iocs>
        <name>bafb75f7ff0bdefe8b49fec39a78e191</name>
        <report_id>0de5963c-d8e5-435e-96ab-9b40a0d6da69</report_id>
        <tags>
          <value>powershell</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>98b6e3b4ab996552ba1529a071f922486c0fad1a0aeb9d25f76273baa383cd27</id>
    <title>Analysis Report for 98b6e3b4ab996552ba1529a071f922486c0fad1a0aeb9d25f76273baa383cd27</title>
    <updated>2026-04-13T04:01:00Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a8ef9522792fdaf8193</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc6a6b799d5bf325fa703d</flow_id>
        <hash>98b6e3b4ab996552ba1529a071f922486c0fad1a0aeb9d25f76273baa383cd27</hash>
        <iocs/>
        <name>c3962aed7974f0c0fe5ab5afdf6c61f7</name>
        <report_id>dc8c09e2-b65f-4c9e-b4a0-6aabab28c04e</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>e2dfb26d33c9eaa0edaac4dcb8f5bbdc0337bb7c5463166533f4d8cca1bdf3d4</id>
    <title>Analysis Report for e2dfb26d33c9eaa0edaac4dcb8f5bbdc0337bb7c5463166533f4d8cca1bdf3d4</title>
    <updated>2026-04-13T04:01:00Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a8cf9522792fdaf818f</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc6a6c799d5bf325fa7043</flow_id>
        <hash>e2dfb26d33c9eaa0edaac4dcb8f5bbdc0337bb7c5463166533f4d8cca1bdf3d4</hash>
        <iocs/>
        <name>0ae3bcca80b913b16e94d66fbf8a6685</name>
        <report_id>401f99ec-21f3-4a11-a7a2-76c27450493a</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>9bb19a2dccf16b2c72f84a6f581a2717ba9906d3498064a5aa4f624251e964b1</id>
    <title>Analysis Report for 9bb19a2dccf16b2c72f84a6f581a2717ba9906d3498064a5aa4f624251e964b1</title>
    <updated>2026-04-13T04:01:00Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a8df9522792fdaf8192</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc6a6e5ea31bc68a24aaa1</flow_id>
        <hash>9bb19a2dccf16b2c72f84a6f581a2717ba9906d3498064a5aa4f624251e964b1</hash>
        <iocs/>
        <name>63713f6b8f7e3d9cc1e2227a885d542d</name>
        <report_id>582863e0-79d6-4f44-bf24-2ed3c348402f</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>27ceaa7a329fd8d57554e677d917ccc8cdcc90e01b306c4e0f7621a209e9c348</id>
    <title>Analysis Report for 27ceaa7a329fd8d57554e677d917ccc8cdcc90e01b306c4e0f7621a209e9c348</title>
    <updated>2026-04-13T04:00:54Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a85f9522792fdaf8188</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc6a65c33dc5a985d79d46</flow_id>
        <hash>27ceaa7a329fd8d57554e677d917ccc8cdcc90e01b306c4e0f7621a209e9c348</hash>
        <iocs/>
        <name>d397b51543ea0d08c31cfa6a8db40c48</name>
        <report_id>f4a6094d-6715-47f8-96dc-c56757d1d692</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>525b51c7b6dc4fe23a597ee44213a3d817a30396b9c5668e4afab5bdbc6e948d</id>
    <title>Analysis Report for 525b51c7b6dc4fe23a597ee44213a3d817a30396b9c5668e4afab5bdbc6e948d</title>
    <updated>2026-04-13T04:00:54Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a88f9522792fdaf818a</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc6a685ea31bc68a24aa96</flow_id>
        <hash>525b51c7b6dc4fe23a597ee44213a3d817a30396b9c5668e4afab5bdbc6e948d</hash>
        <iocs/>
        <name>f58258f933739b9c616d8263dc3a6cfc</name>
        <report_id>2eb19fc5-e542-420d-afcb-b53dca40709d</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>7d2f81a2bf341f8e46ca809615dede42f0edf6906ffe222586dd466e7ed113d6</id>
    <title>Analysis Report for 7d2f81a2bf341f8e46ca809615dede42f0edf6906ffe222586dd466e7ed113d6</title>
    <updated>2026-04-13T04:00:54Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a87f9522792fdaf8189</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc6a68d920e19044f93309</flow_id>
        <hash>7d2f81a2bf341f8e46ca809615dede42f0edf6906ffe222586dd466e7ed113d6</hash>
        <iocs/>
        <name>0bfb964ffbec6a8dfa41f8db88595f62</name>
        <report_id>730b001d-9736-415d-a5cb-75a83688e9c2</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>61c37704c2f31d087ec9503f5c0778e8d24afd89365ff00cb8c06919fd3a8ccf</id>
    <title>Analysis Report for 61c37704c2f31d087ec9503f5c0778e8d24afd89365ff00cb8c06919fd3a8ccf</title>
    <updated>2026-04-13T04:00:48Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6aa4f9522792fdaf81a6</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc6a63c33dc5a985d79d44</flow_id>
        <hash>61c37704c2f31d087ec9503f5c0778e8d24afd89365ff00cb8c06919fd3a8ccf</hash>
        <iocs>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>APK_DECODING</origin>
            </value>
          </ips>
        </iocs>
        <name>19fc750a2e5f9ab7ab447952fa57bf57</name>
        <report_id>7dc8374e-33ad-4e9d-a6dd-872f91c7f58d</report_id>
        <tags>
          <value>apk</value>
          <value>signed</value>
          <value>androidrepublic</value>
          <value>obfuscated</value>
          <value>packed</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>fingerprint</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>4fad61ceb8873cf9d556181118f0784f0465a4b858992322f978ea5405a2db7e</id>
    <title>Analysis Report for 4fad61ceb8873cf9d556181118f0784f0465a4b858992322f978ea5405a2db7e</title>
    <updated>2026-04-13T04:00:48Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6b0e3040601e24ad5f42</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc6a6c799d5bf325fa7045</flow_id>
        <hash>4fad61ceb8873cf9d556181118f0784f0465a4b858992322f978ea5405a2db7e</hash>
        <iocs>
          <urls>
            <value>
              <url>https://luajit.org/</url>
              <origin>EXTRACTED_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>luajit.org</url>
              <origin>EXTRACTED_FILE</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>163.172.177.144</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>163.172.177.144</ip>
              <origin>EXTRACTED_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>09988691ee0c12d6541276d69cbaf8cba8c478050f2a58f8e08fd5a92a4c2cb5</SHA-256>
              <SHA-1>0a2c55d6feaa70208d3626c310cfe53a370027db</SHA-1>
              <MD5>79bfa68eb8e63ad651d62f4ec31ae241</MD5>
              <origin>JAVASCRIPT_EMULATION</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>1f3925824d2be30ca31a47c59a92d738993ce84884b4a170201e5bc6ab62947a</SHA-256>
              <SHA-1>0844e1341c9b44c7fda44b26edef16599ae2b33b</SHA-1>
              <MD5>dc2f2c2530f634f5f132c4cd4d91bc71</MD5>
              <origin>JAVASCRIPT_EMULATION</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>4fad61ceb8873cf9d556181118f0784f0465a4b858992322f978ea5405a2db7e</SHA-256>
              <SHA-1>d797670ec9cd0e52fdbeb593e8f78c937b355a07</SHA-1>
              <MD5>f29a94ce62643391cdee3274a0540494</MD5>
              <origin>JAVASCRIPT_EMULATION</origin>
              <file_type>text/javascript</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>5343326fb0b4f79c32276f08ffcc36bd88cde23aa19962bd1e8d8b80f5d33953</SHA-256>
              <SHA-1>f5199b4191add11d02d58f521cbea21465b7ff6b</SHA-1>
              <MD5>00f60ee3ff2dee681b5d7d442009b2c2</MD5>
              <origin>JAVASCRIPT_EMULATION</origin>
              <file_type>application/x-msdownload; format=pe64</file_type>
            </value>
            <value>
              <SHA-256>b723a217ec2427c003d264d0e07dba2b7087a90e96895251cfaa83a8639f66c3</SHA-256>
              <SHA-1>83f60320aa16e0020a12fb5cd3fd107cf33eeed4</SHA-1>
              <MD5>5c6aad1ce01b6f1c120924640d70555b</MD5>
              <origin>JAVASCRIPT_EMULATION</origin>
              <file_type>text/javascript</file_type>
            </value>
            <value>
              <SHA-256>c7a657af5455812fb215a8888b7e3fd8fa1ba27672a3ed9021eb6004eff271ac</SHA-256>
              <SHA-1>270f66d2c84ee86ff4b07c6220c51abd4897b5f0</SHA-1>
              <MD5>4ebd617a3ad9a9619172bd14a902a400</MD5>
              <origin>JAVASCRIPT_EMULATION</origin>
              <file_type>application/x-msdownload; format=pe64</file_type>
            </value>
            <value>
              <SHA-256>66c50d2a5ba0a96d30be3d64fcdf344912799375fcd093735824af43ab991e87</SHA-256>
              <SHA-1>3212975408dc753eaa6ceff270a107fafc862aeb</SHA-1>
              <MD5>f853f444a788183296e243a0af587288</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
          </files>
          <btc_wallets>
            <value>
              <btc_wallet>8AAEG4CAAAAEyJ8UghwuiBGf</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>8AAHcNW15fw2YPH4QAAAAAAEC</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>BQBN9QUAAbfwBgB39QUAdfUFAAAG</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>BkyLi5AAAABJicBJjTzBgH8GA</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>CAAAfXsNAHV7DQAHZm4AMYAE</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>GYAAAAABwBwBgMAFLcBKQG5bwoA</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>MUiLi5AAAABMjQzxQYB5BSkPhd</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>WYAAAAABwAAAAAAAAABnMt4AgALTAA</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>ZZgAAAAB8cwYAAgFSAn8AAAAG</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>wEiNBEBMjSTCQYsEJEGJwEHB6BxB</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
          </btc_wallets>
        </iocs>
        <name>2026compliance requirements submission docs scanned from a xerox multifunctional device00001.JS</name>
        <report_id>9ee766f6-892b-4b32-bae6-6595fa540ca0</report_id>
        <tags>
          <value>javascript</value>
          <value>html</value>
          <value>persistence</value>
          <value>base64</value>
          <value>dropper</value>
          <value>evasive</value>
          <value>obfuscated</value>
          <value>anti-debug</value>
          <value>packed</value>
          <value>lolbin</value>
          <value>schtasks</value>
          <value>repaired</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>00a27cd28694ab77d39880b1dc3eec9dd149926ca30de8362d8dc4bf3477f7a0</id>
    <title>Analysis Report for 00a27cd28694ab77d39880b1dc3eec9dd149926ca30de8362d8dc4bf3477f7a0</title>
    <updated>2026-04-13T04:00:28Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a6480678438b878ae6f</_id>
        <file_type>application/x-msdownload</file_type>
        <flow_id>69dc6a545ea31bc68a24aa64</flow_id>
        <hash>00a27cd28694ab77d39880b1dc3eec9dd149926ca30de8362d8dc4bf3477f7a0</hash>
        <iocs>
          <files>
            <value>
              <MD5>8372e8b512a0ff3114c1c1d37f2d708d</MD5>
              <SHA-1>aea1bff396344d72852e6ec2a8fc1c82f2057dd7</SHA-1>
              <SHA-256>0ec5a00287c307258175659a612d071e9dc920732571b7cb302f41e446be07db</SHA-256>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <MD5>79e2a1242fe1a248f6b5f383fcfa3aa2</MD5>
              <SHA-1>369c55ff60a402ac7edaee69041b1533d276e7cb</SHA-1>
              <SHA-256>63fd685a5bcc7789535aa4aa7d5f622737dab6f11e1799e44a9174e592d0074d</SHA-256>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <MD5>2438b62bfc804557ec6cb59dca3dad8c</MD5>
              <SHA-1>8c828afbaa00749b7a7564b1665774b0d9ddf62b</SHA-1>
              <SHA-256>849c1d43cc460acc263a31d28e0821a9eb456584f02a249e922c037df60a353e</SHA-256>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <MD5>2d212c52d195db17de44fc66fc64ec7b</MD5>
              <SHA-1>0bc303796fc25884f30daa43579f37084aa86551</SHA-1>
              <SHA-256>95effec3e13ef3dde1b82a54cce79dc610c686a6b74d5018e8895a2c923dede5</SHA-256>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <MD5>36248eae0c0c17c1fbbd52476d5b612d</MD5>
              <SHA-1>c76b019abb540f0f942c99cb1daf61b202f8bd4a</SHA-1>
              <SHA-256>d5afa151e677a98f00aa6af43d6155c0dc5bbb8039c1581f744e3188616a434c</SHA-256>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
          </files>
        </iocs>
        <name>19ede9acaa2362b959f35096b93470fa</name>
        <report_id>ff1ed273-4f82-4e6d-af33-ca878cbcf808</report_id>
        <tags>
          <value>peexe</value>
          <value>mofksys</value>
          <value>swisyn</value>
          <value>virus</value>
          <value>anti-vm</value>
          <value>overlay</value>
          <value>packed</value>
          <value>packer_detected</value>
          <value>visual_basic</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>a3f6b8b45482c40b44798804b5fed2b0f354c0d17726fdf4d131de7267c57f83</id>
    <title>Analysis Report for a3f6b8b45482c40b44798804b5fed2b0f354c0d17726fdf4d131de7267c57f83</title>
    <updated>2026-04-13T04:00:02Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a8a80678438b878ae7a</_id>
        <file_type>application/x-dosexec</file_type>
        <flow_id>69dc6a3f5ea31bc68a24aa3a</flow_id>
        <hash>a3f6b8b45482c40b44798804b5fed2b0f354c0d17726fdf4d131de7267c57f83</hash>
        <iocs>
          <urls>
            <value>
              <url>http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0</url>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S</url>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0</url>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://crl3.digicert.com/DigiCertTrustedRootG4.crl0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0</url>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://es5.github.io/#x15.4.4.21</url>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://ns.adobe.com/xap/1.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://ns.adobe.com/xap/1.0/mm</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://ns.adobe.com/xap/1.0/sType/ResourceRef</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://schemas.microsoft.com/wix/2006/localization</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://stackoverflow.com/a/1465386/4224163</url>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://stackoverflow.com/a/15123777)</url>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://stackoverflow.com/questions/1026069/capitalize-the-first-letter-of-string-in-javascript</url>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://stackoverflow.com/questions/1068834/object-comparison-in-javascript</url>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://www.computerhope.com/forum/index.php?topic=76293.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.digicert.com/CPS0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.tutorialspoint.com/javascript/array_map.htm</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Array/Reduce</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Array/filter</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Array/indexOf</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/String/Trim</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/String/startsWith</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://developer.mozilla.org/en/docs/Web/JavaScript/Reference/Global_Objects/String/endsWith</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://java.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://java.com/en/download/release_notice.jsp</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://java.com/moreinfo8</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://java.com/otnlicense</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://javadl-esd-secure.oracle.com/update</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>cacerts.digicert.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>computerhope.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>crl3.digicert.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>crl4.digicert.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>developer.mozilla.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>digicert.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>es5.github.io</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>java.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>javadl-esd-secure.oracle.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>ns.adobe.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>schemas.microsoft.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>stackoverflow.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>tutorialspoint.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>15.4.4.21</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>198.252.206.1</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>185.199.109.153</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>23.11.41.157</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>45.60.131.229</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>23.37.57.18</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>172.66.140.114</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>13.107.226.45</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>135.181.223.254</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>146.75.121.91</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>138.1.33.162</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>23.11.41.157</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>172.66.140.114</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>146.75.121.91</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>45.60.131.229</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>185.199.109.153</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>138.1.33.162</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>23.37.57.18</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>13.107.226.45</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>198.252.206.1</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>135.181.223.254</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>04d5b4e7281104dd3920ca1fef80903b6d365f506c343266aa017077fa9691ab</SHA-256>
              <SHA-1>dfc152ea7196b058aad6c136ee88cf080e014781</SHA-1>
              <MD5>bec9c9b125658bb37b68c0e77b45be64</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>0e0e1445c5e8e71f75cb4fae6aefa745aa45d8542ea8477ca53b443fa35d3af2</SHA-256>
              <SHA-1>80da2a867ac470f52e428ceb4c1602c0de898f88</SHA-1>
              <MD5>13aff914fef3fbc1a74fa325ef3c79b9</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>4bf982d7954d8e2950055616755d003d5b505628e1edce8e81c52042354bae84</SHA-256>
              <SHA-1>232ce9f43f9f274749a46a73546730d35aae8af7</SHA-1>
              <MD5>dde72f563c7ec19be85d641967daf300</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>515c119fbfa53551481ff25fff0d12799b01a87a67c75baad4b56475dbb0e85a</SHA-256>
              <SHA-1>139a41a8543b3c24a9f0cce41091143c96a48eda</SHA-1>
              <MD5>e2ee6e356ee3acef95694d8272a7a82f</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>54903bf0cf7419b751a665d36c98a34fcea00f98396c4a74f055a800624ca05d</SHA-256>
              <SHA-1>5cdbc876cc467ea76d0347d409142956a902ac62</SHA-1>
              <MD5>aac8ac3b19b7f3c2339cf9f7fb892ff8</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>6b83a7ca1fd858233c5d221e8b440cd12ca874c9f1f409236cdcd4b8a73052ba</SHA-256>
              <SHA-1>0806e89da7d0beeca7026d707b96d8cb8ec3d928</SHA-1>
              <MD5>affaaa011616001ceca7113e86005390</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>6df19d72f977a4c5f9904d82a9f4e285a3676222b0ed273d973264a947625df4</SHA-256>
              <SHA-1>3487ae973ab4583ebcc06825472c5c49030d1d09</SHA-1>
              <MD5>a0aaa7fbceb61353002f6216af4c64f9</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>7f24517346549d1ec2e3424aeed105be98ee34e7e8ca842aa0b3ebdf7541d740</SHA-256>
              <SHA-1>47319400e8c638b2428d3b4b418799fed725341e</SHA-1>
              <MD5>bb7a7fc13e9968cb5a738492cb8f226a</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>a3bbada2fac3ed5bb02c4b035fe177445aee6587daaf1e35f157e7385d03cfa0</SHA-256>
              <SHA-1>4c87a5c905eae7877e774dfbcac484e82778dd97</SHA-1>
              <MD5>e433adc6eddaf9213f02c439b3a78e87</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>cfa6044a95f58cdfbf708859ccb49d5055336d1b781339dffb5051e839218f22</SHA-256>
              <SHA-1>63d7879572d4bff96dcc0094ac20e99911d2fc10</SHA-1>
              <MD5>a3bd8309ca0d8bf0477f4498e1e002dc</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>dc86f672e102f4c96f4397d243c2664ae9e2e26088a3b685c7892a7116849c11</SHA-256>
              <SHA-1>ceb24b520dd5c131cf71981bbbe4f7b217f75895</SHA-1>
              <MD5>6c283977eede8995eecc94b0b93bc683</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>e062c421e7c5e91b56018a400def1ad92de2dea7ce133bba774fe85154051979</SHA-256>
              <SHA-1>d0d295c8a965fa315bc026d14a0388e58c64c768</SHA-1>
              <MD5>57d60133194e68e2c370e9e38527695b</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>eec83e441df2ef97e3594d058d622c695d9ec9ceab33c52c2027ec2280018df7</SHA-256>
              <SHA-1>51cae4a9f534f5bf468f31d2ff4bad98868c887f</SHA-1>
              <MD5>02c1e5f8cacede8b7037842cd63873fe</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>f698b838f575b3aca05a1e1adf0b763fe4a08d8b1c3d2b5507ea0c62b0d34282</SHA-256>
              <SHA-1>e1bb054b408fd39fb4a64a9cfcabd2a20cda5cce</SHA-1>
              <MD5>bd39c83c2de11c744c779401d3b5f3f7</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>d8f690682a3e6f3468a48a891056aec96b666157257e2854fffcd29b8ee43fd1</SHA-256>
              <SHA-1>5177f4d18fbc9e74bedefca0bd92431ff2abdad5</SHA-1>
              <MD5>7ec8087d989158e891bcdc5ac76fd2da</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
          <registry>
            <value>
              <registry>SOFTWARE\JavaSoft\Java Update\Policy</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\JavaSoft\Java Update\Policy\jucheck</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows NT\CurrentVersion</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\JavaSoft\JDK</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\JavaSoft\JRE</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\JavaSoft\Java Development Kit</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\JavaSoft\Java Runtime Environment</registry>
              <origin>INPUT_FILE</origin>
            </value>
          </registry>
        </iocs>
        <name>a3f6b8b45482c40b44798804b5fed2b0f354c0d17726fdf4d131de7267c57f83.exe</name>
        <report_id>641ba493-a141-41a6-8e5a-75798bead075</report_id>
        <tags>
          <value>peexe</value>
          <value>html</value>
          <value>sality</value>
          <value>virus</value>
          <value>packed</value>
          <value>adaptive-context</value>
          <value>anti-debug</value>
          <value>fingerprint</value>
          <value>overlay</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>microsoft_visual_cc</value>
          <value>soft-404</value>
          <value>installer-heuristic</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>1f1aabe87e5e93a8fff769bf3614dd559c51c80fc045e11868f3843d9a004d1e</id>
    <title>Analysis Report for 1f1aabe87e5e93a8fff769bf3614dd559c51c80fc045e11868f3843d9a004d1e</title>
    <updated>2026-04-13T04:00:02Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a4f3040601e24ad5f20</_id>
        <file_type>application/x-msdownload; format=pe64</file_type>
        <flow_id>69dc6a405ea31bc68a24aa3d</flow_id>
        <hash>1f1aabe87e5e93a8fff769bf3614dd559c51c80fc045e11868f3843d9a004d1e</hash>
        <iocs>
          <urls>
            <value>
              <url>http://schemas.microsoft.com/SMI/2005/WindowsSettings</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>schemas.microsoft.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>5.1.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>13.107.226.45</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>13.107.226.45</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>106cd3065cfce15660f09283aef990eae7da18b5b0647af0f452dff5fc8693ab</SHA-256>
              <SHA-1>b23a1c780971d23b2209e59c6a6bb9a9819b9f03</SHA-1>
              <MD5>b1f72e3a731b4b6f7f4d0b63bbf84f8c</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>17fc8eb8ddf6c20982d2ea103e2045e1ff3ab5d96ae62d40461170b6a721c522</SHA-256>
              <SHA-1>577357fab4359a26d5fa363e3c39c5211358f0a7</SHA-1>
              <MD5>57669ba4cee910ede46704e861c6b0e6</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>78d04d95d721f16e212cf1992616648b27529416bb0ecf27ec195a1209a97365</SHA-256>
              <SHA-1>025cbe5611d50c7543f0b9443e7fc845b11eaae1</SHA-1>
              <MD5>1f6f39f50b990c9ae9e8764e4354d125</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>9266b0e7f8f88388a5a6f482a51b685c41d901a2865cfface513f90ae9efcc56</SHA-256>
              <SHA-1>bce61ac411a86c79f9371952719a5aa683b8ccd3</SHA-1>
              <MD5>0500d3fc95c47ca0b1bdf5d8b749cd88</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>9ef4da8926be7e0b6d2d031b51eaccb3e3d4f50d06519ecefc007421eab4f5b6</SHA-256>
              <SHA-1>ee7c545038ace59e2ad8e2d437ee58a788bae20e</SHA-1>
              <MD5>f3c5e07f69b956714106da40ccf0e897</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>b10e28a32eddb2ab20a46ceae59d9c0786911eb20f0c8dd2a28421f226ea2b8b</SHA-256>
              <SHA-1>6883ce60e71a83424db0b41d0ab6bf61080e3de2</SHA-1>
              <MD5>d59e0d372ea5fd8c1f4de744376a6af4</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>b42e1848b35089700d9cb68850002c804f37e9545efaefd423ecbbd001b62798</SHA-256>
              <SHA-1>b33ba50bcdc66a0c09d1e5c62ca6064be2a4ceaa</SHA-1>
              <MD5>4e7f64d7e78870680ff710314d246c01</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>cd07dc2185fca682e34141b058a2b4794bfde621a0e355e6e7080686a8c78750</SHA-256>
              <SHA-1>0bedf3194368bdd38e251794b400804a566942f0</SHA-1>
              <MD5>30d3c08a7e102b3c76c369e7d689187e</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>df6a3bd4442f0ef9afc9580396ee5bd0da82afe4b295653bb63776685f14b2ba</SHA-256>
              <SHA-1>e63061ad1e334630741ab6e1cc838e5e3c7e2621</SHA-1>
              <MD5>b9c5265605e952188e66698d5856c2e0</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
          </files>
          <uuids>
            <value>
              <uuid>25336920-03f9-11cf-8fd0-00aa00686f13</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
        </iocs>
        <name>mshta.exe_</name>
        <report_id>2e385d60-dbd3-4186-80a2-5f473f0e6992</report_id>
        <tags>
          <value>peexe</value>
          <value>explorer</value>
          <value>lolbin</value>
          <value>microsoft_visual_cc</value>
          <value>mshta</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>9af650d19058403fb009856768468b2bca79fb18714faf0814615ba5b7893520</id>
    <title>Analysis Report for 9af650d19058403fb009856768468b2bca79fb18714faf0814615ba5b7893520</title>
    <updated>2026-04-13T03:59:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a3280678438b878ae55</_id>
        <file_type>text/x-chdr</file_type>
        <flow_id>69dc6a0c5ea31bc68a24a99c</flow_id>
        <hash>9af650d19058403fb009856768468b2bca79fb18714faf0814615ba5b7893520</hash>
        <iocs/>
        <name>bench.h</name>
        <report_id>869a845c-dd17-4a48-99a1-3c57bb7763af</report_id>
        <tags>
          <value>txt</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>f1c9eb2e079c62f7a526b89f81e58685e3c9a1558015fc03dc05200f74e89967</id>
    <title>Analysis Report for f1c9eb2e079c62f7a526b89f81e58685e3c9a1558015fc03dc05200f74e89967</title>
    <updated>2026-04-13T03:59:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a3480678438b878ae57</_id>
        <file_type>text/x-chdr</file_type>
        <flow_id>69dc6a0c5ea31bc68a24a99c</flow_id>
        <hash>f1c9eb2e079c62f7a526b89f81e58685e3c9a1558015fc03dc05200f74e89967</hash>
        <iocs/>
        <name>DES_std.h</name>
        <report_id>0cad2391-bc67-485b-9609-5f73992d5eba</report_id>
        <tags>
          <value>txt</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>c09d2a64ba5402155a827afe1e43ef839c8b67d850d143931637bd7748ac14f8</id>
    <title>Analysis Report for c09d2a64ba5402155a827afe1e43ef839c8b67d850d143931637bd7748ac14f8</title>
    <updated>2026-04-13T03:59:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a3680678438b878ae59</_id>
        <file_type>text/x-csrc</file_type>
        <flow_id>69dc6a0c5ea31bc68a24a99c</flow_id>
        <hash>c09d2a64ba5402155a827afe1e43ef839c8b67d850d143931637bd7748ac14f8</hash>
        <iocs/>
        <name>batch.c</name>
        <report_id>e384f3d6-feaf-4110-8513-2e2b1f4adca1</report_id>
        <tags>
          <value>txt</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>7ad929e50739930374b81a14a01eb98c6b1196fbfee8f33f6603caaaacbadbc3</id>
    <title>Analysis Report for 7ad929e50739930374b81a14a01eb98c6b1196fbfee8f33f6603caaaacbadbc3</title>
    <updated>2026-04-13T03:59:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a2e80678438b878ae4f</_id>
        <file_type>text/x-chdr</file_type>
        <flow_id>69dc6a0c5ea31bc68a24a99c</flow_id>
        <hash>7ad929e50739930374b81a14a01eb98c6b1196fbfee8f33f6603caaaacbadbc3</hash>
        <iocs/>
        <name>BF_std.h</name>
        <report_id>f562bb0d-4653-4081-ba5f-9f3e82a3103d</report_id>
        <tags>
          <value>txt</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>687cd99f38c16ca47daa4d569100aa1dc1ad710286c79c9c422fb9ac4689145d</id>
    <title>Analysis Report for 687cd99f38c16ca47daa4d569100aa1dc1ad710286c79c9c422fb9ac4689145d</title>
    <updated>2026-04-13T03:59:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a3080678438b878ae52</_id>
        <file_type>text/x-csrc</file_type>
        <flow_id>69dc6a0c5ea31bc68a24a99c</flow_id>
        <hash>687cd99f38c16ca47daa4d569100aa1dc1ad710286c79c9c422fb9ac4689145d</hash>
        <iocs/>
        <name>config.c</name>
        <report_id>f4c9d52a-bdf7-4a79-963f-1293c4d3e9ff</report_id>
        <tags>
          <value>txt</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>d1f235779955578ea8bb812e798f41184658ccccc7e2c6a6d1b433d6d3d947e4</id>
    <title>Analysis Report for d1f235779955578ea8bb812e798f41184658ccccc7e2c6a6d1b433d6d3d947e4</title>
    <updated>2026-04-13T03:59:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a2c80678438b878ae4d</_id>
        <file_type>text/x-ini</file_type>
        <flow_id>69dc6a0c5ea31bc68a24a99c</flow_id>
        <hash>d1f235779955578ea8bb812e798f41184658ccccc7e2c6a6d1b433d6d3d947e4</hash>
        <iocs/>
        <name>OPTIONS</name>
        <report_id>3b5b7fdc-56c5-4d0e-9a71-edbe226331d3</report_id>
        <tags>
          <value>txt</value>
          <value>ini</value>
          <value>exploit</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>f84d5d7440550e7ab137112d590d4b4a7855c9147fe3a1c9c2c2f55b89ae6d79</id>
    <title>Analysis Report for f84d5d7440550e7ab137112d590d4b4a7855c9147fe3a1c9c2c2f55b89ae6d79</title>
    <updated>2026-04-13T03:59:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6b0480678438b878ae9f</_id>
        <file_type>text/plain</file_type>
        <flow_id>69dc6a0c5ea31bc68a24a99c</flow_id>
        <hash>f84d5d7440550e7ab137112d590d4b4a7855c9147fe3a1c9c2c2f55b89ae6d79</hash>
        <iocs/>
        <name>CONFIG</name>
        <report_id>5ffcd390-148c-46aa-aafa-857c6b1d3988</report_id>
        <tags>
          <value>txt</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>0baffb8e3c9475fda5156693e6d81347c2196393c705c1614b81f8cf327149da</id>
    <title>Analysis Report for 0baffb8e3c9475fda5156693e6d81347c2196393c705c1614b81f8cf327149da</title>
    <updated>2026-04-13T03:59:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6b0680678438b878aea1</_id>
        <file_type>text/plain</file_type>
        <flow_id>69dc6a0c5ea31bc68a24a99c</flow_id>
        <hash>0baffb8e3c9475fda5156693e6d81347c2196393c705c1614b81f8cf327149da</hash>
        <iocs/>
        <name>MODES</name>
        <report_id>449e98c1-788f-4be5-9c47-053defd91113</report_id>
        <tags>
          <value>txt</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>440734745f7b1651276f4d48cb72971d3426a3438eeaa898ba5615fc9a322051</id>
    <title>Analysis Report for 440734745f7b1651276f4d48cb72971d3426a3438eeaa898ba5615fc9a322051</title>
    <updated>2026-04-13T03:59:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a5080678438b878ae61</_id>
        <file_type>text/plain</file_type>
        <flow_id>69dc6a0c5ea31bc68a24a99c</flow_id>
        <hash>440734745f7b1651276f4d48cb72971d3426a3438eeaa898ba5615fc9a322051</hash>
        <iocs/>
        <name>EXAMPLES</name>
        <report_id>1a0d4ac8-697d-4080-b9de-cf83d8863ae2</report_id>
        <tags>
          <value>txt</value>
          <value>exploit</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>6a5e34d849e1c7f692fe76475d903a6410fbfdd549eb4d815147d47cd616f935</id>
    <title>Analysis Report for 6a5e34d849e1c7f692fe76475d903a6410fbfdd549eb4d815147d47cd616f935</title>
    <updated>2026-04-13T03:59:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6b0080678438b878ae9a</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc6a0c5ea31bc68a24a99c</flow_id>
        <hash>6a5e34d849e1c7f692fe76475d903a6410fbfdd549eb4d815147d47cd616f935</hash>
        <iocs/>
        <name>unique.exe</name>
        <report_id>4fb3c9ad-9981-4c35-9766-aa48969c8211</report_id>
        <tags>
          <value>peexe</value>
          <value>pwdump</value>
          <value>packed</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>a35a9e1c6a372475240d092e1f026dbf71e7ea022feab936e10af6955065d81d</id>
    <title>Analysis Report for a35a9e1c6a372475240d092e1f026dbf71e7ea022feab936e10af6955065d81d</title>
    <updated>2026-04-13T03:59:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6b0280678438b878ae9d</_id>
        <file_type>text/plain</file_type>
        <flow_id>69dc6a0c5ea31bc68a24a99c</flow_id>
        <hash>a35a9e1c6a372475240d092e1f026dbf71e7ea022feab936e10af6955065d81d</hash>
        <iocs/>
        <name>INSTALL</name>
        <report_id>14858a55-7571-4aa3-93aa-81ece8426e42</report_id>
        <tags>
          <value>txt</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>6a5e34d849e1c7f692fe76475d903a6410fbfdd549eb4d815147d47cd616f935</id>
    <title>Analysis Report for 6a5e34d849e1c7f692fe76475d903a6410fbfdd549eb4d815147d47cd616f935</title>
    <updated>2026-04-13T03:59:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6af380678438b878ae94</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc6a0c5ea31bc68a24a99c</flow_id>
        <hash>6a5e34d849e1c7f692fe76475d903a6410fbfdd549eb4d815147d47cd616f935</hash>
        <iocs/>
        <name>unafs.exe</name>
        <report_id>cb55d303-08b5-4540-ba93-bb08fd4e38fb</report_id>
        <tags>
          <value>peexe</value>
          <value>pwdump</value>
          <value>exploit</value>
          <value>packed</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>6a5e34d849e1c7f692fe76475d903a6410fbfdd549eb4d815147d47cd616f935</id>
    <title>Analysis Report for 6a5e34d849e1c7f692fe76475d903a6410fbfdd549eb4d815147d47cd616f935</title>
    <updated>2026-04-13T03:59:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6af480678438b878ae95</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc6a0c5ea31bc68a24a99c</flow_id>
        <hash>6a5e34d849e1c7f692fe76475d903a6410fbfdd549eb4d815147d47cd616f935</hash>
        <iocs/>
        <name>unshadow.exe</name>
        <report_id>897883ff-1188-472e-96c1-3447b7e31c3f</report_id>
        <tags>
          <value>peexe</value>
          <value>pwdump</value>
          <value>packed</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>21e2d05367adef594e8fd6bc3c9fb3782fc44978c7d6da3505c4dfaf718117e7</id>
    <title>Analysis Report for 21e2d05367adef594e8fd6bc3c9fb3782fc44978c7d6da3505c4dfaf718117e7</title>
    <updated>2026-04-13T03:59:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6aff80678438b878ae99</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc6a0c5ea31bc68a24a99c</flow_id>
        <hash>21e2d05367adef594e8fd6bc3c9fb3782fc44978c7d6da3505c4dfaf718117e7</hash>
        <iocs/>
        <name>cygwin1.dll</name>
        <report_id>4114903e-437e-4475-92ca-6d69658b97c7</report_id>
        <tags>
          <value>peexe</value>
          <value>pedll</value>
          <value>anti-debug</value>
          <value>packed</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>2c44de4de2ad20a60eb4d3c8719adb5e3ace4f0a2fafc60c8cfe12a3d2a587ea</id>
    <title>Analysis Report for 2c44de4de2ad20a60eb4d3c8719adb5e3ace4f0a2fafc60c8cfe12a3d2a587ea</title>
    <updated>2026-04-13T03:59:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6adf80678438b878ae8c</_id>
        <file_type>text/x-shellscript</file_type>
        <flow_id>69dc6a0c5ea31bc68a24a99c</flow_id>
        <hash>2c44de4de2ad20a60eb4d3c8719adb5e3ace4f0a2fafc60c8cfe12a3d2a587ea</hash>
        <iocs/>
        <name>passwd</name>
        <report_id>1ac06dc4-9981-44a1-8e1c-4835c04d8a27</report_id>
        <tags>
          <value>shell</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>42cf9fb77734620ca6fcb71f22185d08d127050ae524a4133840fde646bd1a1c</id>
    <title>Analysis Report for 42cf9fb77734620ca6fcb71f22185d08d127050ae524a4133840fde646bd1a1c</title>
    <updated>2026-04-13T03:59:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6aea80678438b878ae90</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc6a0c5ea31bc68a24a99c</flow_id>
        <hash>42cf9fb77734620ca6fcb71f22185d08d127050ae524a4133840fde646bd1a1c</hash>
        <iocs/>
        <name>john.exe</name>
        <report_id>2adc8f9a-6bb5-4748-b37a-ae9743ef33a5</report_id>
        <tags>
          <value>peexe</value>
          <value>unsafe</value>
          <value>exploit</value>
          <value>packed</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>e629e6a690916c297f05278c3338c058a71d95010f4cf9d6b52bebc02c9e6106</id>
    <title>Analysis Report for e629e6a690916c297f05278c3338c058a71d95010f4cf9d6b52bebc02c9e6106</title>
    <updated>2026-04-13T03:59:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a4e80678438b878ae5f</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc6a0c5ea31bc68a24a99c</flow_id>
        <hash>e629e6a690916c297f05278c3338c058a71d95010f4cf9d6b52bebc02c9e6106</hash>
        <iocs/>
        <name>GIFutil.dll</name>
        <report_id>746b4e3f-71f6-4c1d-a0af-ccaf06fc78b3</report_id>
        <tags>
          <value>peexe</value>
          <value>pedll</value>
          <value>microsoft_visual_cc</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>97c2f6bd336b9e323b3d4280c06b70484256a09ec03189e9c28607e5f964c9de</id>
    <title>Analysis Report for 97c2f6bd336b9e323b3d4280c06b70484256a09ec03189e9c28607e5f964c9de</title>
    <updated>2026-04-13T03:59:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a6080678438b878ae6c</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc6a0c5ea31bc68a24a99c</flow_id>
        <hash>97c2f6bd336b9e323b3d4280c06b70484256a09ec03189e9c28607e5f964c9de</hash>
        <iocs>
          <files>
            <value>
              <SHA-256>56beca440318afd6a869f37bbf27e4a0662825e7e107684ad33702cb59c256ff</SHA-256>
              <SHA-1>53ef8438e2387f65bdd93e9f42222216dbbe5678</SHA-1>
              <MD5>ebb27535883a0649203582547cedcb1b</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
          </files>
        </iocs>
        <name>cryptlib.dll</name>
        <report_id>18b662fb-9654-4e8e-9970-8f645658d167</report_id>
        <tags>
          <value>peexe</value>
          <value>pedll</value>
          <value>microsoft_visual_cc</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>7463c4f20c8e46c91afce27082fd16bfdb7bd8e8a726ddd34c56481fb2f499fe</id>
    <title>Analysis Report for 7463c4f20c8e46c91afce27082fd16bfdb7bd8e8a726ddd34c56481fb2f499fe</title>
    <updated>2026-04-13T03:59:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a7680678438b878ae74</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc6a0c5ea31bc68a24a99c</flow_id>
        <hash>7463c4f20c8e46c91afce27082fd16bfdb7bd8e8a726ddd34c56481fb2f499fe</hash>
        <iocs>
          <files>
            <value>
              <SHA-256>0d782b77499b828d1708b075640bfa3f7c36902e356294aca79f0a0e2f11f774</SHA-256>
              <SHA-1>b260e7e05ac699fa42b78d63de9ce471036610d0</SHA-1>
              <MD5>82d91c42ca0133b135ac294373255e8b</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>0e738137e59c938ff5bd5a6ffff7f5e3960bc8f388ed929e3eda4b77b16d2ad1</SHA-256>
              <SHA-1>e10a83fca3fa0aad45171ef7447b1ac9ec42c050</SHA-1>
              <MD5>771e463ab71851d41069a22e75cb6273</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>1757148596ac1455ba95e123f01284348301b1895ee96639437750f03ed77ce0</SHA-256>
              <SHA-1>762cbfb3a3c43aed45a534d6940cf0cced51b89f</SHA-1>
              <MD5>e8eb10e8900cd2c86e55482d2434b21a</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>390e2ce3bb85cf16bb9e2665629a06813cb037a3052dc436ed16d1f40bd0c400</SHA-256>
              <SHA-1>2f2a45d8fc45220162a88ee45a3167121f0b9d15</SHA-1>
              <MD5>592f77510b132e79d0b338bc7fd3936d</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>43005596ed4e248d85d95ab46d762449899d6c120a881b6d78f464f65bcedc93</SHA-256>
              <SHA-1>9ef94e5cd2ad9e0d83359a6d3ce5543cf98856c7</SHA-1>
              <MD5>e288264e2dfebfb3cb8ef98ab0fe286c</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>593cc223457012d4daf74087c46c869747d4f9f4a9967e7f6cbd0bc4ba777ffb</SHA-256>
              <SHA-1>ae77796dccf0a48155b22227976eab97b49aee90</SHA-1>
              <MD5>96d029098d66ba7629b4ddbfd1f40f6d</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>72321d6c8de0b6efef55e601cb48b83bc81989f99b6d2583224f2c19ee236daa</SHA-256>
              <SHA-1>30637fcb2a4c9ce6b7720b60b5458d1bc4393cb4</SHA-1>
              <MD5>cefeeb5e043e0fb32fa7a84102873db9</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>85cc09a73125fbc075c7a455ec5d841fb1e9558dcc4f7cf06eae0402308a8cb0</SHA-256>
              <SHA-1>ec53b11714ab856e26624ab0e742bec2410e384e</SHA-1>
              <MD5>10a1b0b6815b9cbe7a227bad953c7fa1</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>a16e1a16ae8d8053c7a8d401cdbbf78ed068f86c33975519a2a1019ef6070975</SHA-256>
              <SHA-1>aebd4187d6885f9ed4968910cbd91e562940556b</SHA-1>
              <MD5>7c6fc2c4d70eb2dfd6c5d8899fab2c65</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>b851987e81137e0be47b50e7dfb9260e6efb723643b089bc6696baaf7698dc5c</SHA-256>
              <SHA-1>0e9c0406708a6d9ed35147bc63373ed606c19974</SHA-1>
              <MD5>03c532a75146b38553d73a49b3539286</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>c6f7f0653049bd06d7961694d570c8821c5b34d445786d48b9f058fffe798fa5</SHA-256>
              <SHA-1>be20826f18379c4a046fc39893c898bddd74a2a5</SHA-1>
              <MD5>07105c5dbffda2a39def926782919c98</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>c771e295973c8811c8fbb19e140fa1ba20b18bbe644c119995bba86815d6b5e3</SHA-256>
              <SHA-1>178872ad10144b2dc1c3c9f154a3d7caaa3f4c60</SHA-1>
              <MD5>782c837592b42e85fd6e484a76163324</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>ca1bbbbe382b853f7105cd3339b808800a587ea2776b5e60340127a7f134e58b</SHA-256>
              <SHA-1>fddb7cf78c0feab95b01ea05116e2892a796819c</SHA-1>
              <MD5>2158e896eca8cbe0af5d8660cba51eb8</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>cd893173ffb8026342a3f59f0f61e738703e8b521b040bb5697864eaacbc1979</SHA-256>
              <SHA-1>ee37ad175f1a7ea98db002902c468fec4c28574c</SHA-1>
              <MD5>2aef35fda8dd23d36fab4e2ffc6c631f</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>d08cfbd97370c20c4711bfce9c918a7f37641d416f01f77e077a944f6704e540</SHA-256>
              <SHA-1>4940b4748a93f63222ea9b485c80625846378d91</SHA-1>
              <MD5>81672a42f7af12384c2d80bafabcff27</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>d33692325cca6421e0024ee1207f89c6703383fc82cfe2a3579894e2a3574123</SHA-256>
              <SHA-1>0e1c08e85d6aec17235a877e76f9b85da9caa6ca</SHA-1>
              <MD5>5269e9c76a16bf55307f7cac680fb0da</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>d4979733106cc868a71d8463b9958e299c74a66ef7e49b6a3b529bd4a88dabb3</SHA-256>
              <SHA-1>d8e8cdaacb3006bc0c31943c49caaf27a7a3d62f</SHA-1>
              <MD5>0b91c6c5c76b4df9a02a8d76167f4300</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>d6dfdd251e53b63a61f3cf879352ac1a2a3d0925db310fd0d2d9a853760c79d4</SHA-256>
              <SHA-1>90af7523c33f60ea2c47c2a0104395b2d253d7cf</SHA-1>
              <MD5>8332913ddcb227fdc5fda84e4a3c1f46</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>f4b5810cec1be259b64fc802b9546701790ebfab40dc4bcb17101298d8cac54c</SHA-256>
              <SHA-1>ba8328337d133e2747ad164cd1a6fca4f7c6b1f4</SHA-1>
              <MD5>18e4e4f5a294beb635068d5730083405</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>fa48a9bf22a7873dfd70edb54419caccf0acbec219b6c8c4734e4cf9d721d76b</SHA-256>
              <SHA-1>f77a248377dd9fa038cc3fc5fcc563c8905af8f0</SHA-1>
              <MD5>eb1b5c23e75d0782fb120382edeb62a3</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
          </files>
          <registry>
            <value>
              <registry>Software\S-Tools\4.0</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </registry>
        </iocs>
        <name>S-Tools.exe</name>
        <report_id>16ceeda4-dfcd-4852-85e7-f7f97e8f9c7a</report_id>
        <tags>
          <value>peexe</value>
          <value>adaptive-context</value>
          <value>keylogger</value>
          <value>microsoft_visual_cc</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>4d7726f86b2925f0b17f4e3caa6ccce54566f1f413eda2824b04496257d97aa1</id>
    <title>Analysis Report for 4d7726f86b2925f0b17f4e3caa6ccce54566f1f413eda2824b04496257d97aa1</title>
    <updated>2026-04-13T03:59:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a5c80678438b878ae67</_id>
        <file_type>application/octet-stream</file_type>
        <flow_id>69dc6a0c5ea31bc68a24a99c</flow_id>
        <hash>4d7726f86b2925f0b17f4e3caa6ccce54566f1f413eda2824b04496257d97aa1</hash>
        <iocs/>
        <name>Sample Netstumbler_.ns1</name>
        <report_id>70f02f63-1569-420d-9a11-2dcdbc00996b</report_id>
        <tags>
          <value>data</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>28746f8e8d00ae3cb04699c37992bc007eb04a2ca05d7d873bfdd9d8fcffab6a</id>
    <title>Analysis Report for 28746f8e8d00ae3cb04699c37992bc007eb04a2ca05d7d873bfdd9d8fcffab6a</title>
    <updated>2026-04-13T03:59:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a5e80678438b878ae6a</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc6a0c5ea31bc68a24a99c</flow_id>
        <hash>28746f8e8d00ae3cb04699c37992bc007eb04a2ca05d7d873bfdd9d8fcffab6a</hash>
        <iocs/>
        <name>zlib.dll</name>
        <report_id>95896a13-c15f-472e-95fe-bf77fe4d59f0</report_id>
        <tags>
          <value>peexe</value>
          <value>pedll</value>
          <value>microsoft_visual_cc</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>68a7c446437bf08078c585816fb9ef8db11468a91f4dc124fd5afd53851f818b</id>
    <title>Analysis Report for 68a7c446437bf08078c585816fb9ef8db11468a91f4dc124fd5afd53851f818b</title>
    <updated>2026-04-13T03:59:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a2880678438b878ae4b</_id>
        <file_type>application/x-msdownload; format=pe</file_type>
        <flow_id>69dc6a0c5ea31bc68a24a99c</flow_id>
        <hash>68a7c446437bf08078c585816fb9ef8db11468a91f4dc124fd5afd53851f818b</hash>
        <iocs>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </registry>
        </iocs>
        <name>NetStumblerInstaller_0_3_30_.exe</name>
        <report_id>6c026da0-d3a0-4fcc-b0c2-0f116d1282a7</report_id>
        <tags>
          <value>peexe</value>
          <value>adaptive-context</value>
          <value>anti-debug</value>
          <value>installer</value>
          <value>nsis</value>
          <value>microsoft_visual_cc</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>f3caa479809e3fa7cf4e71e75c63075ec53bc69343500b178edce4b9e3c6f384</id>
    <title>Analysis Report for f3caa479809e3fa7cf4e71e75c63075ec53bc69343500b178edce4b9e3c6f384</title>
    <updated>2026-04-13T03:59:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6a5980678438b878ae65</_id>
        <file_type>application/x-dosexec</file_type>
        <flow_id>69dc6a0c5ea31bc68a24a99c</flow_id>
        <hash>f3caa479809e3fa7cf4e71e75c63075ec53bc69343500b178edce4b9e3c6f384</hash>
        <iocs>
          <ips>
            <value>
              <ip>1.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>6.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <registry>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion</registry>
              <origin>INPUT_FILE</origin>
            </value>
          </registry>
        </iocs>
        <name>netstumblerinstaller_0_4_0_.exe</name>
        <report_id>334316f5-a3c1-49e0-b5f2-eae67a14f819</report_id>
        <tags>
          <value>peexe</value>
          <value>anti-debug</value>
          <value>fingerprint</value>
          <value>installer</value>
          <value>nsis</value>
          <value>microsoft_visual_cc</value>
          <value>installer-heuristic</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>de955460b9104a90bf088f9c01377bc427a42ca57c2cdd3a6703a04e62493121</id>
    <title>Analysis Report for de955460b9104a90bf088f9c01377bc427a42ca57c2cdd3a6703a04e62493121</title>
    <updated>2026-04-13T03:57:38Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc69f2f9522792fdaf816a</_id>
        <file_type>application/x-dosexec</file_type>
        <flow_id>69dc69b09124ebc087508cf5</flow_id>
        <hash>de955460b9104a90bf088f9c01377bc427a42ca57c2cdd3a6703a04e62493121</hash>
        <iocs>
          <urls>
            <value>
              <url>http://cdn.theyardservice.com</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://dataplane.theyardservice.com</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>http://cacerts.digicert.com/DigiCertTrustedG4TimeStampingRSA4096SHA2562025CA1.crt0_</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>http://crl3.digicert.com/DigiCertTrustedG4TimeStampingRSA4096SHA2562025CA1.crl0</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>http://crl3.digicert.com/DigiCertTrustedRootG4.crl0</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>http://download.microsoft.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://logintoaccount.site</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://update.microsoft.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>cacerts.digicert.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>crl3.digicert.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>download.microsoft.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>logintoaccount.site</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>update.microsoft.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>cdn.theyardservice.com</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>dataplane.theyardservice.com</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>decrypt@didyouransome.onion</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>72.246.28.227</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>178.162.202.97</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>104.207.140.119</ip>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <ip>85.17.155.52</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>128.85.102.70</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>104.21.38.82</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>cdn.theyardservice.com</ip>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <ip>dataplane.theyardservice.com</ip>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <ip>download.microsoft.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>logintoaccount.site</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>update.microsoft.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <MD5>b8e76ddb52d0eb41e972599ff3ca431b</MD5>
              <SHA-1>fc12d7ad112ddabfcd8f82f290d84e637a4d62f8</SHA-1>
              <SHA-256>165c5c883fd4fd36758bcba6baf2faffb77d2f4872ffd5ee918a16f91de5a8a8</SHA-256>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <MD5>7fe6016d770824ee590ecd79562e9959</MD5>
              <SHA-1>dc3038fbef38ea51c6ddeff5bea5b1f8fff3fef6</SHA-1>
              <SHA-256>eadb1b81d53f71e47f2536501859fe5684eafe3f9085eeeeee95d44f8d746bb6</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <MD5>8d5980fcc2331f9d315dffd85d050def</MD5>
              <SHA-1>f42fd43a010186b5829b08033d8fcf49c57c4a57</SHA-1>
              <SHA-256>7ca1b1dc2f43c5983d90192089ccd22bc10218fdbc2e406ad7d71b48a7760968</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\VisualStudio\9.0\Setup\VS</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Oracle\VirtualBox Guest Additions</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\VMware, Inc.\VMware Tools</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Classes\ms-settings\Shell\open\command</registry>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </registry>
          <btc_wallets>
            <value>
              <btc_wallet>0xe6cd0:$btc: 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
          </btc_wallets>
        </iocs>
        <name>de955460b9104a90bf088f9c01377bc427a42ca57c2cdd3a6703a04e62493121.exe</name>
        <report_id>232b25ba-82cc-4c25-8eb5-d0375ce5d5b9</report_id>
        <tags>
          <value>peexe</value>
          <value>html</value>
          <value>cobalt</value>
          <value>config-extracted</value>
          <value>beacon</value>
          <value>cobaltstrike</value>
          <value>windows</value>
          <value>apt</value>
          <value>threat</value>
          <value>unknown</value>
          <value>anti-security</value>
          <value>anti-vm</value>
          <value>evasive</value>
          <value>crypto</value>
          <value>explorer</value>
          <value>hacktool</value>
          <value>packed</value>
          <value>expand</value>
          <value>lolbin</value>
          <value>wmic</value>
          <value>microsoft_visual_cc</value>
          <value>packer_detected</value>
          <value>signed</value>
          <value>base64</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>870fdcdaff1efd37c210916f973fb4e3c70e718a35cb816dd38c93b9b29790ea</id>
    <title>Analysis Report for 870fdcdaff1efd37c210916f973fb4e3c70e718a35cb816dd38c93b9b29790ea</title>
    <updated>2026-04-13T03:57:04Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc69a080678438b878ae31</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc698e799d5bf325fa6ec1</flow_id>
        <hash>870fdcdaff1efd37c210916f973fb4e3c70e718a35cb816dd38c93b9b29790ea</hash>
        <iocs>
          <domains>
            <value>
              <url>blaster.misraicesbelen.com</url>
              <origin>MALWARE_CONFIG</origin>
            </value>
            <value>
              <url>melissa.misraicesbelen.com</url>
              <origin>MALWARE_CONFIG</origin>
            </value>
            <value>
              <url>misraicesbelen.com</url>
              <origin>MALWARE_CONFIG</origin>
            </value>
            <value>
              <url>www.misraicesbelen.com</url>
              <origin>MALWARE_CONFIG</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>104.18.3.249</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>104.18.2.249</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>104.18.3.249</ip>
              <origin>MALWARE_CONFIG</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>104.18.2.249</ip>
              <origin>MALWARE_CONFIG</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>23202710be8c5fc9672495b0b62bebcf29a087cc7e07236f6bb155efb6e499ad</SHA-256>
              <SHA-1>a60ebbbcae868abd27fc96e22701fae48940e53c</SHA-1>
              <MD5>16ec11406456535d1de48d96513667e8</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>4ff1c75a93b2280dabe75acecade82d644388c9f4412565d846aeb396bfdc133</SHA-256>
              <SHA-1>6a55e1445c1c915664fba385828c5a0078fe460d</SHA-1>
              <MD5>f3d7095de1636559aa56ad81b25bbff9</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>text/xml</file_type>
            </value>
          </files>
          <uuids>
            <value>
              <uuid>1f676c76-80e1-4239-95bb-83d0f6d0da78</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>35138b9a-5d96-4fbd-8e2d-a2440225f93a</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>e2011457-1546-43c5-a5fe-008deee3d3f0</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
          <registry>
            <value>
              <registry>Software\</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
          </registry>
        </iocs>
        <name>870fdcdaff1efd37c210916f973fb4e3c70e718a35cb816dd38c93b9b29790ea.exe</name>
        <report_id>0b46ad94-b405-4fba-b4cd-b7ff9f8e1157</report_id>
        <tags>
          <value>peexe</value>
          <value>dotnet_pe</value>
          <value>asyncrat</value>
          <value>config-extracted</value>
          <value>reg</value>
          <value>dcrat</value>
          <value>fareit</value>
          <value>razy</value>
          <value>samas</value>
          <value>unsafe</value>
          <value>anti-vm</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>reconnaissance</value>
          <value>lolbin</value>
          <value>schtasks</value>
          <value>obfuscated</value>
          <value>vbnet</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>a8ed28f1c7c8303dfaba5c83299ed77ccd40136ef3eb06301f0fd3a066dc633a</id>
    <title>Analysis Report for a8ed28f1c7c8303dfaba5c83299ed77ccd40136ef3eb06301f0fd3a066dc633a</title>
    <updated>2026-04-13T03:56:31Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc698180678438b878ae2a</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc696d5ea31bc68a24a7ff</flow_id>
        <hash>a8ed28f1c7c8303dfaba5c83299ed77ccd40136ef3eb06301f0fd3a066dc633a</hash>
        <iocs>
          <files>
            <value>
              <SHA-256>ae311adbe70da0c8efe250f23f650ccf63e46bbbdf2443838928c8b6d9d48667</SHA-256>
              <SHA-1>a311d5ea79d93a9ae0f8425a6eb96b1fc165373e</SHA-1>
              <MD5>fa5f0ba37bac6582c7af1e3ea9cdcab8</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
          </files>
        </iocs>
        <name>hl.dll</name>
        <report_id>d22a0a9b-ab36-4eb8-9452-c754b3c1bdb5</report_id>
        <tags>
          <value>peexe</value>
          <value>pedll</value>
          <value>microsoft_visual_cc</value>
          <value>overlay</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>a2c810ac318beac4804f35c0ac0fec472d2aa737013c3e0cf0d668a52d6bd828</id>
    <title>Analysis Report for a2c810ac318beac4804f35c0ac0fec472d2aa737013c3e0cf0d668a52d6bd828</title>
    <updated>2026-04-13T03:53:39Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc692f80678438b878ae19</_id>
        <file_type>text/html</file_type>
        <flow_id>69dc68c35ea31bc68a24a648</flow_id>
        <hash>a2c810ac318beac4804f35c0ac0fec472d2aa737013c3e0cf0d668a52d6bd828</hash>
        <iocs>
          <urls>
            <value>
              <url>https://myhealthau-my.sharepoint.com/:u:/r/personal/pacificfair_myhealth_net_au/Documents/Myhealth%20Pacific%20Fair%20Medical%20Centre%20-%20PAST%20DUE%20REMINDER/CLICK%20HERE%20TO%20VIEW%20DOCUMENT.url?csf=1&amp;web=1&amp;e=FSa321</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>github.com</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.microsoftonline.com</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://login.microsoftonline.com/common/federation/oauth2msa</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>login.microsoftonline.com</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://aadcdn.msauth.net/</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://aadcdn.msauth.net/https://aadcdn.msftauth.net/</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://aadcdn.msftauth.net</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://aadcdn.msftauth.net/</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://aadcdn.msftauth.net/ests/2.1/content/cdnbundles/converged.v2.login.min_pzfy2abhlubh6bv_dyvwha2.css</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://aadcdn.msftauth.net/ests/2.1/content/cdnbundles/frameworksupport.min_oadrnc13magb009k4d20lg2.js</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ux.converged.login.strings-en.min_cbb9wf1-2b8knjgxpc5-rg2.js</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://aadcdn.msftauth.net/ests/2.1/content/cdnbundles/watson.min_82o5oyf7tvyeotpacdeksw2.js</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://aadcdn.msftauth.net/ests/2.1/content/cdnbundles/watsonsupportwithjquery.3.5.min_dc940oomzau4rsu8qesnvg2.js</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://aadcdn.msftauth.net/shared/1.0/</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>https://aadcdn.msftauth.net/shared/1.0/content/js/ConvergedLogin_PCore_iXvvVEAQxmEXtWhahp1L2Q2.js</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://aadcdn.msftauthimages.net/81d6b03a-p7tmfi-wbbtcac6kadlnkfoarrnceyo-g-auta8bz1o/logintenantbranding/0/bannerlogo?ts=638873633563908750</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://aadcdn.msftauthimages.net/81d6b03a-p7tmfi-wbbtcac6kadlnkfoarrnceyo-g-auta8bz1o/logintenantbranding/0/favicon?ts=638873623322364192</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://aadcdn.msftauthimages.net/81d6b03a-p7tmfi-wbbtcac6kadlnkfoarrnceyo-g-auta8bz1o/logintenantbranding/0/illustration?ts=638873627743430618</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://aadcdn.msftauthimages.net/81d6b03a-p7tmfi-wbbtcac6kadlnkfoarrnceyo-g-auta8bz1o/logintenantbranding/0/squarelogodark?ts=638873640031342004</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://aadcdn.msftauthimages.net/81d6b03a-p7tmfi-wbbtcac6kadlnkfoarrnceyo-g-auta8bz1o/logintenantbranding/0/tilelogo?ts=638873640029126264</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://account.live.com/password/reset?wreply=https%3a%2f%2flogin.microsoftonline.com%2fe3a87970-3249-4818-89b4-c79fc2824729%2freprocess%3fctx%3drQQIARAAnVNbiCRnFe6anu3dafcy00YMImadLCTZsaf_unVXDaxS1-6uTlV33acrhKWquvpWl67uqr6GVVmCLio4KG6Cvi0SYYgoihCWPOQlYdmXTBDBXRATzEIMmISEwAZBpPXFx-D3cPjOOZxzPg58l7PwPnxwCfwXaHEdi6DbhYuut2b_g0khv31ra-JcOMrErT__chL65_1jiOinaZwclErhsu_ZQdq3p8VwuZ_07YkXjwZRuu-OwtLV7mgSJqWO17WnQbpvJ_HiFQg6gaD3IOh4Y4yhKAHTOINxPAZoAsMBQ1RoEmAkzNMwRjI8xhAAIQDAKAbHQJGhKwzKYBzMYkQZB4Ap0xSCshxVxlmmTHEEgVAcg8NlBC-zgCEYnEfKFYrl0Qpg4TJ8f-NCk5qmfWQdRpPByvt4Y2ut8Wo8StKfZ1_ebLJgLgzFZUvnaY3Rl4rfR2Wdp-WAQ8Vhb6mbimbq6djyeU0N-g1BE6rtYT82h_1D6dAauaZUa_K0sa57YRtWqsHK1he0jJBjF_CSqkuyacaJMwzEti6NVa7T1EI8tiNJcwPasBE8caods2mOcGd9PzAWekj6Nmtw8mCdW4cOSqc2ryw0M5iKpjG3IoHTEFLS2L6omjoq-gtD5QRY1fq6y_UC0a_jHi_IzqHie76hKgGPW1WDM_0YlYAwa0e9pcFKNQsVbDny4bZuye1Dad5k3ZVqcpgVLiTFDGrtiB-7mmFrIIXtsLMy4NHSDgxO5BXR0wXdqUotGVnU3YhnRB2vi2EdGKbVsFb9QWdlLKwq-bTJCaZY1ed6OF9IRjAzh1IoryxVgpWhAdK-AZSGgwZzT1PqIpLa1lCaO9UOJnEppnHYSgaLlaovApsPqhaC0ypvrFzOUuxIwEVWQaSwrzeNWFj_v-MrCxX1A9G3BEW3aNNM0PahGIh-G7eioGbUAl8yA02OgkjXDc4NE1xS9aUcWaCNkDVbjxsdwwh0XUJMnw8VU2qZIY-5qDATNIk7zn4uA_0ue8lDbaJCVkARRTCyiBEwUSRIByu6FbLrIgSCVRDybjY3ir1o0DnZhN7fPAs2Ds6c2dk-_WjmYubhJnTrVCG_fed7zxduPv6AO95__akfOk9m7p4qhfUJUGMroR08KY_NMcpjwEz9RWiyErlklm1i1qCH1kjdA1fIA_goBx3lckc54Sj3xdu5rTPZ7cxulmnBH-WgG6czt7f-b1u_mIdOvgDdPwvnt9yRM7GjzqBTuATDTocABFokKh4oYrCDFx2nQhSB42KoS9iER9j3z2L5nBvYgzApXH5ud9C5mo58L9o9eG53ESZXXXfNZnYw9ZLdg2d2mRa8--y1a9eun_tc2187l3l4_qUPb_34-VsvfVh7_8I3CIJr7NVWaVds2kmQdpSpWytZCyJhWmNE6Pmx_DQcV3m4Mk2u_HY78_Z25njnwUY-zmOZTAb87R_0C288eufh75_45pc_u2x8_zH5DvTUp39XhMd-9cmbn2z-wHr13a9-PHvktW9995_Rnz6AV4X_TL3-68_-2nv5iX_dmz_y9d-89QB613j8ra_cdd75y8U_XszefObkJze_c_2DL91r4L84de3e9Z-euwg9CRXO57N20Cuc5hi2VuTUde5FbuE0heDlKiMWTqB81o5nhTsQRVEUoxt915cS2zSmnWqPoiial0GyEtfNZiuV4261Kg6xZOnu8SV_bIzcru726Eb3MNb9UTcutVrEXG2Yk5VfawkIL1KlXiudwh628BIz3euQ0YTp7iGHrl63Swou13xj0FKqSTzAOqAHlhQbBDPZj61Sb4oZiJ7A4dwgkXZDY-W1nB7H-vVavcRYc4kudWtyk1dVhdhjKtTMr1kj4srtnUJ-e3bjnTNz-9u1V_7w5s_Ofq39o7d3Mg93jrI3Cpl_Aw2\u0026mkt=en-US</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://autologon.microsoftazuread-sso.com/e3a87970-3249-4818-89b4-c79fc2824729/winauth/sso/edgeredirect</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://autologon.microsoftazuread-sso.com/e3a87970-3249-4818-89b4-c79fc2824729/winauth/sso/edgeredirect?client-request-id=627209a2-900f-7000-50d8-a4726d6b0e6b\u0026origin=login.microsoftonline.com\u0026is_redirected=1</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://go.microsoft.com/fwlink/?linkid=2013738</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://go.microsoft.com/fwlink/p/?LinkID=733247</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.live.com/Me.htm?v=3</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://login.live.com/forg</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://login.live.com/forgetme.srf</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://login.live.com/forgetme.srf?iframed_by=https%3a%2f%2flogin.microsoftonline.com</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.live.com/logout.srf</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://login.live.com/logout.srf?iframed_by=https%3a%2f%2flogin.microsoftonline.com</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.live.com/oauth20_authorize.srf</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://login.live.com/oauth20_authorize.srf?scope=openid+profile+email+offline_access\u0026response_type=code\u0026client_id=51483342-085c-4d86-bf88-cf50c7252078\u0026response_mode=form_post\u0026redirect_uri=https%3a%2f%2flogin.microsoftonline.com%2fcommon%2ffederation%2foauth2msa\u0026state=rQQIARAAnVNZiBuHGdas1rJXXdu7akJDKY27MSTxRqs5pZkFt8wpaZQZae7VhLLMpWsOjTSjM7gtJrSmLXRpqRPSN1MSWBIaWgrB5CEvCcYv2VAKsaE0oTG0gSYloeAQCEHtSx5DvoeP__4_fvgvZaE9aP8i-H8gxRUXwU4HKjreyvoSxoX81o2NsX3-KBO33vn9OPTP-c8DG4dBf-rtOcPwGMB7aRon-6VSuOh5VpD2rEkxXOwlPWvsxcN-lK7KSoed4ThMSq7XsSZBumcl8fxVADgBgH8CwPHaCEUQHKIwGmU5FKRwFANpvEIRIEpAHAWhBM2hNA7COAiiJI2hYJGmKjRCoyzEoHgZA0G6TJEwwrBkGWPoMsniOEyyNAaVYazMgDROYxxcrpAMh1RABipDd9fON8lJ2oNXNBz3l97HaxsrjYfxMEmfz7603mTAGT8QFi2No1RaW8h-D5E0jpICFhEG3YVmyKqhpSPT51Ql6DV4la-2B73YGPQOxANz6BhirclR-iruhW1IrgZLS5tTEkyMHJATFU2UDCNO7EEgtDVxpLBuUw2x2IpE1Qko3YKxxK66RtMYYvZqf6DPtZDwLUZnpf7KNw9shEotTp6rRjARDH1mRjyrwoSoMj1BMTRE8Oe6wvKQovY0h-0Ggl_HPI6X7APZ93xdkQMOM6s6a_gxIoL8tB11Fzoj1kyEt6TIh9qaKbUPxFmTcZaKwaJmOBdlI6i1I27kqLqlgilkhe5Sh4YLK9BZgZMFT-M1uyq2JHhedyKOFjSsLoR1UDfMhrns9d2lPjerxJMGyxtCVZtp4Wwu6sHUGIihtDQVEZIHOpj2dFBu2Egw81S5LsCpZQ7EmV11UZFNUZVFlxI4XyraPLC4oGrCGKVw-tJhTdmKeExgZFgMe1pTj_nV_V1fniuIHwi-ycuaSRlGgrQPhEDw25gZBTW9FviiEahSFESaprNOmGCioi2kyATbMFGztLjh6nqgaSJs-FwoG2LLCDnUQfgpr4rscfYrPdMfsxc9xMIrRAUsIjBKFFEcwos4YaNFp0J0HBiH0QpM3M7mhrEX9d2TdeCD9U1wbf_Mme2t0w9lLmTurwM3ThXyW7d--kzh-iP32OO9Nx7_hf1Y5vapUlgfg0psJpSNJeWRMUI4FDRSfx4ajEgs6EUbnzaogTlUdsHLxD50lAOOcrmjHH-U--bN3MaZ7FZmJ0u3oP_kgGunMzc3vvZbP5cHTr4BvLIJ3N2E8hvO0B5bkdt3CxchyHZxEEeKeMUDiyhkY0XbruBF0HZQxMEt3MOtu5toPucEVj9MCpee3um7h-nQ96Kd_ad35mFy6Dgra2oFEy_Z2X9qh25BOz-8cuXK1bNfafrrZzP3z73w0Y1fPXPjhY9qH5x_AsfZxm5tmXaEppUEqStPnFrJnOMJ3RrBfNePpSehuMpBlUly-ZWtzLtbmePte2v5OI9mMhnwH_-mnn3zoVv3__To97_16SX9Zw9Lt4DH__svmX_4xU_e-mT95-Zr73_n4-kDr__gJ59Ff_0QWhb-1_XGy5_-vfvSo5_fmT3wvT-8fQ94X3_k7W_ftt_724W_XMhef-rk19d_fPXDB-80sN-dunLn6m_OXgAeAwrn8lkr6BZOszRTK7LKyvcip3CahLFylRYKJ0A-a8XTwi2AJEmS1vSe44uJZegTt9olSZLiJDBZCqtks5VKcadaFQZosnB2uZI_0odOR3O6VKNzEGv-sBOXWi18pjSM8dKvtXiYE8hSt5VOIA-de4mR7rpENKY7u_CBo9WtkoxJNV_vt-RqEvdRF-yCC5IJgqnkx2apO0F1WEugcKYTcLuhMtJKTpdl_HqtXqLNmUiVOjWpySmKjO_SFXLq18whfvnmdiG_Nb323pmZ9aPaq39-67eb323_8t3tzP3to-y1QuYL0\u0026estsfed=1\u0026uaid=627209a2900f700050d8a4726d6b0e6b\u0026cobrandid=11bd8083-87e0-41b5-bb78-0bc43c8a8e8a\u0026fci=00000003-0000-0ff1-ce00-000000000000\u0026wsucxt=1</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.live.com/oauth20_authorize.srf?scope=openid+profile+email+offline_access\u0026response_type=code\u0026client_id=51483342-085c-4d86-bf88-cf50c7252078\u0026response_mode=form_post\u0026redirect_uri=https%3a%2f%2flogin.microsoftonline.com%2fcommon%2ffederation%2foauth2msa\u0026state=rQQIARAAnVNZiBuHGdas1rJXXdu7akJDKY27MSTxRqs5pZkFt8wpaZQZae7VhLLMpWsOjTSjM7gtJrSmLXRpqRPSN1MSWBIaWgrB5CEvCcYv2VAKsaE0oTG0gSYloeAQCEHtSx5DvoeP__4_fvgvZaE9aP8i-H8gxRUXwU4HKjreyvoSxoX81o2NsX3-KBO33vn9OPTP-c8DG4dBf-rtOcPwGMB7aRon-6VSuOh5VpD2rEkxXOwlPWvsxcN-lK7KSoed4ThMSq7XsSZBumcl8fxVADgBgH8CwPHaCEUQHKIwGmU5FKRwFANpvEIRIEpAHAWhBM2hNA7COAiiJI2hYJGmKjRCoyzEoHgZA0G6TJEwwrBkGWPoMsniOEyyNAaVYazMgDROYxxcrpAMh1RABipDd9fON8lJ2oNXNBz3l97HaxsrjYfxMEmfz7603mTAGT8QFi2No1RaW8h-D5E0jpICFhEG3YVmyKqhpSPT51Ql6DV4la-2B73YGPQOxANz6BhirclR-iruhW1IrgZLS5tTEkyMHJATFU2UDCNO7EEgtDVxpLBuUw2x2IpE1Qko3YKxxK66RtMYYvZqf6DPtZDwLUZnpf7KNw9shEotTp6rRjARDH1mRjyrwoSoMj1BMTRE8Oe6wvKQovY0h-0Ggl_HPI6X7APZ93xdkQMOM6s6a_gxIoL8tB11Fzoj1kyEt6TIh9qaKbUPxFmTcZaKwaJmOBdlI6i1I27kqLqlgilkhe5Sh4YLK9BZgZMFT-M1uyq2JHhedyKOFjSsLoR1UDfMhrns9d2lPjerxJMGyxtCVZtp4Wwu6sHUGIihtDQVEZIHOpj2dFBu2Egw81S5LsCpZQ7EmV11UZFNUZVFlxI4XyraPLC4oGrCGKVw-tJhTdmKeExgZFgMe1pTj_nV_V1fniuIHwi-ycuaSRlGgrQPhEDw25gZBTW9FviiEahSFESaprNOmGCioi2kyATbMFGztLjh6nqgaSJs-FwoG2LLCDnUQfgpr4rscfYrPdMfsxc9xMIrRAUsIjBKFFEcwos4YaNFp0J0HBiH0QpM3M7mhrEX9d2TdeCD9U1wbf_Mme2t0w9lLmTurwM3ThXyW7d--kzh-iP32OO9Nx7_hf1Y5vapUlgfg0psJpSNJeWRMUI4FDRSfx4ajEgs6EUbnzaogTlUdsHLxD50lAOOcrmjHH-U--bN3MaZ7FZmJ0u3oP_kgGunMzc3vvZbP5cHTr4BvLIJ3N2E8hvO0B5bkdt3CxchyHZxEEeKeMUDiyhkY0XbruBF0HZQxMEt3MOtu5toPucEVj9MCpee3um7h-nQ96Kd_ad35mFy6Dgra2oFEy_Z2X9qh25BOz-8cuXK1bNfafrrZzP3z73w0Y1fPXPjhY9qH5x_AsfZxm5tmXaEppUEqStPnFrJnOMJ3RrBfNePpSehuMpBlUly-ZWtzLtbmePte2v5OI9mMhnwH_-mnn3zoVv3__To97_16SX9Zw9Lt4DH__svmX_4xU_e-mT95-Zr73_n4-kDr__gJ59Ff_0QWhb-1_XGy5_-vfvSo5_fmT3wvT-8fQ94X3_k7W_ftt_724W_XMhef-rk19d_fPXDB-80sN-dunLn6m_OXgAeAwrn8lkr6BZOszRTK7LKyvcip3CahLFylRYKJ0A-a8XTwi2AJEmS1vSe44uJZegTt9olSZLiJDBZCqtks5VKcadaFQZosnB2uZI_0odOR3O6VKNzEGv-sBOXWi18pjSM8dKvtXiYE8hSt5VOIA-de4mR7rpENKY7u_CBo9WtkoxJNV_vt-RqEvdRF-yCC5IJgqnkx2apO0F1WEugcKYTcLuhMtJKTpdl_HqtXqLNmUiVOjWpySmKjO_SFXLq18whfvnmdiG_Nb323pmZ9aPaq39-67eb323_8t3tzP3to-y1QuYL0\u0026estsfed=1\u0026uaid=627209a2900f700050d8a4726d6b0e6b\u0026cobrandid=11bd8083-87e0-41b5-bb78-0bc43c8a8e8a\u0026fci=00000003-0000-0ff1-ce00-000000000000\u0026wsucxt=1\u0026idp_hint=github.com</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.live.com/oauth20_authorize.srf?scope=openid+profile+email+offline_access\u0026response_type=code\u0026client_id=51483342-085c-4d86-bf88-cf50c7252078\u0026response_mode=form_post\u0026redirect_uri=https%3a%2f%2flogin.microsoftonline.com%2fcommon%2ffederation%2foauth2msa\u0026state=rQQIARAAnVNZiBuHGdas1rJXXdu7akJDKY27MSTxRqs5pZkFt8wpaZQZae7VhLLMpWsOjTSjM7gtJrSmLXRpqRPSN1MSWBIaWgrB5CEvCcYv2VAKsaE0oTG0gSYloeAQCEHtSx5DvoeP__4_fvgvZaE9aP8i-H8gxRUXwU4HKjreyvoSxoX81o2NsX3-KBO33vn9OPTP-c8DG4dBf-rtOcPwGMB7aRon-6VSuOh5VpD2rEkxXOwlPWvsxcN-lK7KSoed4ThMSq7XsSZBumcl8fxVADgBgH8CwPHaCEUQHKIwGmU5FKRwFANpvEIRIEpAHAWhBM2hNA7COAiiJI2hYJGmKjRCoyzEoHgZA0G6TJEwwrBkGWPoMsniOEyyNAaVYazMgDROYxxcrpAMh1RABipDd9fON8lJ2oNXNBz3l97HaxsrjYfxMEmfz7603mTAGT8QFi2No1RaW8h-D5E0jpICFhEG3YVmyKqhpSPT51Ql6DV4la-2B73YGPQOxANz6BhirclR-iruhW1IrgZLS5tTEkyMHJATFU2UDCNO7EEgtDVxpLBuUw2x2IpE1Qko3YKxxK66RtMYYvZqf6DPtZDwLUZnpf7KNw9shEotTp6rRjARDH1mRjyrwoSoMj1BMTRE8Oe6wvKQovY0h-0Ggl_HPI6X7APZ93xdkQMOM6s6a_gxIoL8tB11Fzoj1kyEt6TIh9qaKbUPxFmTcZaKwaJmOBdlI6i1I27kqLqlgilkhe5Sh4YLK9BZgZMFT-M1uyq2JHhedyKOFjSsLoR1UDfMhrns9d2lPjerxJMGyxtCVZtp4Wwu6sHUGIihtDQVEZIHOpj2dFBu2Egw81S5LsCpZQ7EmV11UZFNUZVFlxI4XyraPLC4oGrCGKVw-tJhTdmKeExgZFgMe1pTj_nV_V1fniuIHwi-ycuaSRlGgrQPhEDw25gZBTW9FviiEahSFESaprNOmGCioi2kyATbMFGztLjh6nqgaSJs-FwoG2LLCDnUQfgpr4rscfYrPdMfsxc9xMIrRAUsIjBKFFEcwos4YaNFp0J0HBiH0QpM3M7mhrEX9d2TdeCD9U1wbf_Mme2t0w9lLmTurwM3ThXyW7d--kzh-iP32OO9Nx7_hf1Y5vapUlgfg0psJpSNJeWRMUI4FDRSfx4ajEgs6EUbnzaogTlUdsHLxD50lAOOcrmjHH-U--bN3MaZ7FZmJ0u3oP_kgGunMzc3vvZbP5cHTr4BvLIJ3N2E8hvO0B5bkdt3CxchyHZxEEeKeMUDiyhkY0XbruBF0HZQxMEt3MOtu5toPucEVj9MCpee3um7h-nQ96Kd_ad35mFy6Dgra2oFEy_Z2X9qh25BOz-8cuXK1bNfafrrZzP3z73w0Y1fPXPjhY9qH5x_AsfZxm5tmXaEppUEqStPnFrJnOMJ3RrBfNePpSehuMpBlUly-ZWtzLtbmePte2v5OI9mMhnwH_-mnn3zoVv3__To97_16SX9Zw9Lt4DH__svmX_4xU_e-mT95-Zr73_n4-kDr__gJ59Ff_0QWhb-1_XGy5_-vfvSo5_fmT3wvT-8fQ94X3_k7W_ftt_724W_XMhef-rk19d_fPXDB-80sN-dunLn6m_OXgAeAwrn8lkr6BZOszRTK7LKyvcip3CahLFylRYKJ0A-a8XTwi2AJEmS1vSe44uJZegTt9olSZLiJDBZCqtks5VKcadaFQZosnB2uZI_0odOR3O6VKNzEGv-sBOXWi18pjSM8dKvtXiYE8hSt5VOIA-de4mR7rpENKY7u_CBo9WtkoxJNV_vt-RqEvdRF-yCC5IJgqnkx2apO0F1WEugcKYTcLuhMtJKTpdl_HqtXqLNmUiVOjWpySmKjO_SFXLq18whfvnmdiG_Nb323pmZ9aPaq39-67eb323_8t3tzP3to-y1QuYL0\u0026estsfed=1\u0026uaid=627209a2900f700050d8a4726d6b0e6b\u0026signup=1\u0026lw=1\u0026fl=easi2\u0026cobrandid=11bd8083-87e0-41b5-bb78-0bc43c8a8e8a\u0026fci=00000003-0000-0ff1-ce00-000000000000\u0026wsucxt=1</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.live.com/ppsecure/partnerpost.srf</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://login.live.com/ppsecure/partnerpost.srf?scope=openid+profile+email+offline_access\u0026response_type=code\u0026client_id=51483342-085c-4d86-bf88-cf50c7252078\u0026response_mode=form_post\u0026redirect_uri=https%3a%2f%2flogin.microsoftonline.com%2fcommon%2ffederation%2foauth2msa\u0026state=rQQIARAAnVNZiBuHGdas1rJXXdu7akJDKY27MSTxRqs5pZkFt8wpaZQZae7VhLLMpWsOjTSjM7gtJrSmLXRpqRPSN1MSWBIaWgrB5CEvCcYv2VAKsaE0oTG0gSYloeAQCEHtSx5DvoeP__4_fvgvZaE9aP8i-H8gxRUXwU4HKjreyvoSxoX81o2NsX3-KBO33vn9OPTP-c8DG4dBf-rtOcPwGMB7aRon-6VSuOh5VpD2rEkxXOwlPWvsxcN-lK7KSoed4ThMSq7XsSZBumcl8fxVADgBgH8CwPHaCEUQHKIwGmU5FKRwFANpvEIRIEpAHAWhBM2hNA7COAiiJI2hYJGmKjRCoyzEoHgZA0G6TJEwwrBkGWPoMsniOEyyNAaVYazMgDROYxxcrpAMh1RABipDd9fON8lJ2oNXNBz3l97HaxsrjYfxMEmfz7603mTAGT8QFi2No1RaW8h-D5E0jpICFhEG3YVmyKqhpSPT51Ql6DV4la-2B73YGPQOxANz6BhirclR-iruhW1IrgZLS5tTEkyMHJATFU2UDCNO7EEgtDVxpLBuUw2x2IpE1Qko3YKxxK66RtMYYvZqf6DPtZDwLUZnpf7KNw9shEotTp6rRjARDH1mRjyrwoSoMj1BMTRE8Oe6wvKQovY0h-0Ggl_HPI6X7APZ93xdkQMOM6s6a_gxIoL8tB11Fzoj1kyEt6TIh9qaKbUPxFmTcZaKwaJmOBdlI6i1I27kqLqlgilkhe5Sh4YLK9BZgZMFT-M1uyq2JHhedyKOFjSsLoR1UDfMhrns9d2lPjerxJMGyxtCVZtp4Wwu6sHUGIihtDQVEZIHOpj2dFBu2Egw81S5LsCpZQ7EmV11UZFNUZVFlxI4XyraPLC4oGrCGKVw-tJhTdmKeExgZFgMe1pTj_nV_V1fniuIHwi-ycuaSRlGgrQPhEDw25gZBTW9FviiEahSFESaprNOmGCioi2kyATbMFGztLjh6nqgaSJs-FwoG2LLCDnUQfgpr4rscfYrPdMfsxc9xMIrRAUsIjBKFFEcwos4YaNFp0J0HBiH0QpM3M7mhrEX9d2TdeCD9U1wbf_Mme2t0w9lLmTurwM3ThXyW7d--kzh-iP32OO9Nx7_hf1Y5vapUlgfg0psJpSNJeWRMUI4FDRSfx4ajEgs6EUbnzaogTlUdsHLxD50lAOOcrmjHH-U--bN3MaZ7FZmJ0u3oP_kgGunMzc3vvZbP5cHTr4BvLIJ3N2E8hvO0B5bkdt3CxchyHZxEEeKeMUDiyhkY0XbruBF0HZQxMEt3MOtu5toPucEVj9MCpee3um7h-nQ96Kd_ad35mFy6Dgra2oFEy_Z2X9qh25BOz-8cuXK1bNfafrrZzP3z73w0Y1fPXPjhY9qH5x_AsfZxm5tmXaEppUEqStPnFrJnOMJ3RrBfNePpSehuMpBlUly-ZWtzLtbmePte2v5OI9mMhnwH_-mnn3zoVv3__To97_16SX9Zw9Lt4DH__svmX_4xU_e-mT95-Zr73_n4-kDr__gJ59Ff_0QWhb-1_XGy5_-vfvSo5_fmT3wvT-8fQ94X3_k7W_ftt_724W_XMhef-rk19d_fPXDB-80sN-dunLn6m_OXgAeAwrn8lkr6BZOszRTK7LKyvcip3CahLFylRYKJ0A-a8XTwi2AJEmS1vSe44uJZegTt9olSZLiJDBZCqtks5VKcadaFQZosnB2uZI_0odOR3O6VKNzEGv-sBOXWi18pjSM8dKvtXiYE8hSt5VOIA-de4mR7rpENKY7u_CBo9WtkoxJNV_vt-RqEvdRF-yCC5IJgqnkx2apO0F1WEugcKYTcLuhMtJKTpdl_HqtXqLNmUiVOjWpySmKjO_SFXLq18whfvnmdiG_Nb323pmZ9aPaq39-67eb323_8t3tzP3to-y1QuYL0\u0026flow=fido\u0026estsfed=1\u0026uaid=627209a2900f700050d8a4726d6b0e6b\u0026cobrandid=11bd8083-87e0-41b5-bb78-0bc43c8a8e8a\u0026fci=00000003-0000-0ff1-ce00-000000000000\u0026wsucxt=1</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.microsoft.com/e3a87970-3249-4818-89b4-c79fc2824729/fido/get?uiflavor=Web</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.microsoftonline.com/common/DeviceCodeStatus</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.microsoftonline.com/common/GetCredentialType?mkt=en-US</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.microsoftonline.com/common/GetOneTimeCode</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.microsoftonline.com/common/PIA/EndAuth</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.microsoftonline.com/common/debugmode</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.microsoftonline.com/common/getrecoverycredentialtype?mkt=en-US</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.microsoftonline.com/common/instrumentation/dssostatus</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.microsoftonline.com/common/instrumentation/reportpageload</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.microsoftonline.com/common/instrumentation/reportpageload?mkt=en-US</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.microsoftonline.com/cookiesdisabled</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.microsoftonline.com/e3a87970-3249-4818-89b4-c79fc2824729/login</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.microsoftonline.com/e3a87970-3249-4818-89b4-c79fc2824729/reprocess?ctx=rQQIARAAnVNbiCRnFe6anu3dafcy00YMImadLCTZsaf_unVXDaxS1-6uTlV33acrhKWquvpWl67uqr6GVVmCLio4KG6Cvi0SYYgoihCWPOQlYdmXTBDBXRATzEIMmISEwAZBpPXFx-D3cPjOOZxzPg58l7PwPnxwCfwXaHEdi6DbhYuut2b_g0khv31ra-JcOMrErT__chL65_1jiOinaZwclErhsu_ZQdq3p8VwuZ_07YkXjwZRuu-OwtLV7mgSJqWO17WnQbpvJ_HiFQg6gaD3IOh4Y4yhKAHTOINxPAZoAsMBQ1RoEmAkzNMwRjI8xhAAIQDAKAbHQJGhKwzKYBzMYkQZB4Ap0xSCshxVxlmmTHEEgVAcg8NlBC-zgCEYnEfKFYrl0Qpg4TJ8f-NCk5qmfWQdRpPByvt4Y2ut8Wo8StKfZ1_ebLJgLgzFZUvnaY3Rl4rfR2Wdp-WAQ8Vhb6mbimbq6djyeU0N-g1BE6rtYT82h_1D6dAauaZUa_K0sa57YRtWqsHK1he0jJBjF_CSqkuyacaJMwzEti6NVa7T1EI8tiNJcwPasBE8caods2mOcGd9PzAWekj6Nmtw8mCdW4cOSqc2ryw0M5iKpjG3IoHTEFLS2L6omjoq-gtD5QRY1fq6y_UC0a_jHi_IzqHie76hKgGPW1WDM_0YlYAwa0e9pcFKNQsVbDny4bZuye1Dad5k3ZVqcpgVLiTFDGrtiB-7mmFrIIXtsLMy4NHSDgxO5BXR0wXdqUotGVnU3YhnRB2vi2EdGKbVsFb9QWdlLKwq-bTJCaZY1ed6OF9IRjAzh1IoryxVgpWhAdK-AZSGgwZzT1PqIpLa1lCaO9UOJnEppnHYSgaLlaovApsPqhaC0ypvrFzOUuxIwEVWQaSwrzeNWFj_v-MrCxX1A9G3BEW3aNNM0PahGIh-G7eioGbUAl8yA02OgkjXDc4NE1xS9aUcWaCNkDVbjxsdwwh0XUJMnw8VU2qZIY-5qDATNIk7zn4uA_0ue8lDbaJCVkARRTCyiBEwUSRIByu6FbLrIgSCVRDybjY3ir1o0DnZhN7fPAs2Ds6c2dk-_WjmYubhJnTrVCG_fed7zxduPv6AO95__akfOk9m7p4qhfUJUGMroR08KY_NMcpjwEz9RWiyErlklm1i1qCH1kjdA1fIA_goBx3lckc54Sj3xdu5rTPZ7cxulmnBH-WgG6czt7f-b1u_mIdOvgDdPwvnt9yRM7GjzqBTuATDTocABFokKh4oYrCDFx2nQhSB42KoS9iER9j3z2L5nBvYgzApXH5ud9C5mo58L9o9eG53ESZXXXfNZnYw9ZLdg2d2mRa8--y1a9eun_tc2187l3l4_qUPb_34-VsvfVh7_8I3CIJr7NVWaVds2kmQdpSpWytZCyJhWmNE6Pmx_DQcV3m4Mk2u_HY78_Z25njnwUY-zmOZTAb87R_0C288eufh75_45pc_u2x8_zH5DvTUp39XhMd-9cmbn2z-wHr13a9-PHvktW9995_Rnz6AV4X_TL3-68_-2nv5iX_dmz_y9d-89QB613j8ra_cdd75y8U_XszefObkJze_c_2DL91r4L84de3e9Z-euwg9CRXO57N20Cuc5hi2VuTUde5FbuE0heDlKiMWTqB81o5nhTsQRVEUoxt915cS2zSmnWqPoiial0GyEtfNZiuV4261Kg6xZOnu8SV_bIzcru726Eb3MNb9UTcutVrEXG2Yk5VfawkIL1KlXiudwh628BIz3euQ0YTp7iGHrl63Swou13xj0FKqSTzAOqAHlhQbBDPZj61Sb4oZiJ7A4dwgkXZDY-W1nB7H-vVavcRYc4kudWtyk1dVhdhjKtTMr1kj4srtnUJ-e3bjnTNz-9u1V_7w5s_Ofq39o7d3Mg93jrI3Cpl_Aw2</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.microsoftonline.com/e3a87970-3249-4818-89b4-c79fc2824729/resume?ctx=rQQIARAAnVNbiCRnFe6anu3dafcy00YMImadLCTZsaf_unVXDaxS1-6uTlV33acrhKWquvpWl67uqr6GVVmCLio4KG6Cvi0SYYgoihCWPOQlYdmXTBDBXRATzEIMmISEwAZBpPXFx-D3cPjOOZxzPg58l7PwPnxwCfwXaHEdi6DbhYuut2b_g0khv31ra-JcOMrErT__chL65_1jiOinaZwclErhsu_ZQdq3p8VwuZ_07YkXjwZRuu-OwtLV7mgSJqWO17WnQbpvJ_HiFQg6gaD3IOh4Y4yhKAHTOINxPAZoAsMBQ1RoEmAkzNMwRjI8xhAAIQDAKAbHQJGhKwzKYBzMYkQZB4Ap0xSCshxVxlmmTHEEgVAcg8NlBC-zgCEYnEfKFYrl0Qpg4TJ8f-NCk5qmfWQdRpPByvt4Y2ut8Wo8StKfZ1_ebLJgLgzFZUvnaY3Rl4rfR2Wdp-WAQ8Vhb6mbimbq6djyeU0N-g1BE6rtYT82h_1D6dAauaZUa_K0sa57YRtWqsHK1he0jJBjF_CSqkuyacaJMwzEti6NVa7T1EI8tiNJcwPasBE8caods2mOcGd9PzAWekj6Nmtw8mCdW4cOSqc2ryw0M5iKpjG3IoHTEFLS2L6omjoq-gtD5QRY1fq6y_UC0a_jHi_IzqHie76hKgGPW1WDM_0YlYAwa0e9pcFKNQsVbDny4bZuye1Dad5k3ZVqcpgVLiTFDGrtiB-7mmFrIIXtsLMy4NHSDgxO5BXR0wXdqUotGVnU3YhnRB2vi2EdGKbVsFb9QWdlLKwq-bTJCaZY1ed6OF9IRjAzh1IoryxVgpWhAdK-AZSGgwZzT1PqIpLa1lCaO9UOJnEppnHYSgaLlaovApsPqhaC0ypvrFzOUuxIwEVWQaSwrzeNWFj_v-MrCxX1A9G3BEW3aNNM0PahGIh-G7eioGbUAl8yA02OgkjXDc4NE1xS9aUcWaCNkDVbjxsdwwh0XUJMnw8VU2qZIY-5qDATNIk7zn4uA_0ue8lDbaJCVkARRTCyiBEwUSRIByu6FbLrIgSCVRDybjY3ir1o0DnZhN7fPAs2Ds6c2dk-_WjmYubhJnTrVCG_fed7zxduPv6AO95__akfOk9m7p4qhfUJUGMroR08KY_NMcpjwEz9RWiyErlklm1i1qCH1kjdA1fIA_goBx3lckc54Sj3xdu5rTPZ7cxulmnBH-WgG6czt7f-b1u_mIdOvgDdPwvnt9yRM7GjzqBTuATDTocABFokKh4oYrCDFx2nQhSB42KoS9iER9j3z2L5nBvYgzApXH5ud9C5mo58L9o9eG53ESZXXXfNZnYw9ZLdg2d2mRa8--y1a9eun_tc2187l3l4_qUPb_34-VsvfVh7_8I3CIJr7NVWaVds2kmQdpSpWytZCyJhWmNE6Pmx_DQcV3m4Mk2u_HY78_Z25njnwUY-zmOZTAb87R_0C288eufh75_45pc_u2x8_zH5DvTUp39XhMd-9cmbn2z-wHr13a9-PHvktW9995_Rnz6AV4X_TL3-68_-2nv5iX_dmz_y9d-89QB613j8ra_cdd75y8U_XszefObkJze_c_2DL91r4L84de3e9Z-euwg9CRXO57N20Cuc5hi2VuTUde5FbuE0heDlKiMWTqB81o5nhTsQRVEUoxt915cS2zSmnWqPoiial0GyEtfNZiuV4261Kg6xZOnu8SV_bIzcru726Eb3MNb9UTcutVrEXG2Yk5VfawkIL1KlXiudwh628BIz3euQ0YTp7iGHrl63Swou13xj0FKqSTzAOqAHlhQbBDPZj61Sb4oZiJ7A4dwgkXZDY-W1nB7H-vVavcRYc4kudWtyk1dVhdhjKtTMr1kj4srtnUJ-e3bjnTNz-9u1V_7w5s_Ofq39o7d3Mg93jrI3Cpl_Aw2</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.microsoftonline.com/e3a87970-3249-4818-89b4-c79fc2824729/tlr/start</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.microsoftonline.com/e3a87970-3249-4818-89b4-c79fc2824729/uxlogout</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.microsoftonline.com/forgetuser</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://myhealthau-my.sharepoint.com/_forms/default.aspx</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://passwordreset.microsoftonline.com/?ru=https%3a%2f%2flogin.microsoftonline.com%2fe3a87970-3249-4818-89b4-c79fc2824729%2freprocess%3fctx%3drQQIARAAnVNbiCRnFe6anu3dafcy00YMImadLCTZsaf_unVXDaxS1-6uTlV33acrhKWquvpWl67uqr6GVVmCLio4KG6Cvi0SYYgoihCWPOQlYdmXTBDBXRATzEIMmISEwAZBpPXFx-D3cPjOOZxzPg58l7PwPnxwCfwXaHEdi6DbhYuut2b_g0khv31ra-JcOMrErT__chL65_1jiOinaZwclErhsu_ZQdq3p8VwuZ_07YkXjwZRuu-OwtLV7mgSJqWO17WnQbpvJ_HiFQg6gaD3IOh4Y4yhKAHTOINxPAZoAsMBQ1RoEmAkzNMwRjI8xhAAIQDAKAbHQJGhKwzKYBzMYkQZB4Ap0xSCshxVxlmmTHEEgVAcg8NlBC-zgCEYnEfKFYrl0Qpg4TJ8f-NCk5qmfWQdRpPByvt4Y2ut8Wo8StKfZ1_ebLJgLgzFZUvnaY3Rl4rfR2Wdp-WAQ8Vhb6mbimbq6djyeU0N-g1BE6rtYT82h_1D6dAauaZUa_K0sa57YRtWqsHK1he0jJBjF_CSqkuyacaJMwzEti6NVa7T1EI8tiNJcwPasBE8caods2mOcGd9PzAWekj6Nmtw8mCdW4cOSqc2ryw0M5iKpjG3IoHTEFLS2L6omjoq-gtD5QRY1fq6y_UC0a_jHi_IzqHie76hKgGPW1WDM_0YlYAwa0e9pcFKNQsVbDny4bZuye1Dad5k3ZVqcpgVLiTFDGrtiB-7mmFrIIXtsLMy4NHSDgxO5BXR0wXdqUotGVnU3YhnRB2vi2EdGKbVsFb9QWdlLKwq-bTJCaZY1ed6OF9IRjAzh1IoryxVgpWhAdK-AZSGgwZzT1PqIpLa1lCaO9UOJnEppnHYSgaLlaovApsPqhaC0ypvrFzOUuxIwEVWQaSwrzeNWFj_v-MrCxX1A9G3BEW3aNNM0PahGIh-G7eioGbUAl8yA02OgkjXDc4NE1xS9aUcWaCNkDVbjxsdwwh0XUJMnw8VU2qZIY-5qDATNIk7zn4uA_0ue8lDbaJCVkARRTCyiBEwUSRIByu6FbLrIgSCVRDybjY3ir1o0DnZhN7fPAs2Ds6c2dk-_WjmYubhJnTrVCG_fed7zxduPv6AO95__akfOk9m7p4qhfUJUGMroR08KY_NMcpjwEz9RWiyErlklm1i1qCH1kjdA1fIA_goBx3lckc54Sj3xdu5rTPZ7cxulmnBH-WgG6czt7f-b1u_mIdOvgDdPwvnt9yRM7GjzqBTuATDTocABFokKh4oYrCDFx2nQhSB42KoS9iER9j3z2L5nBvYgzApXH5ud9C5mo58L9o9eG53ESZXXXfNZnYw9ZLdg2d2mRa8--y1a9eun_tc2187l3l4_qUPb_34-VsvfVh7_8I3CIJr7NVWaVds2kmQdpSpWytZCyJhWmNE6Pmx_DQcV3m4Mk2u_HY78_Z25njnwUY-zmOZTAb87R_0C288eufh75_45pc_u2x8_zH5DvTUp39XhMd-9cmbn2z-wHr13a9-PHvktW9995_Rnz6AV4X_TL3-68_-2nv5iX_dmz_y9d-89QB613j8ra_cdd75y8U_XszefObkJze_c_2DL91r4L84de3e9Z-euwg9CRXO57N20Cuc5hi2VuTUde5FbuE0heDlKiMWTqB81o5nhTsQRVEUoxt915cS2zSmnWqPoiial0GyEtfNZiuV4261Kg6xZOnu8SV_bIzcru726Eb3MNb9UTcutVrEXG2Yk5VfawkIL1KlXiudwh628BIz3euQ0YTp7iGHrl63Swou13xj0FKqSTzAOqAHlhQbBDPZj61Sb4oZiJ7A4dwgkXZDY-W1nB7H-vVavcRYc4kudWtyk1dVhdhjKtTMr1kj4srtnUJ-e3bjnTNz-9u1V_7w5s_Ofq39o7d3Mg93jrI3Cpl_Aw2\u0026mkt=en-US\u0026hosted=0\u0026device_platform=iOS</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://signup.microsoft.com/signup?sku=teams_commercial_trial\u0026origin=ests\u0026culture=en-US</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.microsoft.com/en-US/servicesagreement/</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.myhealth.net.au/privacy-policy/</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://aadcdn.msftauth.net/ests/2.1/content/cdnbundles/converged.v2.login.min_pzfy2abhlubh6bv_dyvwha2.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ux.converged.login.strings-en.min_cbb9wf1-2b8knjgxpc5-rg2.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://aadcdn.msftauth.net/shared/1.0/content/images/signin-options_3e3f6b73c3f310c31d2c4d131a8ab8c6.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://aadcdn.msftauth.net/shared/1.0/content/js/BssoInterrupt_Core_eE2DYJlsHKgq7xFfjkmMww2.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://aadcdn.msftauth.net/shared/1.0/content/js/ConvergedLogin_PCore_iXvvVEAQxmEXtWhahp1L2Q2.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://aadcdn.msftauth.net/shared/1.0/content/js/asyncchunk/convergedlogin_pcustomizationloader_45fabe6597885bd9dd3e.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://aadcdn.msftauth.net/shared/1.0/content/js/asyncchunk/convergedlogin_pstringcustomizationhelper_b769de80491fb7447ef9.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://aadcdn.msftauth.net/shared/1.0/content/js/oneDs_36c085e9e54fe9d23a54.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://aadcdn.msftauthimages.net/81d6b03a-p7tmfi-wbbtcac6kadlnkfoarrnceyo-g-auta8bz1o/logintenantbranding/0/bannerlogo?ts=638873633563908750</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://aadcdn.msftauthimages.net/81d6b03a-p7tmfi-wbbtcac6kadlnkfoarrnceyo-g-auta8bz1o/logintenantbranding/0/favicon?ts=638873623322364192</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://aadcdn.msftauthimages.net/81d6b03a-p7tmfi-wbbtcac6kadlnkfoarrnceyo-g-auta8bz1o/logintenantbranding/0/illustration?ts=638873627743430618</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://login.live.com/Me.htm?v=3</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://login.microsoftonline.com/e3a87970-3249-4818-89b4-c79fc2824729/oauth2/authorize</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://login.microsoftonline.com/e3a87970-3249-4818-89b4-c79fc2824729/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&amp;response%5Fmode=form%5Fpost&amp;ear%5Fjwe%5Fcrypto=eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTI1NkdDTSIsImFwdiI6IkFBQUFDVVZoY2tOc2FXVnVkR2dBQUFCRlEwc3pNQUFBQUY0ekxHYjdtRHRFeWhJS0l0Q0JZeXFSTjVZTkw1aGlpTTRXNUNRL0xsZVI0SjR5VEVqWCt2ZTJicUJ0ekMwTUhybTRZbElQdGRGNHRwZTBNeHYzcjlUeEdjMm9lcFN4bmFIWnNMWENBb3I3M0RwbUhXVXdIZ0tZaVN5SW45WWhqZ0FBQUJndjFrdHlPY1hJaXo2UStyRXBQKzNmWWtneVFTWWtVNVk9In0%3D&amp;ear%5Fjwk=eyJhbGciOiJFQ0RILUVTIiwiY3J2IjoiUC0zODQiLCJ4IjoiQUFBQU1GNHpMR2I3bUR0RXloSUtJdENCWXlxUk41WU5MNWhpaU00VzVDUS9MbGVSNEo0eVRFalgrdmUyYnFCdHpDME1IZz09IiwieSI6IkFBQUFNTG00WWxJUHRkRjR0cGUwTXh2M3I5VHhHYzJvZXBTeG5hSFpzTFhDQW9yNzNEcG1IV1V3SGdLWWlTeUluOVloamc9PSIsImt0eSI6IkVDIn0%3D&amp;spa%5Fclient%5Fid=08e18876%2D6177%2D487e%2Db8b5%2Dcf950c1e598c&amp;client%5Finfo=1&amp;response%5Ftype=code%20id%5Ftoken%20spa%5Frt&amp;resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&amp;scope=openid&amp;nonce=06AD4A8C75F47D87DC65D78165199BEAAFBEBDF8BB6AC41F%2D1C07D87F7FB2B23E8C147499B6937B2011DD60D6250EE2F98D86C631654652C9&amp;redirect%5Furi=https%3A%2F%2Fmyhealthau%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&amp;state=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&amp;claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&amp;wsucxt=1&amp;cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&amp;client%2Drequest%2Did=647209a2%2D302b%2D7000%2D10e1%2Dd323cf9df2fc</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://login.microsoftonline.com/e3a87970-3249-4818-89b4-c79fc2824729/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&amp;response%5Fmode=form%5Fpost&amp;ear%5Fjwe%5Fcrypto=eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTI1NkdDTSIsImFwdiI6IkFBQUFDVVZoY2tOc2FXVnVkR2dBQUFCRlEwc3pNQUFBQUY0ekxHYjdtRHRFeWhJS0l0Q0JZeXFSTjVZTkw1aGlpTTRXNUNRL0xsZVI0SjR5VEVqWCt2ZTJicUJ0ekMwTUhybTRZbElQdGRGNHRwZTBNeHYzcjlUeEdjMm9lcFN4bmFIWnNMWENBb3I3M0RwbUhXVXdIZ0tZaVN5SW45WWhqZ0FBQUJndjFrdHlPY1hJaXo2UStyRXBQKzNmWWtneVFTWWtVNVk9In0%3D&amp;ear%5Fjwk=eyJhbGciOiJFQ0RILUVTIiwiY3J2IjoiUC0zODQiLCJ4IjoiQUFBQU1GNHpMR2I3bUR0RXloSUtJdENCWXlxUk41WU5MNWhpaU00VzVDUS9MbGVSNEo0eVRFalgrdmUyYnFCdHpDME1IZz09IiwieSI6IkFBQUFNTG00WWxJUHRkRjR0cGUwTXh2M3I5VHhHYzJvZXBTeG5hSFpzTFhDQW9yNzNEcG1IV1V3SGdLWWlTeUluOVloamc9PSIsImt0eSI6IkVDIn0%3D&amp;spa%5Fclient%5Fid=08e18876%2D6177%2D487e%2Db8b5%2Dcf950c1e598c&amp;client%5Finfo=1&amp;response%5Ftype=code%20id%5Ftoken%20spa%5Frt&amp;resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&amp;scope=openid&amp;nonce=06AD4A8C75F47D87DC65D78165199BEAAFBEBDF8BB6AC41F%2D1C07D87F7FB2B23E8C147499B6937B2011DD60D6250EE2F98D86C631654652C9&amp;redirect%5Furi=https%3A%2F%2Fmyhealthau%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&amp;state=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&amp;claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&amp;wsucxt=1&amp;cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&amp;client%2Drequest%2Did=647209a2%2D302b%2D7000%2D10e1%2Dd323cf9df2fc&amp;sso_reload=true</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://login.microsoftonline.com/favicon.ico</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://myhealthau-my.sharepoint.com/:u:/r/personal/pacificfair_myhealth_net_au/Documents/Myhealth%20Pacific%20Fair%20Medical%20Centre%20-%20PAST%20DUE%20REMINDER/CLICK%20HERE%20TO%20VIEW%20DOCUMENT.url?csf=1&amp;web=1&amp;e=FSa321#</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.myhealth.net.au/privacy-policy/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>mailto:helpdesk@myhealth.net.au</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://myhealthau-my.sharepoint.com/_forms/default.aspx&amp;state=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&amp;claims</url>
              <origin>URL_RENDER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>aadcdn.msftauth.net</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>aadcdn.msftauthimages.net</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>login.live.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>login.microsoftonline.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>myhealthau-my.sharepoint.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.myhealth.net.au</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>aadcdn.msftauth.net</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>login.live.com</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </domains>
          <emails>
            <value>
              <email>helpdesk@myhealth.net.au</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>40.126.31.69</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>13.107.246.45</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>23.55.163.150</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>40.126.31.69</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>40.126.32.76</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>23.55.163.169</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>23.55.163.169</ip>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>40.126.31.69</ip>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>6db4d20f0a8505f6bb77e088b2f374e96233de8494a59ddf538f71526151abd6</SHA-256>
              <SHA-1>87f945589292570ee6af472ebfae3f40bc1dde19</SHA-1>
              <MD5>4efa9edd60176a130612fa77bfd70e4e</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>application/xml</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <SHA-256>12ee753dcd4f332d98f47e4e117e6663af2fe0950254f8370f4c00a51697043d</SHA-256>
              <SHA-1>26a66b2fda9a3dcdef30d3af1d760b177e3f5bc8</SHA-1>
              <MD5>ea9f99f6c79db8335964c4d13e12f295</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>application/xml</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>c47ca58d73107800ffac05893b486ee3e8cdbdbd92fa5884c35e818a26b3c929</SHA-256>
              <SHA-1>a4f53e11096ce793bc469aa13d7a30c0dad3ee90</SHA-1>
              <MD5>fa1bf7f01bd97187010350ad5b4a9b02</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>image/png</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <SHA-256>e303a6309dcd6c50db3f72b5735106a06e31ed3342b2d708d05ce9d1f8fce84b</SHA-256>
              <SHA-1>f430d521a86567f5a61097bb3d47458efa93e793</SHA-1>
              <MD5>354e3121e305a7bd6fa34dc6e027dc22</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>image/png</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <SHA-256>7e7c3d97fb6ea390714d5187177f1b297929888a17e89ed7d54c1231c3d6a91c</SHA-256>
              <SHA-1>2b262a9139624e8e4988d57bf08df81479f90f8b</SHA-1>
              <MD5>9d9bb9b7e16351e7adb236d7fe369cb7</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>image/jpeg</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <SHA-256>c8cef105fcaf7cbf3f8682c861045505c24d41cf6686c20c1c03e14031a3db69</SHA-256>
              <SHA-1>e933ca8534bcb6ad79d240316ce23c8b870050d0</SHA-1>
              <MD5>39a0eb35cd7799a181d34f4ae1ddb496</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/javascript</file_type>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <SHA-256>2889d4b5ad04b598a26aec7e67e1359b76d822393c679f9e7fe57cbd9f5592d1</SHA-256>
              <SHA-1>32289edac51741513a08ec42282b096108b7334e</SHA-1>
              <MD5>f36a39a1817bb55c843ada5a09d7a4b3</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/javascript</file_type>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <SHA-256>df2aa8537c1992c94846a0ffffaa9031d430d9d0210b9e396ec059aff62627e0</SHA-256>
              <SHA-1>bf0452e4a42a9af3b69d5d8c3a3a0433f14921b6</SHA-1>
              <MD5>75cf78d0e38c65a538ad253ca9e48dbe</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/javascript</file_type>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </files>
          <uuids>
            <value>
              <uuid>00000003-0000-0ff1-ce00-000000000000</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>08e18876-6177-487e-b8b5-cf950c1e598c</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>11bd8083-87e0-41b5-bb78-0bc43c8a8e8a</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>128486c8-2396-45e5-aa2e-c5298b622800</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>51483342-085c-4d86-bf88-cf50c7252078</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>53ee284d-920a-4b59-9d30-a60315b26836</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>627209a2-900f-7000-50d8-a4726d6b0e6b</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>66f1668a-797b-4249-95e3-6c6651768c28</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>e3a87970-3249-4818-89b4-c79fc2824729</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
        </iocs>
        <name>hxxps://myhealthau-my.sharepoint.com/:u:/r/personal/pacificfair_myhealth_net_au/Documents/Myhealth%20Pacific%20Fair%20Medical%20Centre%20-%20PAST%20DUE%20REMINDER/CLICK%20HERE%20TO%20VIEW%20DOCUMENT.url?csf=1&amp;web=1&amp;e=FSa321</name>
        <report_id>050745ad-4d6f-4fd6-a6a7-0c767c2cab62</report_id>
        <tags>
          <value>html</value>
          <value>javascript</value>
          <value>png</value>
          <value>xml</value>
          <value>jpg</value>
          <value>aidetect</value>
          <value>obfuscated</value>
          <value>phishing</value>
          <value>base64</value>
          <value>soft-404</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>232fa5792839dc677b0211b3694954e9660b174aa0f9bedcab772ac1e86d3843</id>
    <title>Analysis Report for 232fa5792839dc677b0211b3694954e9660b174aa0f9bedcab772ac1e86d3843</title>
    <updated>2026-04-13T03:52:48Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc689d80678438b878adfd</_id>
        <file_type>application/x-dosexec</file_type>
        <flow_id>69dc688e5ea31bc68a24a5ab</flow_id>
        <hash>232fa5792839dc677b0211b3694954e9660b174aa0f9bedcab772ac1e86d3843</hash>
        <iocs>
          <urls>
            <value>
              <url>http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/pki/certs/MicRooCerAut2011_2011_03_22.crt0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/pkiops/Docs/Repository.htm0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/pkiops/certs/MicCodSigPCA2011_2011-07-08.crt0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/pkiops/certs/Microsoft%20Time-Stamp%20PCA%202010(1).crt0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl0a</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl0l</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.microsoft.com/pkiops/docs/primarycps.htm0@</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://www.microsoft.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>crl.microsoft.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>microsoft.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>appro@openssl.org</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>13.107.226.45</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>23.55.110.211</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>23.55.110.211</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>13.107.226.45</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>d74f8b6a00d3bd8fc2781af3d6c06bb70927cf3c7f5a04a53bf2bacb5a895f68</SHA-256>
              <SHA-1>a65819ee060c733f942aa607e741bcf609dd822f</SHA-1>
              <MD5>415b2290ab86964d0bdc2c35203d5a32</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
          </files>
          <uuids>
            <value>
              <uuid>72f988bf-86f1-41af-91ab-2d7cd011db47</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows NT\CurrentVersion</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Edge</registry>
              <origin>INPUT_FILE</origin>
            </value>
          </registry>
        </iocs>
        <name>INQUIRY LIST.exe</name>
        <report_id>942a4fad-6fd4-4734-a218-f82091599cdf</report_id>
        <tags>
          <value>peexe</value>
          <value>explorer</value>
          <value>fingerprint</value>
          <value>lolbin</value>
          <value>microsoft_visual_cc</value>
          <value>signed</value>
          <value>adaptive-context</value>
          <value>anti-debug</value>
          <value>anti-vm</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>c2b4d7639c54a7e3e79c62ed7818d214ca6b28ddd2e895a1b91aebfe7a82bee8</id>
    <title>Analysis Report for c2b4d7639c54a7e3e79c62ed7818d214ca6b28ddd2e895a1b91aebfe7a82bee8</title>
    <updated>2026-04-13T03:52:48Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc68ab80678438b878ae01</_id>
        <file_type>application/x-msdownload</file_type>
        <flow_id>69dc688e5ea31bc68a24a5ab</flow_id>
        <hash>c2b4d7639c54a7e3e79c62ed7818d214ca6b28ddd2e895a1b91aebfe7a82bee8</hash>
        <iocs>
          <emails>
            <value>
              <email>Y@System.GC.HeapAffinitizeRanges</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
        </iocs>
        <name>msedge_elf.dll</name>
        <report_id>c45141ed-f0b3-4a7c-b21e-86082754cebc</report_id>
        <tags>
          <value>peexe</value>
          <value>pedll</value>
          <value>anti-debug</value>
          <value>microsoft_visual_cc</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>7f820dc3bb6e0c3305ec24df4325bf4593cd8b471eda0ddbae8b45371a43cfa0</id>
    <title>Analysis Report for 7f820dc3bb6e0c3305ec24df4325bf4593cd8b471eda0ddbae8b45371a43cfa0</title>
    <updated>2026-04-13T03:51:11Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc685cf9522792fdaf8123</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc682d5ea31bc68a24a471</flow_id>
        <hash>7f820dc3bb6e0c3305ec24df4325bf4593cd8b471eda0ddbae8b45371a43cfa0</hash>
        <iocs>
          <urls>
            <value>
              <url>http://127.0.0.1/Admin</url>
              <origin>UNC_PATH</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://avast.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://bitdefender.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://eicar.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://emotet.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://eset.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://extra.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://google.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>http://hwnp.org/api/log</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://i2p2.de</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://kaspersky.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>INPUT_FILE</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://malwarebytes.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://mcafee.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://onion.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://ryuk.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://symantec.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://torproject.org</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://trendmicro.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://trickbot.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://virustotal.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://wannacry-decryptor.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://www.google.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>avast.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>bitdefender.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>eicar.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>emotet.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>eset.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>extra.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>google.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>hwnp.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>i2p2.de</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>kaspersky.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>malwarebytes.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>mcafee.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>onion.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>ryuk.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>symantec.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>torproject.org</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>trendmicro.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>trickbot.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>virustotal.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>wannacry-decryptor.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>ransomware@onion.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>104.18.14.223</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>100.20.214.93</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>185.85.15.46</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>81.7.7.63</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>192.0.66.233</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>104.18.96.219</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>192.0.66.48</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>91.195.241.232</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>91.228.166.47</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>150.70.232.194</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.96.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>UNC_PATH</origin>
            </value>
            <value>
              <ip>204.8.99.146</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>54.68.22.26</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>13.223.25.84</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>89.238.73.97</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>72.246.29.222</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>216.239.32.21</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>avast.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>bitdefender.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>eicar.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>eset.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>extra.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>hwnp.org</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>i2p2.de</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>kaspersky.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>malware.wicar.org</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>malwarebytes.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>mcafee.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>onion.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>ryuk.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>symantec.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>torproject.org</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>trendmicro.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>trickbot.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>virustotal.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <MD5>8346eebdf376771f93509c94551a6802</MD5>
              <SHA-1>a4fd1b0c2121dfdca66132b6728ea60459c1febc</SHA-1>
              <SHA-256>44577b7d1c30056a17af85d37aa7bfac61a2835bd7af707a969849de9e504476</SHA-256>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <MD5>a19a2658ba69030c6ac9d11fd7d7e3c1</MD5>
              <SHA-1>879dcf690e5bf1941b27cf13c8bcf72f8356c650</SHA-1>
              <SHA-256>c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f</SHA-256>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <MD5>10ce24cf5a4e508ffd3f3fa80ba45f11</MD5>
              <SHA-1>264dbcb0de052aa1ff5547869c70e2b55cfd8ef4</SHA-1>
              <SHA-256>99e71db39b4027447fceca962608a1f9b524ac989e6bc0ac5df83cbc9a1a84c2</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <MD5>302498a1bb856a41767945ea8fde8465</MD5>
              <SHA-1>dc32c46c92faffda47a4096a48278bb84fb7d47d</SHA-1>
              <SHA-256>521fc13695c8ce72d82a4d2be9bb5bfae49a476934d682e2811a9e1b0ced0067</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <MD5>ca6dfc1f5ec17fb8674d7c58f9055ca5</MD5>
              <SHA-1>3e6b3d20d7118f8578e928ab02d4df6bb0ef1e3c</SHA-1>
              <SHA-256>6811e6746d0364cb0d89156645fa46e902ebdf1070a00d938428efe6db91d0bf</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <MD5>b7cc4f85746a437560b735f8b1e4f080</MD5>
              <SHA-1>f589e35c5e5bcfffc2bb2b904b7959d07510e42f</SHA-1>
              <SHA-256>27af50aae9c294b74bccdab2956d52404643978cf7770314d991aaf9073fae6e</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <MD5>c2146794630d6906b5b07c7c0f2c407f</MD5>
              <SHA-1>bfa6c370b7dab691fa17472129809df5fd87382b</SHA-1>
              <SHA-256>f4b787908b1f85cfff8210b9613456a7ba0be995d53aceec2d44b9221d572aa3</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <MD5>b6004ee2b801d428a52aff90f6aa8a01</MD5>
              <SHA-1>6052d2f65bce1fe155c60b0919070c5297a8bac8</SHA-1>
              <SHA-256>49291fc680269fa655b78db0c01777097361c8b5a9f0b6df6fef605bcd928b0d</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </registry>
        </iocs>
        <name>hwnp.org_2.exe</name>
        <report_id>bf1ee3bc-51a3-461a-8a76-fe856dcec796</report_id>
        <tags>
          <value>peexe</value>
          <value>html</value>
          <value>txt</value>
          <value>dotnet_pe</value>
          <value>ransomware</value>
          <value>threat</value>
          <value>unknown</value>
          <value>anti-vm</value>
          <value>evasive</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>cmd</value>
          <value>lolbin</value>
          <value>reconnaissance</value>
          <value>wscript</value>
          <value>netsh</value>
          <value>runonce</value>
          <value>schtasks</value>
          <value>smb</value>
          <value>wmic</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>7f820dc3bb6e0c3305ec24df4325bf4593cd8b471eda0ddbae8b45371a43cfa0</id>
    <title>Analysis Report for 7f820dc3bb6e0c3305ec24df4325bf4593cd8b471eda0ddbae8b45371a43cfa0</title>
    <updated>2026-04-13T03:50:47Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6848f9522792fdaf811e</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc6816799d5bf325fa6c41</flow_id>
        <hash>7f820dc3bb6e0c3305ec24df4325bf4593cd8b471eda0ddbae8b45371a43cfa0</hash>
        <iocs>
          <urls>
            <value>
              <url>http://127.0.0.1/Admin</url>
              <origin>UNC_PATH</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://avast.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://bitdefender.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://eicar.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://emotet.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://eset.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://extra.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://google.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>http://hwnp.org/api/log</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://i2p2.de</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://kaspersky.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>INPUT_FILE</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://malwarebytes.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://mcafee.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://onion.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://ryuk.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://symantec.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://torproject.org</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://trendmicro.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://trickbot.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://virustotal.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://wannacry-decryptor.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://www.google.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>avast.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>bitdefender.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>eicar.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>emotet.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>eset.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>extra.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>google.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>hwnp.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>i2p2.de</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>kaspersky.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>malwarebytes.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>mcafee.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>onion.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>ryuk.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>symantec.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>torproject.org</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>trendmicro.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>trickbot.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>virustotal.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>wannacry-decryptor.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>ransomware@onion.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>150.70.232.194</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>81.7.7.63</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>89.238.73.97</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>72.246.29.222</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>204.8.99.146</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>13.223.25.84</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>UNC_PATH</origin>
            </value>
            <value>
              <ip>100.20.214.93</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>52.13.171.212</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>104.18.14.223</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>185.85.15.47</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>104.18.95.219</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>91.228.167.128</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>216.239.34.21</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>192.0.66.48</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>91.195.241.232</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>192.0.66.233</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>avast.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>bitdefender.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>eicar.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>eset.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>extra.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>hwnp.org</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>i2p2.de</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>kaspersky.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>malware.wicar.org</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>malwarebytes.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>mcafee.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>onion.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>ryuk.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>symantec.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>torproject.org</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>trendmicro.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>trickbot.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>virustotal.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <MD5>8346eebdf376771f93509c94551a6802</MD5>
              <SHA-1>a4fd1b0c2121dfdca66132b6728ea60459c1febc</SHA-1>
              <SHA-256>44577b7d1c30056a17af85d37aa7bfac61a2835bd7af707a969849de9e504476</SHA-256>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <MD5>a19a2658ba69030c6ac9d11fd7d7e3c1</MD5>
              <SHA-1>879dcf690e5bf1941b27cf13c8bcf72f8356c650</SHA-1>
              <SHA-256>c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f</SHA-256>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <MD5>10ce24cf5a4e508ffd3f3fa80ba45f11</MD5>
              <SHA-1>264dbcb0de052aa1ff5547869c70e2b55cfd8ef4</SHA-1>
              <SHA-256>99e71db39b4027447fceca962608a1f9b524ac989e6bc0ac5df83cbc9a1a84c2</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <MD5>b70449531c193ae22fb2a7bd41f97f33</MD5>
              <SHA-1>5f52fd9fc0b91f5c73f2d352bd18d0e1d9136735</SHA-1>
              <SHA-256>c421d99d4ce6ae57966cfcde2b5d2af8f0e4be295aee21ec767ce91ecf4495b5</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <MD5>aa448aaf7805b67b3e1a5ec99382bbd5</MD5>
              <SHA-1>763399d8e2eb599d7215dad6b141069f2082aa09</SHA-1>
              <SHA-256>f329f39baf4999bc5aa3abdde250fd3034b0bcc9577faca0027dcfab6fb83444</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <MD5>b7cc4f85746a437560b735f8b1e4f080</MD5>
              <SHA-1>f589e35c5e5bcfffc2bb2b904b7959d07510e42f</SHA-1>
              <SHA-256>27af50aae9c294b74bccdab2956d52404643978cf7770314d991aaf9073fae6e</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <MD5>c2146794630d6906b5b07c7c0f2c407f</MD5>
              <SHA-1>bfa6c370b7dab691fa17472129809df5fd87382b</SHA-1>
              <SHA-256>f4b787908b1f85cfff8210b9613456a7ba0be995d53aceec2d44b9221d572aa3</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <MD5>b9c6fa7e4ffae6787173cef518d6dad6</MD5>
              <SHA-1>1db82330fdc11af539ab0459b24189711fe9dd88</SHA-1>
              <SHA-256>48ad18b7f6b8714b8eeb9bb32b8fe02864be8cf8eae5ddb0e327fed25d9f4c39</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <MD5>aeae973a25b8c8572220db0e0533a8f8</MD5>
              <SHA-1>5d9ac6c08837d61cae5d68ae7275000c5d8ba7e8</SHA-1>
              <SHA-256>e802d6a7881ef112bf45c2ed9e1bab6199acde2abe4e51c4a4b0fcc10947106f</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </registry>
        </iocs>
        <name>hwnp.org_2.exe</name>
        <report_id>75a51841-f542-4428-9ab7-ca70f4cd455a</report_id>
        <tags>
          <value>peexe</value>
          <value>html</value>
          <value>txt</value>
          <value>dotnet_pe</value>
          <value>ransomware</value>
          <value>threat</value>
          <value>unknown</value>
          <value>anti-vm</value>
          <value>evasive</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>cmd</value>
          <value>reconnaissance</value>
          <value>wscript</value>
          <value>lolbin</value>
          <value>netsh</value>
          <value>runonce</value>
          <value>schtasks</value>
          <value>smb</value>
          <value>wmic</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>ef3f6ef6f7c115f4a4c0ff19fed758622d14fedad36b0021de1d90ef1eca4c73</id>
    <title>Analysis Report for ef3f6ef6f7c115f4a4c0ff19fed758622d14fedad36b0021de1d90ef1eca4c73</title>
    <updated>2026-04-13T03:50:44Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc683180678438b878ade8</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc68135ea31bc68a24a449</flow_id>
        <hash>ef3f6ef6f7c115f4a4c0ff19fed758622d14fedad36b0021de1d90ef1eca4c73</hash>
        <iocs>
          <urls>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>INPUT_FILE</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://watch-monster.com/api/log</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://127.0.0.1/Admin</url>
              <origin>UNC_PATH</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://watch-monster.com/api/log</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>malware.wicar.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>watch-monster.com</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>watch-monster.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>ransomware@onion.com</email>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <email>ransomware@onion.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>1.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>UNC_PATH</origin>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.96.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.96.3</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>a2b248b3ee59141fa4c8a3669ed18565572d5a778f66e042254f6a730d541eff</SHA-256>
              <SHA-1>970bf7ecd169ce37e2e3e240a0bcf5d9b0b1f965</SHA-1>
              <MD5>6072eca6a74711a6f65e4bbf3517fe46</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f</SHA-256>
              <SHA-1>879dcf690e5bf1941b27cf13c8bcf72f8356c650</SHA-1>
              <MD5>a19a2658ba69030c6ac9d11fd7d7e3c1</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>72befb5732d1dfa586c1d7db6865fc5c3b0e473f7d58428be66080679b57211f</SHA-256>
              <SHA-1>4859b1ac452337cea2869293cc0e1f480272cba5</SHA-1>
              <MD5>499dc42ff233a04b8d9d70b5b80160fe</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>a1c0f8252931073ad3ab7567cd1c60ea55292baec49b939355e92e54f8373331</SHA-256>
              <SHA-1>6d295ff88f8daab3e068849476f2a237760e927d</SHA-1>
              <MD5>8d1d3e8c62ef81a954d4bf751c6f4015</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
          </files>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\REvil</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings\shell\open\command</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <registry>Software\LockBit</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\WannaCry</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
          </registry>
        </iocs>
        <name>watch-monster.com_2.exe</name>
        <report_id>572c91d3-bdd2-4857-a1e7-90ff4294ef7a</report_id>
        <tags>
          <value>peexe</value>
          <value>html</value>
          <value>dotnet_pe</value>
          <value>ransomware</value>
          <value>cryptear</value>
          <value>cryptolocker</value>
          <value>filecoder</value>
          <value>hiddentear</value>
          <value>lockfile</value>
          <value>unsafe</value>
          <value>anti-vm</value>
          <value>evasive</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>cmd</value>
          <value>reconnaissance</value>
          <value>wscript</value>
          <value>lolbin</value>
          <value>netsh</value>
          <value>runonce</value>
          <value>schtasks</value>
          <value>smb</value>
          <value>wmic</value>
          <value>obfuscated</value>
          <value>soft-404</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>81baaef0f37fd5d8c844baf408ed539ef603ef017d59ccc7fa5399360f3aa118</id>
    <title>Analysis Report for 81baaef0f37fd5d8c844baf408ed539ef603ef017d59ccc7fa5399360f3aa118</title>
    <updated>2026-04-13T03:50:38Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc682f80678438b878ade7</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc680c5ea31bc68a24a43e</flow_id>
        <hash>81baaef0f37fd5d8c844baf408ed539ef603ef017d59ccc7fa5399360f3aa118</hash>
        <iocs>
          <urls>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://hwnp.org</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>INPUT_FILE</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://127.0.0.1/Admin</url>
              <origin>UNC_PATH</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://hwnp.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>hwnp.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>hwnp.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>ransomware@onion.com</email>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <email>ransomware@onion.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>UNC_PATH</origin>
            </value>
            <value>
              <ip>188.114.96.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>1.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.96.3</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>4e402a1d3fb0195088ee6cf76061fbaf19d6be9e76f6120fe560dd8a909ce82b</SHA-256>
              <SHA-1>5d9b14f2eee932716e9ea21803250e603bd5b021</SHA-1>
              <MD5>d0688ebcbf5ba5a35151dd33e555fe9f</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f</SHA-256>
              <SHA-1>879dcf690e5bf1941b27cf13c8bcf72f8356c650</SHA-1>
              <MD5>a19a2658ba69030c6ac9d11fd7d7e3c1</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>72befb5732d1dfa586c1d7db6865fc5c3b0e473f7d58428be66080679b57211f</SHA-256>
              <SHA-1>4859b1ac452337cea2869293cc0e1f480272cba5</SHA-1>
              <MD5>499dc42ff233a04b8d9d70b5b80160fe</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>4db1f60fd9d2f762bd90c38e4e792f01c90789f894c663d4d145d90161aac614</SHA-256>
              <SHA-1>70ebdcfd9ef12cf9e1795b9fc3f06c54b500bd4b</SHA-1>
              <MD5>cebbe4684973b85cc5a3fba2bcad3399</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\REvil</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings\shell\open\command</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <registry>Software\LockBit</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\WannaCry</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </registry>
        </iocs>
        <name>hwnp.org.exe</name>
        <report_id>9e547eb0-5108-438d-866a-dee7f7f66f96</report_id>
        <tags>
          <value>peexe</value>
          <value>html</value>
          <value>dotnet_pe</value>
          <value>ransomware</value>
          <value>cryptear</value>
          <value>cryptolocker</value>
          <value>filecoder</value>
          <value>hiddentear</value>
          <value>lockfile</value>
          <value>unsafe</value>
          <value>anti-vm</value>
          <value>evasive</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>cmd</value>
          <value>masquerade</value>
          <value>reconnaissance</value>
          <value>wscript</value>
          <value>lolbin</value>
          <value>netsh</value>
          <value>runonce</value>
          <value>schtasks</value>
          <value>smb</value>
          <value>wmic</value>
          <value>obfuscated</value>
          <value>soft-404</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>ef3f6ef6f7c115f4a4c0ff19fed758622d14fedad36b0021de1d90ef1eca4c73</id>
    <title>Analysis Report for ef3f6ef6f7c115f4a4c0ff19fed758622d14fedad36b0021de1d90ef1eca4c73</title>
    <updated>2026-04-13T03:50:23Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc681c80678438b878ade2</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc67fed920e19044f93030</flow_id>
        <hash>ef3f6ef6f7c115f4a4c0ff19fed758622d14fedad36b0021de1d90ef1eca4c73</hash>
        <iocs>
          <urls>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://watch-monster.com/api/log</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>INPUT_FILE</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://watch-monster.com/api/log</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://127.0.0.1/Admin</url>
              <origin>UNC_PATH</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>malware.wicar.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>watch-monster.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>watch-monster.com</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>ransomware@onion.com</email>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <email>ransomware@onion.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>UNC_PATH</origin>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>1.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.96.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.96.3</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>a2b248b3ee59141fa4c8a3669ed18565572d5a778f66e042254f6a730d541eff</SHA-256>
              <SHA-1>970bf7ecd169ce37e2e3e240a0bcf5d9b0b1f965</SHA-1>
              <MD5>6072eca6a74711a6f65e4bbf3517fe46</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f</SHA-256>
              <SHA-1>879dcf690e5bf1941b27cf13c8bcf72f8356c650</SHA-1>
              <MD5>a19a2658ba69030c6ac9d11fd7d7e3c1</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>72befb5732d1dfa586c1d7db6865fc5c3b0e473f7d58428be66080679b57211f</SHA-256>
              <SHA-1>4859b1ac452337cea2869293cc0e1f480272cba5</SHA-1>
              <MD5>499dc42ff233a04b8d9d70b5b80160fe</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>bf5db239cca0bd3c642116296964a96f869bf28228858ee94c708946b056e576</SHA-256>
              <SHA-1>52d10e93267c005454ca33fb4c5aab1487c165b0</SHA-1>
              <MD5>4e5d01b886facfd40863f2d7b7ed2943</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
          </files>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\REvil</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings\shell\open\command</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <registry>Software\LockBit</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\WannaCry</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
          </registry>
        </iocs>
        <name>watch-monster.com_2.exe</name>
        <report_id>d943ca24-5434-4114-8ef2-e80186f7f1e7</report_id>
        <tags>
          <value>peexe</value>
          <value>html</value>
          <value>dotnet_pe</value>
          <value>ransomware</value>
          <value>filecoder</value>
          <value>hiddentear</value>
          <value>anti-vm</value>
          <value>evasive</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>cmd</value>
          <value>reconnaissance</value>
          <value>wscript</value>
          <value>lolbin</value>
          <value>netsh</value>
          <value>runonce</value>
          <value>schtasks</value>
          <value>smb</value>
          <value>wmic</value>
          <value>obfuscated</value>
          <value>soft-404</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>1a4fe4ee897b5c109b1bc603a73a43e54f25c0407d674280805c103c71b57e57</id>
    <title>Analysis Report for 1a4fe4ee897b5c109b1bc603a73a43e54f25c0407d674280805c103c71b57e57</title>
    <updated>2026-04-13T03:48:37Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc67b580678438b878adcf</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc67933a506932d7c076b7</flow_id>
        <hash>1a4fe4ee897b5c109b1bc603a73a43e54f25c0407d674280805c103c71b57e57</hash>
        <iocs>
          <urls>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://watch-monster.com</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://127.0.0.1/Admin</url>
              <origin>UNC_PATH</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>INPUT_FILE</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://watch-monster.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>malware.wicar.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>watch-monster.com</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>watch-monster.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>ransomware@onion.com</email>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <email>ransomware@onion.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>UNC_PATH</origin>
            </value>
            <value>
              <ip>188.114.96.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>1.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.96.3</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>877d40994e74cabe8b483eed13545ff94fbd73e41e3b933db2269b10e430fdb1</SHA-256>
              <SHA-1>2f3231119fa40dee0ad675990173c12d7f841472</SHA-1>
              <MD5>b191d8882c6b6ba29cb2a52e38e8e7f0</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f</SHA-256>
              <SHA-1>879dcf690e5bf1941b27cf13c8bcf72f8356c650</SHA-1>
              <MD5>a19a2658ba69030c6ac9d11fd7d7e3c1</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>72befb5732d1dfa586c1d7db6865fc5c3b0e473f7d58428be66080679b57211f</SHA-256>
              <SHA-1>4859b1ac452337cea2869293cc0e1f480272cba5</SHA-1>
              <MD5>499dc42ff233a04b8d9d70b5b80160fe</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>3702e6a499e65075a3079fb80ff52b3d9dc3a8eeaf78e69e2c5dd35a7abe61aa</SHA-256>
              <SHA-1>05b19c3bcd8b2af0823fdb4cd226de65e44a069c</SHA-1>
              <MD5>764d1e39351018d9b92de3f533051d54</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
          </files>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\REvil</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings\shell\open\command</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <registry>Software\LockBit</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\WannaCry</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </registry>
        </iocs>
        <name>watch-monster.com.exe</name>
        <report_id>ed4d7ebd-b366-4571-ab54-4eec5f0ddcca</report_id>
        <tags>
          <value>peexe</value>
          <value>html</value>
          <value>dotnet_pe</value>
          <value>ransomware</value>
          <value>filecoder</value>
          <value>hiddentear</value>
          <value>anti-vm</value>
          <value>evasive</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>cmd</value>
          <value>masquerade</value>
          <value>reconnaissance</value>
          <value>wscript</value>
          <value>lolbin</value>
          <value>netsh</value>
          <value>runonce</value>
          <value>schtasks</value>
          <value>smb</value>
          <value>wmic</value>
          <value>obfuscated</value>
          <value>soft-404</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>208e17e748834b1efeaed4d21d7bd1128e32214e199d3ac9ca13bc39ec145d05</id>
    <title>Analysis Report for 208e17e748834b1efeaed4d21d7bd1128e32214e199d3ac9ca13bc39ec145d05</title>
    <updated>2026-04-13T03:48:08Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc67a180678438b878adca</_id>
        <file_type>application/x-dosexec</file_type>
        <flow_id>69dc6776d920e19044f92f83</flow_id>
        <hash>208e17e748834b1efeaed4d21d7bd1128e32214e199d3ac9ca13bc39ec145d05</hash>
        <iocs>
          <urls>
            <value>
              <url>https://accounts.google.com/o/oauth2/auth?</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://acrobatoauth.adobe.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://acrobatoauth.adobe.com/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://acrobatoauth.adobe.com/delegation_end</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://acrobatoauth.adobe.com/delegation_error</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://acrobatoauth.adobe.com/delegation_start</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://app.box.com/api/oauth2/authorize?</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://armmf-stg.corp.adobe.com/arm-manifests/win/kaizen/reader/v1/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://armmf.adobe.com/arm-manifests/win/kaizen/reader/v1/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://clients2.google.com/service/update2/crx</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://commerce-stg.adobe.com/payments/in-app/billing?</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://commerce.adobe.com/payments/in-app/billing?</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://helpx.adobe.com/acrobat/kb/acrobat-failed-load-core-dll.html</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://helpx.adobe.com/acrobat/kb/failed-to-connect-to-dde-server.html</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://ims-na1-stg1.adobelogin.com/ims/authorize/v1?</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://ims-na1.adobelogin.com/ims/authorize/v1?</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://ims-na1.adobelogin.com/ims/logout/v1?</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.live.com/oauth20_authorize.srf?</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.live.com/oauth20_logout.srf?</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.microsoftonline.com/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.microsoftonline.com/common/oauth2/authorize?</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.microsoftonline.com/common/oauth2/v2.0/authorize?</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.microsoftonline.com/common/oauth2/v2.0/logout?</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.windows.net/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://login.windows.net/common/oauth2/authorize?</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://mail.google.com/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://msmip.reader.com/authorize</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://oobe.adobe.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://oobe.adobe.com/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://rna-pdf-resource.acrobat.com/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.dropbox.com/oauth2/authorize?</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.google.com/m8/feeds</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.googleapis.com/auth/contacts.readonly</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.googleapis.com/auth/drive</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.googleapis.com/auth/gmail.compose</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.googleapis.com/auth/userinfo.profile</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>accounts.google.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>acrobatoauth.adobe.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>app.box.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>armmf-stg.corp.adobe.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>armmf.adobe.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>clients2.google.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>commerce-stg.adobe.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>commerce.adobe.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>dropbox.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>google.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>googleapis.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>helpx.adobe.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>ims-na1-stg1.adobelogin.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>ims-na1.adobelogin.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>login.live.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>login.microsoftonline.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>login.windows.net</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>mail.google.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>msmip.reader.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>oobe.adobe.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>rna-pdf-resource.acrobat.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>appro@openssl.org</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>23.48.23.23</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>40.126.32.76</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>104.18.39.35</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>23.52.180.165</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>142.251.127.84</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>1.3.14.3</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>1.3.6.1</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>11.2.1.12</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>49.1.9.6</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>184.86.103.197</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>20.190.159.4</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>142.251.110.18</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>142.250.154.147</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>142.251.14.100</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>172.66.0.163</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>40.126.32.136</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>23.36.162.220</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>74.112.186.157</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>142.251.13.101</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>162.125.248.18</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>142.251.127.84</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>23.52.180.165</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>74.112.186.157</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>142.251.13.101</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>23.36.162.220</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>184.86.103.197</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>162.125.248.18</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>142.251.14.100</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>142.250.154.147</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>23.48.23.23</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>104.18.39.35</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>172.66.0.163</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>40.126.32.76</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>40.126.32.136</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>20.190.159.4</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>142.251.110.18</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>1f08569caa4db78cd12752e0343cd4bfd02c5990676e45b472c5e0572a841b7c</SHA-256>
              <SHA-1>ddefd39f5270bb56f9de023bf02862982d3069ae</SHA-1>
              <MD5>ecb3fea9b8fba3816da208767162ebaf</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>307caea8924a8affac6648ba4c726c2382d39ade61d77fc79fe67b4943d64b2d</SHA-256>
              <SHA-1>cd177c732c4c645431e16e8a3cfb4ed53c6827db</SHA-1>
              <MD5>50d172809d69339f0384a065d20f5e64</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>44187ff4140f94612c4a355ebeab169547b1876bf97aaaecddaa0a56f4badddd</SHA-256>
              <SHA-1>a0f0f294d7f0a8e833d8fd0c1bdfe1552c8bef07</SHA-1>
              <MD5>95557b6df9f62ce018aaae42b97ec8d6</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>792cff11697acb0e37f33fea313da41d0910e3c5beffd6c55bc9e47060120d6b</SHA-256>
              <SHA-1>dc5ec544d32d057ed217ddcee44eb6c0cf1d3795</SHA-1>
              <MD5>e6f4604fff51a3fb910babda8c6f1a17</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>93d8b8de1752ec8859cdd4b557501a3af23f043fc59b6b7849ef35ffb151fd64</SHA-256>
              <SHA-1>29950696edd174ca3500ffd6032b15a4a6b19763</SHA-1>
              <MD5>38afd858bcaf4c866ad67a4b1f57984e</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>a629767bb84a1004e81ff98e34188dc1c1fa28b509458a3e3db1d5dc18ad20f4</SHA-256>
              <SHA-1>46b1bdd8b2e776e9c08a27397cb8f0e87d75a003</SHA-1>
              <MD5>0fb4ea8494e756e84879fd12ce539b89</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>b36b331feec7ff160c33fc349f0416af044f9e825a0bdaece22c65c767bb7430</SHA-256>
              <SHA-1>5e81ac9b702949e8eeff4f2282c41ec8010651da</SHA-1>
              <MD5>c1f99df4b12f2def5253900246b1af7e</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>bbb3fd01ee8ba4fe2e5789e722d7f9f3fb7d160580bc120204c03462f3f91e4a</SHA-256>
              <SHA-1>4a54f66b6111ee71e21f8cf72d26903db6a9d148</SHA-1>
              <MD5>58a2343597931b7a877e9c1afa42c641</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>ce873c165f77ec010c3ca972787c2e644290b2d38405bc2a60794da83f2ffe5b</SHA-256>
              <SHA-1>7ee76df553201d8e3cdead3deb53aae7a0c9fd46</SHA-1>
              <MD5>304178394a250caf55a1322f492a8866</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>d43a2656350d27cb11c8d103d87d55202e48e42e07f9c4657a65de8dd47b54a3</SHA-256>
              <SHA-1>ce4303abeb3414817fa6dece6e079d626e528173</SHA-1>
              <MD5>4601fae4cea01f80debdf53f8e29eb5f</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>fd33cf040ec0cb00fd6041e740f16c8429397e13da948e70bc656d999229d3b5</SHA-256>
              <SHA-1>4066640db0db1470cb5049591c8692fff5ccb3cc</SHA-1>
              <MD5>af6a7db92f8af6faca9dcdd5161329b1</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>3df6abf018227b18f9ed9486900d3e049e41c89dc34808ce30929b7e85c0b824</SHA-256>
              <SHA-1>ccad26b17667257d6769a3c86f05325167f7cc2f</SHA-1>
              <MD5>6e356bd6ea9332a4509e8dcf08d32869</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>5b13fb5957b84ef7bb9d0b6cd509c947ff6a37d67efdac2b896ddd3b908aad10</SHA-256>
              <SHA-1>832e403d42aac1fec93e4f602338544d3fd2e4f1</SHA-1>
              <MD5>bb8f534fbff5ee61a95af9c4740ae043</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>c121e9d3e5e29966efc265e580aef7ea6a36dd90c7f51655d11eb86e2b95fce5</SHA-256>
              <SHA-1>7e23666767c8429843fee19336c9f9b1b71d9bf7</SHA-1>
              <MD5>e840d0ea1dd42747873a0c1819edc68b</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>application/xml</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <SHA-256>e50e2c79f3d700aae47b46feaf726badcdd86928c23d2125d591217e17ae9195</SHA-256>
              <SHA-1>0d0dfb435837422cc2702695dc8fde1e6ccba129</SHA-1>
              <MD5>a83d156112fe8c4cd6a11df84e8d935c</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>0f8ca9f7fe43d26d1fc2587dffe528c3774b4ab0f75bec718785a88586532975</SHA-256>
              <SHA-1>04401638ac98ebe28db2482d27dadcc97879711b</SHA-1>
              <MD5>4238be85778eb8fe929464b2cda83222</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
          <uuids>
            <value>
              <uuid>054AAE20-4BEA-4347-8A35-64A533254A9D</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>0AFACED1-E828-11D1-9187-B532F1E9575D</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>100184D2-BDC3-477a-B8D3-65548B67914C</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>2382840d-9c54-438f-af1c-8a8d1a547385</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>32B6B37A-4A7D-4e00-95F2-6F0BF3DE3E00</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>4e9b8b9a-1001-4017-8dd1-6e8f25e19d13</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>56079431-ea46-4833-94f9-1ff5658cdb1c</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>61f56613-c62c-4b17-84dd-62b60d5776aa</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>6d9d9777-7ded-4768-8191-9a707d72b009</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>8895b1c6-b41f-4c1c-a562-0d564250836f</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>A6EADE66-0000-0000-484E-7E8A45000000</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>AC76BA86-0000-0000-7760-7E8A45000000</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>AC76BA86-0000-0000-7761-7E8A45000000</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>AC76BA86-0000-0000-BA7E-7E8A45000000</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>C43FCC54-5B86-4525-B9C3-5C382D06C790</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>C63E89DC-9712-40e4-9CDB-B3BE855B6C79</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>C7764963-1E50-4f24-91A4-A1BC5EBA2747</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>cad2910c-3b55-4610-ba7e-dda581063c91</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>eed3bd3a-a1ad-4e99-987b-d7cb3fcfa7f0</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>f2eb6c79-671d-4de2-b7be-3b2eea7abc47</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
          <registry>
            <value>
              <registry>HKCU\%s\*</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>HKCU\SOFTWARE\Adobe\CommonFiles*</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>HKCU\SOFTWARE\Lotus\Notes*</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>HKCU\SOFTWARE\Lotus\Notes\Installer*</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>HKCU\SOFTWARE\Microsoft\Speech*</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache*</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache*</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>HKCU\Software\Adobe\Acrobat Reader\DC\AVGeneral\cAdHocFiles*</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>HKCU\Software\Adobe\Acrobat Reader\DC\AVGeneral\cFavoriteFiles*</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>HKCU\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles*</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>HKCU\Software\Adobe\Acrobat Reader\DC\Installer\NotificationAppx*</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>HKCU\Software\Adobe\Acrobat Reader\DC\Privileged*</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>HKCU\Software\Adobe\Adobe Acrobat\DC\Privileged*</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>HKCU\Software\Adobe\CommonFiles\Usage</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>HKCU\System\CurrentControlSet\Control\MediaProperties\PrivateProperties*</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Adobe\AcroPerf</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Adobe\Acrobat Reader\</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Adobe\Acrobat Reader\DC\AcroSpeedLaunch</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Adobe\Acrobat Reader\DC\InstallPath</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Adobe\Acrobat Reader\DC\WebResource</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Adobe\Adobe Acrobat\</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Adobe\Adobe Acrobat\DC\InstallPath</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Adobe\Adobe Acrobat\DC\Installer</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Adobe\Adobe Acrobat\DC\Installer\</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Adobe\Adobe Acrobat\DC\Language</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Adobe\Adobe Acrobat\DC\appv</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Google\Chrome\</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Google\Chrome\Extensions\</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Google\Chrome\Extensions\efaidnbmnnnibpcajpcglclefindmkaj</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Google\Chrome\NativeMessagingHosts\</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Google\Chrome\NativeMessagingHosts\com.adobe.acrobat.chrome_webcapture</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Justsystem\ATOK\Setup\Folder</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\IMEJP</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\IMEJP\%s\directories</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Internet Explorer</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION</registry>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Office\11.0\Outlook\InstallRoot</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows NT\CurrentVersion</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows NT\CurrentVersion\AeDebug</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Adobe\Acrobat Reader\DC</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Adobe\Acrobat Reader\DC\FeatureLockDown</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Adobe\Acrobat Reader\DC\FeatureLockDown\cProtectedModeConfigFiles</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Adobe\Acrobat Reader\DC\FeatureLockdown</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Adobe\Adobe Acrobat\DC\FeatureLockDown</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Adobe\Adobe Acrobat\DC\FeatureLockdown</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Wow6432Node\Adobe\Acrobat Reader\</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Wow6432Node\Adobe\Adobe Acrobat\</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\FileSystem</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\Terminal Server</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\Terminal Server\ClusterSettings</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Adobe\%s\%s\Privileged</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Acrobat Reader\11.0\AVGeneral\cRecentFiles</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Acrobat Reader\DC</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Acrobat Reader\DC\AVGeneral</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles_old</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Acrobat Reader\DC\AcroApp</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Acrobat Reader\DC\Activation</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Acrobat Reader\DC\FEAT\cFeatDir</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Acrobat Reader\DC\FeatureState</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Acrobat Reader\DC\InstallPath</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Acrobat Reader\DC\Installer</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Acrobat Reader\DC\Installer\IOD</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Acrobat Reader\DC\Language</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Acrobat Reader\DC\Privileged</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Acrobat Reader\DC\Privileged\cInAppPurchase</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Acrobat Reader\DC\Privileged\cInAppPurchase\cFileInfo</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Acrobat Reader\DC\Privileged\cInAppPurchase\cFileInfo\cPathInfo</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Acrobat Reader\DC\SendMail</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Acrobat Reader\DC\TrustManager</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Acrobat\Exe</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Adobe Acrobat\11.0\AVGeneral\cRecentFiles</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Adobe Acrobat\DC\AVGeneral</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Adobe Acrobat\DC\AcroApp</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Adobe Acrobat\DC\DiskCabs</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Adobe Acrobat\DC\FeatureState</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Adobe Acrobat\DC\InstallPath</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Adobe Acrobat\DC\Installer</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Adobe Acrobat\DC\Language</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Adobe Acrobat\DC\Privileged</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Adobe Acrobat\DC\Security</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Adobe Synchronizer\DC</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\CommonFiles\Usage\AcrobatDC</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\CommonFiles\Usage\Reader %u_Acrobat%u_Reader_%u.%u.%u</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\CommonFiles\Usage\Reader DC</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Adobe\Repair\Acrobat Reader\DC\IOD</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Classes\CLSID\{054AAE20-4BEA-4347-8A35-64A533254A9D}\LocalServer32</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf\OpenWithList</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf\UserChoice</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Policies\Adobe\%s\%s\FeatureLockDown</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Policies\Adobe\Acrobat Reader\DC\FeatureLockDown</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Policies\Adobe\Adobe Acrobat\DC\FeatureLockDown</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Policies\Adobe\Adobe Acrobat\DC\FeatureLockDown\cProtectedModeConfigFiles</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>System\CentralProcessor\0</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>System\CurrentControlSet\Control\Citrix</registry>
              <origin>INPUT_FILE</origin>
            </value>
          </registry>
        </iocs>
        <name>2026-04-05_4d02ca86f3fa132f43c9f4667cf85e3e_amadey_coinminer_darkgate_elex_hijackloader_luca-stealer_njrat_nymaim_remcos.exe</name>
        <report_id>0cb72b2a-0d8a-4cf4-b88b-de0a83364b15</report_id>
        <tags>
          <value>peexe</value>
          <value>html</value>
          <value>xml</value>
          <value>virus</value>
          <value>unsafe</value>
          <value>packed</value>
          <value>anti-vm</value>
          <value>evasive</value>
          <value>hacktool</value>
          <value>msiexec</value>
          <value>verclsid</value>
          <value>overlay</value>
          <value>explorer</value>
          <value>lolbin</value>
          <value>obfuscated</value>
          <value>soft-404</value>
          <value>microsoft_visual_cc</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>7f820dc3bb6e0c3305ec24df4325bf4593cd8b471eda0ddbae8b45371a43cfa0</id>
    <title>Analysis Report for 7f820dc3bb6e0c3305ec24df4325bf4593cd8b471eda0ddbae8b45371a43cfa0</title>
    <updated>2026-04-13T03:47:10Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc675b80678438b878adbb</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc673dd920e19044f92f33</flow_id>
        <hash>7f820dc3bb6e0c3305ec24df4325bf4593cd8b471eda0ddbae8b45371a43cfa0</hash>
        <iocs>
          <urls>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://hwnp.org/api/log</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://127.0.0.1/Admin</url>
              <origin>UNC_PATH</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://hwnp.org/api/log</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>INPUT_FILE</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>hwnp.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>hwnp.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>ransomware@onion.com</email>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <email>ransomware@onion.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>1.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.96.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>UNC_PATH</origin>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.96.3</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>44577b7d1c30056a17af85d37aa7bfac61a2835bd7af707a969849de9e504476</SHA-256>
              <SHA-1>a4fd1b0c2121dfdca66132b6728ea60459c1febc</SHA-1>
              <MD5>8346eebdf376771f93509c94551a6802</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f</SHA-256>
              <SHA-1>879dcf690e5bf1941b27cf13c8bcf72f8356c650</SHA-1>
              <MD5>a19a2658ba69030c6ac9d11fd7d7e3c1</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>72befb5732d1dfa586c1d7db6865fc5c3b0e473f7d58428be66080679b57211f</SHA-256>
              <SHA-1>4859b1ac452337cea2869293cc0e1f480272cba5</SHA-1>
              <MD5>499dc42ff233a04b8d9d70b5b80160fe</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>b5a886c5d4dbfbed86b427eb291d3cbdf5c7512ac4430676170d6633d0094986</SHA-256>
              <SHA-1>8d60f669d5b949fa816c4651d3f8bc7ce7b1adb6</SHA-1>
              <MD5>d700bb21f7ebb40986e94dc6c6025389</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>d729b8a5cc03b2b54c4d4d2080f2cf071b3ef786b156e14e219d4fe5673550e2</SHA-256>
              <SHA-1>f8e8a690b8b52442938802d4663f43f20afb5ad1</SHA-1>
              <MD5>447c79d73b06e618b66e5d4777129f14</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\REvil</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings\shell\open\command</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <registry>Software\LockBit</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\WannaCry</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
          </registry>
        </iocs>
        <name>hwnp.org_2.exe</name>
        <report_id>9f404a39-17b6-4181-9cc2-b857b0bd1bde</report_id>
        <tags>
          <value>peexe</value>
          <value>html</value>
          <value>dotnet_pe</value>
          <value>ransomware</value>
          <value>cryptear</value>
          <value>cryptolocker</value>
          <value>filecoder</value>
          <value>hiddentear</value>
          <value>lockfile</value>
          <value>unsafe</value>
          <value>anti-vm</value>
          <value>evasive</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>cmd</value>
          <value>reconnaissance</value>
          <value>wscript</value>
          <value>lolbin</value>
          <value>netsh</value>
          <value>runonce</value>
          <value>schtasks</value>
          <value>smb</value>
          <value>wmic</value>
          <value>obfuscated</value>
          <value>soft-404</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>ba4b2358aa33929307a3204e0aa1b1049d6c41232af1f6b72bc41d31d4db6f8e</id>
    <title>Analysis Report for ba4b2358aa33929307a3204e0aa1b1049d6c41232af1f6b72bc41d31d4db6f8e</title>
    <updated>2026-04-13T03:46:40Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc672e80678438b878adb2</_id>
        <file_type>application/x-dosexec</file_type>
        <flow_id>69dc671e799d5bf325fa6a8c</flow_id>
        <hash>ba4b2358aa33929307a3204e0aa1b1049d6c41232af1f6b72bc41d31d4db6f8e</hash>
        <iocs>
          <ips>
            <value>
              <ip>1.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>0af5f402d0b26ab544614614985a913bd0a36096daf85af7e29d4acc143ad7b2</SHA-256>
              <SHA-1>2725c61b5bcbb07270522c5c76337fd13ce7d1ec</SHA-1>
              <MD5>498745d88d7d011477735cf2c59d584d</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>3f921d65d0ba465f97f4d44efb8a13ebb76f8df0dde7d69b42f78a9e8318b239</SHA-256>
              <SHA-1>3318c5cac272603074afea437f074fd6cefcef6a</SHA-1>
              <MD5>3ecf6a0cb6b6734b55a5d50a5ec9526d</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload; format=pe32</file_type>
            </value>
            <value>
              <SHA-256>6f88bc7cb02ccb2dbc26b5f4ce53e355b331e31bb920b2ba8cbbcd1b5d4cd5a0</SHA-256>
              <SHA-1>dc9804dd3aa348fb0c05f53c53c698518af514a0</SHA-1>
              <MD5>9ce8c70178061cc4cf4a6bb1e291df93</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>9edc8aff7521fa9c9b21ed56c37261ad793ac813dc97622faedb72748fc36661</SHA-256>
              <SHA-1>acd540b80d13533829c70776605493035b19d85c</SHA-1>
              <MD5>e2155aa3c326ccf68d681ce86822fe26</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>b251906261812d247939b0ccf976388aa9e8c36a8db0f7d2f07aeaa285c74576</SHA-256>
              <SHA-1>0f1c1b2a5765f4a27b26bfa8f5bdb85d61255ead</SHA-1>
              <MD5>296bf033364ab465c10f6a7973e6c344</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>b5fae454eae83931e8508b3c158b122f7100b65d70065e8af2aaeddb639a5c40</SHA-256>
              <SHA-1>f51d2ad16dc79373001160a2b5e7a2f861f60d5c</SHA-1>
              <MD5>0d62df6f0138e145185b2c1c45bf72bc</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f</SHA-256>
              <SHA-1>879dcf690e5bf1941b27cf13c8bcf72f8356c650</SHA-1>
              <MD5>a19a2658ba69030c6ac9d11fd7d7e3c1</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>c49db3fb9a74c55628b2cf900ca305ede59e01d6332a000d23d0b44be9be06bf</SHA-256>
              <SHA-1>bbe465451083ea2dba8ac4bdf7bcce1e38df3c8c</SHA-1>
              <MD5>ad4e7a7a96e8a94df215a45a172ce7cb</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
          </files>
          <uuids>
            <value>
              <uuid>3fe8fa79-5dce-4503-ab23-464ea24babff</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </registry>
        </iocs>
        <name>xba4b2358aa33929307a3204e0aa1b1049d6c41232af1f6b72bc41d31d4db6f8e.exe</name>
        <report_id>1ec31c4e-c5ac-47b4-ac1a-7c58bbb43298</report_id>
        <tags>
          <value>peexe</value>
          <value>xworm</value>
          <value>njrat</value>
          <value>unsafe</value>
          <value>virus</value>
          <value>anti-vm</value>
          <value>fingerprint</value>
          <value>obfuscated</value>
          <value>overlay</value>
          <value>base64</value>
          <value>reconnaissance</value>
          <value>anti-debug</value>
          <value>microsoft_visual_cc</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>81baaef0f37fd5d8c844baf408ed539ef603ef017d59ccc7fa5399360f3aa118</id>
    <title>Analysis Report for 81baaef0f37fd5d8c844baf408ed539ef603ef017d59ccc7fa5399360f3aa118</title>
    <updated>2026-04-13T03:46:15Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc672a80678438b878adaf</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc67065ea31bc68a24a109</flow_id>
        <hash>81baaef0f37fd5d8c844baf408ed539ef603ef017d59ccc7fa5399360f3aa118</hash>
        <iocs>
          <urls>
            <value>
              <url>http://127.0.0.1/Admin</url>
              <origin>UNC_PATH</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://hwnp.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://hwnp.org</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>INPUT_FILE</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>hwnp.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>hwnp.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>ransomware@onion.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>ransomware@onion.com</email>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>UNC_PATH</origin>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>1.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>4e402a1d3fb0195088ee6cf76061fbaf19d6be9e76f6120fe560dd8a909ce82b</SHA-256>
              <SHA-1>5d9b14f2eee932716e9ea21803250e603bd5b021</SHA-1>
              <MD5>d0688ebcbf5ba5a35151dd33e555fe9f</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f</SHA-256>
              <SHA-1>879dcf690e5bf1941b27cf13c8bcf72f8356c650</SHA-1>
              <MD5>a19a2658ba69030c6ac9d11fd7d7e3c1</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>72befb5732d1dfa586c1d7db6865fc5c3b0e473f7d58428be66080679b57211f</SHA-256>
              <SHA-1>4859b1ac452337cea2869293cc0e1f480272cba5</SHA-1>
              <MD5>499dc42ff233a04b8d9d70b5b80160fe</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>a933554b1c10742b43aa4de7dfedc6e48ffec410d863eab61449a31c78794ab5</SHA-256>
              <SHA-1>5605e96971bbbd7e9f1f8cc4d1394e3e85daaf7c</SHA-1>
              <MD5>bf5c9a69c7dc05852bc80e82114934e0</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\REvil</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings\shell\open\command</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <registry>Software\LockBit</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\WannaCry</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
          </registry>
        </iocs>
        <name>hwnp.org.exe</name>
        <report_id>46db77c0-409e-438d-828f-21fe1cd338b1</report_id>
        <tags>
          <value>peexe</value>
          <value>html</value>
          <value>dotnet_pe</value>
          <value>ransomware</value>
          <value>cryptear</value>
          <value>cryptolocker</value>
          <value>filecoder</value>
          <value>hiddentear</value>
          <value>lockfile</value>
          <value>unsafe</value>
          <value>anti-vm</value>
          <value>evasive</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>cmd</value>
          <value>masquerade</value>
          <value>reconnaissance</value>
          <value>wscript</value>
          <value>lolbin</value>
          <value>netsh</value>
          <value>runonce</value>
          <value>schtasks</value>
          <value>smb</value>
          <value>wmic</value>
          <value>obfuscated</value>
          <value>soft-404</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>8f803937d5ff5a402fd74d3a8f525b8a84b454dbdfd0c2770974f23530808a21</id>
    <title>Analysis Report for 8f803937d5ff5a402fd74d3a8f525b8a84b454dbdfd0c2770974f23530808a21</title>
    <updated>2026-04-13T03:44:33Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc66b3f9522792fdaf80d8</_id>
        <file_type>application/x-dosexec</file_type>
        <flow_id>69dc669d5ea31bc68a24a014</flow_id>
        <hash>8f803937d5ff5a402fd74d3a8f525b8a84b454dbdfd0c2770974f23530808a21</hash>
        <iocs>
          <urls>
            <value>
              <url>http://117.72.183.111:88/1.exe</url>
              <origin>INPUT_FILE</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://xxq713.e2.luyouxia.net</url>
              <origin>INPUT_FILE</origin>
              <verdict>MALICIOUS</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>xxq713.e2.luyouxia.net</url>
              <origin>INPUT_FILE</origin>
              <verdict>MALICIOUS</verdict>
            </value>
          </domains>
          <ips>
            <value>
              <ip>110.42.6.145</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>117.72.183.111</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>xxq713.e2.luyouxia.net</ip>
              <origin>INPUT_FILE</origin>
              <verdict>MALICIOUS</verdict>
            </value>
          </ips>
          <files>
            <value>
              <MD5>bdc6e3901f8b6f6406b4d9456a08904b</MD5>
              <SHA-1>a7f9a3f4ac7a034dbb4cde7c63966979e0421b05</SHA-1>
              <SHA-256>054d9f2bf0376cc01f37887d5ed4c96b790d8c6537c709f37c80572da84a5a99</SHA-256>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <MD5>e6c94c1631db8f11d802fe32823657be</MD5>
              <SHA-1>d611d0703d1310d7b27361c36f0f4ad7dd62286b</SHA-1>
              <SHA-256>145c9be34655b31561cb119510c385a5c91edb864bcc56bf6b6f98c965f6ba7e</SHA-256>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <MD5>db475268eae13b757d0ed319754dcde6</MD5>
              <SHA-1>dd1c4a8e31714b72fe5e378db037245bec152b32</SHA-1>
              <SHA-256>2f3ab4af16d568dcd199eacb03108606770b55ba2193810d05bf3e9abad85db0</SHA-256>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <MD5>327981831d4d66edea0c0e5b6f2f2381</MD5>
              <SHA-1>a496671199e750135cf9902555182b9d3971ab57</SHA-1>
              <SHA-256>7c12e768b7af60c068d60bcb1afdcf9b284075f1f320b590c1d7dbde76fb9b4e</SHA-256>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <MD5>9b377491fe62a17b1ce986dc39822ee6</MD5>
              <SHA-1>036ad9520f07079c7e853fd8821a76508d494182</SHA-1>
              <SHA-256>806ab56602738d3ef28c6ec7d67b4732759c8de02eb7a573ba0c5d875e36f9de</SHA-256>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <MD5>70a8f12fee2c81f7a33abe763f22ce98</MD5>
              <SHA-1>b6c0be4e48344607571d311e30a3a343bd5eb7fb</SHA-1>
              <SHA-256>8ca168710ef6c65f4c63fbe77ba7a3b863b8779306ea4e64087259925750a62a</SHA-256>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <MD5>30415e45f08fda4bf23385579986948b</MD5>
              <SHA-1>f723b7e2cc849e8d31c08c9c7fa61f6dc41f959b</SHA-1>
              <SHA-256>abdfaa419419fbe9d7b584b77517418987c66ab7aad78f9fb627bb4a668dfe3c</SHA-256>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <MD5>871ea23b0330c09ace83ec79dd2dbf8a</MD5>
              <SHA-1>6753ad281871b42464fa1bf82db169383167d1d4</SHA-1>
              <SHA-256>dc5e32e9b88418511a8ee3bd68d073ab54a8f5323ba04877fdfabeac4617c96b</SHA-256>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <MD5>938a8876b1f947b1c177e1271f7d20ac</MD5>
              <SHA-1>cbe401c31f1a8315378a7aaa5b4ebb128eb18540</SHA-1>
              <SHA-256>58b9a33bacce5ffea887752f54021ba22f974d400fe25b8ccd1bbea4248a992c</SHA-256>
              <origin>PE_UNPACKING</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <MD5>9f260bb3d6a921aa34c2a131d7b496db</MD5>
              <SHA-1>ac0b3c83cba62b7646670f951e77efdb52f56648</SHA-1>
              <SHA-256>d5142f9fe035c771d4b10748f30342f47ac6683ed75293f7361c93e00139a335</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/plain</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <MD5>a43d66db14c86f939a51c0e00b15e2a8</MD5>
              <SHA-1>9a97bbb0ccf6f8a7d9ddefbb075b4ef9688ded67</SHA-1>
              <SHA-256>c937ce00b9959ffb9f7eab74a5482bda206ffe44816531fbdea26727d48ccfd4</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
          </files>
        </iocs>
        <name>8f803937d5ff5a402fd74d3a8f525b8a84b454dbdfd0c2770974f23530808a21.exe</name>
        <report_id>67fdfb0a-e8b5-403a-b0b5-cda001a8e171</report_id>
        <tags>
          <value>peexe</value>
          <value>txt</value>
          <value>packed</value>
          <value>microsoft_visual_cc</value>
          <value>packer_detected</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>86e70b50846e2bfc2c88888cdfb0930daaa6e2d10d763bed71e784d234ddcb7a</id>
    <title>Analysis Report for 86e70b50846e2bfc2c88888cdfb0930daaa6e2d10d763bed71e784d234ddcb7a</title>
    <updated>2026-04-13T03:44:08Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6698f9522792fdaf80d1</_id>
        <file_type>text/x-msdos-batch</file_type>
        <flow_id>69dc667a799d5bf325fa696c</flow_id>
        <hash>86e70b50846e2bfc2c88888cdfb0930daaa6e2d10d763bed71e784d234ddcb7a</hash>
        <iocs>
          <uuids>
            <value>
              <uuid>DAC14256-C85B-4B5B-A8AB-5D5960FF3E75</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
          <registry>
            <value>
              <registry>HKCU\Software\Classes\CLSID\{DAC14256-C85B-4B5B-A8AB-5D5960FF3E75}</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>HKCU\Software\Classes\CLSID\{DAC14256-C85B-4B5B-A8AB-5D5960FF3E75}\InProcServer32</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </registry>
        </iocs>
        <name>IFPS.bat</name>
        <report_id>6b80dde9-af85-4607-9b19-26dcda523212</report_id>
        <tags>
          <value>bat</value>
          <value>cmd</value>
          <value>lolbin</value>
          <value>obfuscated</value>
          <value>rundll32</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>984320881980d3ce54085cfed4909839cc5835b901f3c5dc51f4193d1e55c2d3</id>
    <title>Analysis Report for 984320881980d3ce54085cfed4909839cc5835b901f3c5dc51f4193d1e55c2d3</title>
    <updated>2026-04-13T03:43:38Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc66743040601e24ad5e73</_id>
        <file_type>application/x-msdownload</file_type>
        <flow_id>69dc66695ea31bc68a249f7c</flow_id>
        <hash>984320881980d3ce54085cfed4909839cc5835b901f3c5dc51f4193d1e55c2d3</hash>
        <iocs>
          <ips>
            <value>
              <ip>1.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>6.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>51733e4f25b05615ccce32d50dfc3fae67c6cd2e82637c052e71ccbe01c5cdfb</SHA-256>
              <SHA-1>9b3855237f8dacda527c014a709ebc72764c02f1</SHA-1>
              <MD5>83c6a2e1932d7e783d0841afc40a0e36</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>637311be80857a7be2c7d12567108e4e73e1497aaec83853a4f4e12e15ef0a58</SHA-256>
              <SHA-1>e2d07317d30160608213b6148c0f6b73ed44fb42</SHA-1>
              <MD5>9b0184f1e96d499c0cb5f0cc45767df4</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>8aecd886e67d8cbe30bc719e7c0df4cd4f4a7e000d14f296e8a1af2c6fb04a11</SHA-256>
              <SHA-1>f2ee97c66ac167b7bb8ddb35c50464102dc716fd</SHA-1>
              <MD5>48b7daa094a69053983c7c0a1a9d1892</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>ef04457e0e73ac21b26411830132357cfa0f66d70eb83c64619397c914d1873c</SHA-256>
              <SHA-1>6e5609f9292fa275dc35ef188e7ebf645926224f</SHA-1>
              <MD5>bd8f0598d4d9fda3b70e052ded9c8e89</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>f9b1c190609ad79731aa037e1648db1d8f3720c9829d6b2af5a70dcd59ddef79</SHA-256>
              <SHA-1>de7448894494b11bc7af5fef668e30bf9a0134d2</SHA-1>
              <MD5>21e64fbed783721f3b1472bad78c78a7</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
          </files>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
          </registry>
        </iocs>
        <name>984320881980d3ce54085cfed4909839cc5835b901f3c5dc51f4193d1e55c2d3.dll</name>
        <report_id>69852c4d-1b13-43e8-b58b-604438a10756</report_id>
        <tags>
          <value>peexe</value>
          <value>pedll</value>
          <value>unsafe</value>
          <value>evasive</value>
          <value>adaptive-context</value>
          <value>anti-debug</value>
          <value>crypto</value>
          <value>hacktool</value>
          <value>packed</value>
          <value>microsoft_visual_cc</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>792f3866b355d1ce27a0284d68488925a3e76c413e69f292c4e5b44554fb78d5</id>
    <title>Analysis Report for 792f3866b355d1ce27a0284d68488925a3e76c413e69f292c4e5b44554fb78d5</title>
    <updated>2026-04-13T03:42:59Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc665280678438b878ad86</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc66425ea31bc68a249f39</flow_id>
        <hash>792f3866b355d1ce27a0284d68488925a3e76c413e69f292c4e5b44554fb78d5</hash>
        <iocs>
          <urls>
            <value>
              <url>http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0</url>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0</url>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://crl3.digicert.com/DigiCertTrustedRootG4.crl0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://crl3.digicert.com/sha2-assured-cs-g1.crl05</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://crl4.digicert.com/sha2-assured-cs-g1.crl0L</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.digicert.com/CPS0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.dropbox.com/0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>cacerts.digicert.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>crl3.digicert.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>crl4.digicert.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>digicert.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>dropbox.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>162.125.248.18</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>23.11.41.157</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>45.60.131.229</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>23.11.41.157</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>45.60.131.229</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>162.125.248.18</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>46faeefe78baeccb7945200527de568d7e33e5d95b5b7fec962e62b0b3fbf452</SHA-256>
              <SHA-1>4a7d4733cb9b1e06fa4daeb3a8f5a2a478e9de07</SHA-1>
              <MD5>13960ce2d2057f4b592bc307d113a786</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>5aa0cb738239cd83dc55920af2de3d5bea0f1a4f485831ec6bd732678c233165</SHA-256>
              <SHA-1>890222cfbf6cc22ab70039a27700b18d582e5956</SHA-1>
              <MD5>590cea6b0c89195c6630a1b2564465d9</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/png</file_type>
            </value>
            <value>
              <SHA-256>67abdd721024f0ff4e0b3f4c2fc13bc5bad42d0b7851d456d88d203d15aaa450</SHA-256>
              <SHA-1>3c585604e87f855973731fea83e21fab9392d2fc</SHA-1>
              <MD5>4352d88a78aa39750bf70cd6f27bcaa5</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>7842e812acd83557ab208ad87e40dce3d091fc609e0431f6d7ffd55dab63c127</SHA-256>
              <SHA-1>8bc6aadcf10f089a6201a2236cff2f4018ece378</SHA-1>
              <MD5>ca907fe52d61792a06141172d374c116</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-lzma</file_type>
            </value>
            <value>
              <SHA-256>7cc331c8ad7cf9f16b5a88bbd1e3e3519f57126913bf9afd31e3ef907e876260</SHA-256>
              <SHA-1>b8a347ac7baa6f1ecffe59c2217628604d64b173</SHA-1>
              <MD5>fc0f84238f0dc91b366731d60e72ffb2</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>ae848ce62f00ba6a19b34cb874e653a88877453e714b1e8bd2f479a2411adcdb</SHA-256>
              <SHA-1>a9b743e5f9d8228b4229fa75df76ec2c66b1df4c</SHA-1>
              <MD5>d59cf8b7ff09ac70bb777a8b9c274f52</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>b2e2193928945cfbb081c9b7a75d2bfa61e597a616b6967a872fae6dd138d00a</SHA-256>
              <SHA-1>1a19a406b067db61fe7146365542a79c4951f392</SHA-1>
              <MD5>a953c9e69cc0f3bee8bc762d5edc971e</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>c0d2709e748eb3898be43587e12e849d912849496683866843220f7e61440d81</SHA-256>
              <SHA-1>4927a344f0a874ab8f78dc90b45480eeb673dfc0</SHA-1>
              <MD5>a791fcd5cee29443557eab34a30f3b0a</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>cabfc443e19465a54106f39ebe1900ff32e67775cab57bbbcb8b588e52e78a89</SHA-256>
              <SHA-1>f533ab8142bbab769687461df98a2042b72f5508</SHA-1>
              <MD5>1d2e2a00c3dfe12c8b1bf4e083c435fa</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>d59d8afef28abd12474c1339dcbe1e85afd23b95f1890725d102c303e3020d6d</SHA-256>
              <SHA-1>61b81245cd22dbc4c52564dadf79e8eac01fb6c7</SHA-1>
              <MD5>a8c87ef9e64db91619986281e52bac39</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>e3a7ce3a39d290690629c7134d24638408013a7b521d74e45a628ca7a1deb1aa</SHA-256>
              <SHA-1>16b3473f94bdaf052d1cc320786e4e9003d82bc5</SHA-1>
              <MD5>5869dbab6f71501550f354d4c0443b71</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>eeab6b6da54d137544f365cb5df3a8ca895470f5af96cac8ecf01b4d370d1abc</SHA-256>
              <SHA-1>a183eac712f776384491d0e2738205f19c269ebc</SHA-1>
              <MD5>05a20e0a10dd60655a3b89e3bc2d3119</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>f9a8265c1095ecc63efc5ebf464bbdfd7640a5fae08d20048e8bd12c0e4bc755</SHA-256>
              <SHA-1>b06cb27ea9621541daec4be5e4ba77e497f8c60e</SHA-1>
              <MD5>df7fd0a24095ab0826583a9c55245fb2</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
          </files>
          <uuids>
            <value>
              <uuid>1f676c76-80e1-4239-95bb-83d0f6d0da78</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>35138b9a-5d96-4fbd-8e2d-a2440225f93a</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>CC46080E-4C33-4981-859A-BBA2F780F31E</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>e2011457-1546-43c5-a5fe-008deee3d3f0</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
        </iocs>
        <name>792f3866b355d1ce27a0284d68488925a3e76c413e69f292c4e5b44554fb78d5.exe</name>
        <report_id>d6938843-8d54-4d50-a466-6c1599404753</report_id>
        <tags>
          <value>peexe</value>
          <value>expired-cert</value>
          <value>fingerprint</value>
          <value>microsoft_visual_cc</value>
          <value>signed</value>
          <value>anti-debug</value>
          <value>packed</value>
          <value>installer-heuristic</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>497bdb219db035ff1fadebd77f4a66afab2f778bad02e122dbfe2da1118d152e</id>
    <title>Analysis Report for 497bdb219db035ff1fadebd77f4a66afab2f778bad02e122dbfe2da1118d152e</title>
    <updated>2026-04-13T03:41:41Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc661580678438b878ad7a</_id>
        <file_type>text/html</file_type>
        <flow_id>69dc65f2799d5bf325fa6877</flow_id>
        <hash>497bdb219db035ff1fadebd77f4a66afab2f778bad02e122dbfe2da1118d152e</hash>
        <iocs>
          <urls>
            <value>
              <url>https://myhealthau-my.sharepoint.com/:f:/g/personal/pacificfair_myhealth_net_au/IgBNCvBIrwweTJUjCdG1BgsDAd4BxYg2OPjeM29KNfcmFJQ?e=5%3aZqQTvY&amp;at=9&amp;xsdata=MDV8MDJ8c2FjaGluLmFuYW5kMkBjb2duaXphbnQuY29tfDVmZDJmY2I0MDQ1NzQxNGFiNTdlMDhkZTk5MGQyYmYzfGRlMDhjNDA3MTliOTQyN2Q5ZmU4ZWRmMjU0MzAwY2E3fDB8MHw2MzkxMTY0NzkyMjU3ODAwMzF8VW5rbm93bnxUV0ZwYkdac2IzZDhleUpGYlhCMGVVMWhjR2tpT25SeWRXVXNJbFlpT2lJd0xqQXVNREF3TUNJc0lsQWlPaUpYYVc0ek1pSXNJa0ZPSWpvaVRXRnBiQ0lzSWxkVUlqb3lmUT09fDQwMDAwfHx8&amp;sdata=OE0zbjBKb3gwVVlMdE1iTitYbC9yc09PckNJLzJ0Yll2THJWZ0dMTGI5VT0%3d</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://go.microsoft.com/fwlink/?linkid=845480</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://myhealth.net.au/privacy-policy/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://myhealthau-my.sharepoint.com/:f:/g/personal/pacificfair_myhealth_net_au/IgBNCvBIrwweTJUjCdG1BgsDAd4BxYg2OPjeM29KNfcmFJQ?e=5%3aZqQTvY&amp;at=9&amp;xsdata=MDV8MDJ8c2FjaGluLmFuYW5kMkBjb2duaXphbnQuY29tfDVmZDJmY2I0MDQ1NzQxNGFiNTdlMDhkZTk5MGQyYmYzfGRlMDhjNDA3MTliOTQyN2Q5ZmU4ZWRmMjU0MzAwY2E3fDB8MHw2MzkxMTY0NzkyMjU3ODAwMzF8VW5rbm93bnxUV0ZwYkdac2IzZDhleUpGYlhCMGVVMWhjR2tpT25SeWRXVXNJbFlpT2lJd0xqQXVNREF3TUNJc0lsQWlPaUpYYVc0ek1pSXNJa0ZPSWpvaVRXRnBiQ0lzSWxkVUlqb3lmUT09fDQwMDAwfHx8&amp;sdata=OE0zbjBKb3gwVVlMdE1iTitYbC9yc09PckNJLzJ0Yll2THJWZ0dMTGI5VT0%3d</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://myhealthau-my.sharepoint.com/ScriptResource.axd?d=4ID3KGzEMU0m3YsPbcBAqvCo2eWWWlh552TPIidpmEAD7ZOp_mrDxXN1JxLilEa-B4xlmTplCzLPN7a-J1h84o_T2H_3JrkGqpub7wD5srClVc-V2mFdUad7vfNb5-vWAvfMBS243BqZI4BSyXGHYzYscw7VvY3xtPIvFKeaODE1&amp;t=ffffffff93d1c106</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://myhealthau-my.sharepoint.com/ScriptResource.axd?d=WBJ__a8u206uOfZjL-1pISn7UBb3LqXi86-k_epqoWZPQGx3vaTAqi3M7PBeSPJdQZzHceawQIIhhfscHisI5TDlg3AcEtD80CyiMWkA2lAWCiHeFkquDCinkTrHEhilzGtJdzE3MBcoR_Nx_SLDwQlkSZfM-MkHZ0nGD60I2oHBdtcIpPHVqsmsoy1ZJSy60&amp;t=5c0e0825</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://myhealthau-my.sharepoint.com/ScriptResource.axd?d=X-AzSark1dqFR4Xr6_KAkHwk6M1WLF6tmFSql7j0mefK7ayztMdQ1xB4s2jaK7FZr22fK3AwleLEVUD9Mf-a-BRQba2jnaynYu8ScuvzYthMxTfbjQ0VEvZeHaacYdbsCndqqt0AceQnGewTYHT-QvSEB6Rj3QEF1sGL8kAwh9jsYItNv2TSQcLrTeKzHw4u0&amp;t=5c0e0825</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://myhealthau-my.sharepoint.com/WebResource.axd?d=E84x3jco7lvH2FyoHMM2ZU_X0dyKB8Eb-Of_oxPeDiI3gYp-qZKPfHtnXBlExLx-exbwxkDrIyE5k6hb4iNgyVIOcxa5hr-KYBdtoU4yMto1&amp;t=639081453183982065</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://myhealthau-my.sharepoint.com/_layouts/15/images/favicon.ico?rev=50</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://myhealthau-my.sharepoint.com/_layouts/15/images/microsoft-logo.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://res-1.cdn.office.net/bld/_layouts/15/16.0.27125.12007/require.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://res-1.cdn.office.net/files/odsp-web-prod_2026-03-27.006/@uifabric/file-type-icons/lib/initializeFileTypeIcons.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://res-1.cdn.office.net/files/odsp-web-prod_2026-03-27.006/spoguestaccesswebpack/spoguestaccess.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://requirejs.org/docs/errors.html#</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.w3.org/1999/xhtml</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://go.microsoft.com/fwlink/?linkid=845480</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://myhealth.net.au/privacy-policy/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://myhealthau-my.sharepoint.com/personal/pacificfair_myhealth_net_au/_layouts/15/images/folder.png</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://res-1.cdn.office.net</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://res-1.cdn.office.net/bld/_layouts/15/16.0.27125.12007/require.js</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://res-1.cdn.office.net/files/odsp-web-prod_2026-03-27.006/</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://res-1.cdn.office.net/files/odsp-web-prod_2026-03-27.006/https://res-2.cdn.office.net/files/odsp-web-prod_2026-03-27.006/https://res-3.cdn.office.net/files/odsp-web-prod_2026-03-27.006/</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://res-1.cdn.office.net/files/odsp-web-prod_2026-03-27.006/spoguestaccesswebpack/spoguestaccess.js</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://res-1.cdn.office.net/files/sp-client/odsp-media-8946b970</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://res-1.cdn.office.net/files/sp-client/odsp-media-8946b970.js</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://res-2.cdn.office.net/files/odsp-web-prod_2026-03-27.006/</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://res-3.cdn.office.net/files/odsp-web-prod_2026-03-27.006/</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>go.microsoft.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>myhealth.net.au</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>myhealthau-my.sharepoint.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>res-1.cdn.office.net</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>res-1.cdn.office.net</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </domains>
          <emails>
            <value>
              <email>user@contoso.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>23.48.23.43</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>13.107.138.10</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>23.48.23.45</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>23.48.23.43</ip>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>321b51b8478ae4253cb587245f2b43736b16cdb884690c302e9e0a7d5534d7be</SHA-256>
              <SHA-1>a8d0c46c954944f86e839233bfbb31703e773b39</SHA-1>
              <MD5>565c44c7a82177f72445f73402c1376b</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>text/plain</file_type>
            </value>
            <value>
              <SHA-256>e9382e48a51759ba6898feb2b672f492f9c68208603c1a0ed81252913bcbd46c</SHA-256>
              <SHA-1>9dd1722ff106f0b77ddc4c9698f35e33826ca893</SHA-1>
              <MD5>8070a9d232ee9e453f4fcfffb26d444e</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>application/xhtml+xml</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <SHA-256>2ab16625f2dc41ccd0842190bd34a58758a29783d45c22c218b5cda636a55a00</SHA-256>
              <SHA-1>333126a06f61b9abae5d8cd59be1a6dc312b41d5</SHA-1>
              <MD5>60c68b86c281c8642b7d435cc316ba1e</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>a0619b9e0f2f145abf84749387b09bf0f07fa988fe2bda06ffcb5526d9ebb8c1</SHA-256>
              <SHA-1>01edae1fe6ff66193fcfc021afab3b25c725354f</SHA-1>
              <MD5>28edb032d40c9d96c8adc64538b97ab6</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>image/png</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <SHA-256>93df00ab3a62dab2a9fbb298e72c08587f6cc966004e6fa5592077830b1bc421</SHA-256>
              <SHA-1>14f115ff5ff1b97a0970c2e22947471d0c495629</SHA-1>
              <MD5>7dfd66de6dd736f029901476f5cfa602</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <SHA-256>196eedea1974e73e0d8c767a4a27a7e7a9eaf0743bb0e8e60d44e7aa0a74988e</SHA-256>
              <SHA-1>d7522de91c1b520388633b668d4d9faf829de377</SHA-1>
              <MD5>1f10003cb5d8ff38d8c26f09f29d2e2e</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/javascript</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
          </files>
          <uuids>
            <value>
              <uuid>1266442b-f75d-4066-beea-b38aa6cb2400</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
        </iocs>
        <name>hxxps://myhealthau-my.sharepoint.com/:f:/g/personal/pacificfair_myhealth_net_au/IgBNCvBIrwweTJUjCdG1BgsDAd4BxYg2OPjeM29KNfcmFJQ?e=5%3aZqQTvY&amp;at=9&amp;xsdata=MDV8MDJ8c2FjaGluLmFuYW5kMkBjb2duaXphbnQuY29tfDVmZDJmY2I0MDQ1NzQxNGFiNTdlMDhkZTk5MGQyYmYzfGRlMDhjNDA3MTliOTQyN2Q5ZmU4ZWRmMjU0MzAwY2E3fDB8MHw2MzkxMTY0NzkyMjU3ODAwMzF8VW5rbm93bnxUV0ZwYkdac2IzZDhleUpGYlhCMGVVMWhjR2tpT25SeWRXVXNJbFlpT2lJd0xqQXVNREF3TUNJc0lsQWlPaUpYYVc0ek1pSXNJa0ZPSWpvaVRXRnBiQ0lzSWxkVUlqb3lmUT09fDQwMDAwfHx8&amp;sdata=OE0zbjBKb3gwVVlMdE1iTitYbC9yc09PckNJLzJ0Yll2THJWZ0dMTGI5VT0%3d</name>
        <report_id>ae455ed4-27bc-43b8-8c7d-c57c09d033b2</report_id>
        <tags>
          <value>html</value>
          <value>png</value>
          <value>xml</value>
          <value>javascript</value>
          <value>aidetect</value>
          <value>phishing</value>
          <value>base64</value>
          <value>obfuscated</value>
          <value>soft-404</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>d386b66ca80db042e58e030084565bf37965c30a8733682ba536e5eb64406bc1</id>
    <title>Analysis Report for d386b66ca80db042e58e030084565bf37965c30a8733682ba536e5eb64406bc1</title>
    <updated>2026-04-13T03:41:10Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc65f4f9522792fdaf80b3</_id>
        <file_type>application/java-archive</file_type>
        <flow_id>69dc65c8799d5bf325fa682e</flow_id>
        <hash>d386b66ca80db042e58e030084565bf37965c30a8733682ba536e5eb64406bc1</hash>
        <iocs>
          <uuids>
            <value>
              <uuid>6d9210cb-097a-4a84-91b3-2c2d55749464</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
          </uuids>
        </iocs>
        <name>xray_working_on_donut-1.21.11.jar</name>
        <report_id>cc8c1b02-f54b-4b52-b887-c0e211c6ec65</report_id>
        <tags>
          <value>java</value>
          <value>anti-debug</value>
          <value>obfuscated</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>3bfab35b547d863f1eb2eea348c4a68cfab1470aed887e098be0070a2863e2dd</id>
    <title>Analysis Report for 3bfab35b547d863f1eb2eea348c4a68cfab1470aed887e098be0070a2863e2dd</title>
    <updated>2026-04-13T03:40:44Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc65c980678438b878ad6c</_id>
        <file_type>application/x-dosexec</file_type>
        <flow_id>69dc65ba799d5bf325fa6811</flow_id>
        <hash>3bfab35b547d863f1eb2eea348c4a68cfab1470aed887e098be0070a2863e2dd</hash>
        <iocs>
          <urls>
            <value>
              <url>http://gnu.org/licenses/gpl.html</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>gnu.org</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>bug-gnu-gettext@gnu.org</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>209.51.188.116</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>209.51.188.116</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>4053d958fc3124ebd71c431931ed7edc0fa6b047e974b24a9284a79bafc327e8</SHA-256>
              <SHA-1>22ed1891cee0973003d63b2702041b279437aad1</SHA-1>
              <MD5>b1286d4e383b896189a2d4e6c821e0f4</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>88f086996bb9d97e4d3f277cd6b9c162cf9feb65c3cbf5e54f58690b6f0899a5</SHA-256>
              <SHA-1>bec04a243f6678ef49db8d0efe517d90ebefebd2</SHA-1>
              <MD5>e209df3b9943278e7eafc591a12c872c</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>e35006d2d276e4a85515293649301b67df45da7b9759f138c979689b177c98a1</SHA-256>
              <SHA-1>902ca917277ca402337383612304402fbcbdf8b2</SHA-1>
              <MD5>c5ee715fab681b0bb62d733c7ed3ab01</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>fc695c1c27d474c57d304e0eb9ad37ee88b787d88a36a6b0c30d7406fa1ee858</SHA-256>
              <SHA-1>e0790f69a9183b860a3ee8ae131c18cb70dc6670</SHA-1>
              <MD5>56c7491de53bf2e9b3580cde3ea18637</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>73cd8ecdcf33b5923f3c092fba6d8f8c3faecf64d84a9ecfa6c5e028f980211a</SHA-256>
              <SHA-1>439e2425de7e58ba01c7db5fc3f9fbd68e28402e</SHA-1>
              <MD5>2007f06eccf5b2c7f80e51e124fe1419</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>application/xhtml+xml</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
        </iocs>
        <name>2026-04-05_4d170ffec55596e83ff9c579463e6362_elex_wannacry.exe</name>
        <report_id>9dfb4f2c-c347-4bd0-acc7-6ed9c6cb5b83</report_id>
        <tags>
          <value>peexe</value>
          <value>html</value>
          <value>xml</value>
          <value>unsafe</value>
          <value>masquerade</value>
          <value>obfuscated</value>
          <value>adaptive-context</value>
          <value>anti-debug</value>
          <value>microsoft_visual_cc</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>d41ddef74e0940748d1fc132d8d9058b6d0e2e04b0731c610d204765e13a0082</id>
    <title>Analysis Report for d41ddef74e0940748d1fc132d8d9058b6d0e2e04b0731c610d204765e13a0082</title>
    <updated>2026-04-13T03:39:27Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc657580678438b878ad58</_id>
        <file_type>application/json</file_type>
        <flow_id>69dc656c799d5bf325fa6771</flow_id>
        <hash>d41ddef74e0940748d1fc132d8d9058b6d0e2e04b0731c610d204765e13a0082</hash>
        <iocs/>
        <name>manifest.json</name>
        <report_id>e40afcab-a785-46d5-85ee-9691e0fddf8d</report_id>
        <tags>
          <value>json</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>563d21378399e1a13fb1f8dfdf33dffa86fe96aff5ce1276be2d4df3e2a4c5ce</id>
    <title>Analysis Report for 563d21378399e1a13fb1f8dfdf33dffa86fe96aff5ce1276be2d4df3e2a4c5ce</title>
    <updated>2026-04-13T03:39:27Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc657d80678438b878ad5c</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc656c799d5bf325fa6771</flow_id>
        <hash>563d21378399e1a13fb1f8dfdf33dffa86fe96aff5ce1276be2d4df3e2a4c5ce</hash>
        <iocs>
          <urls>
            <value>
              <url>https://android.googlesource.com/toolchain/llvm-project</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>android.googlesource.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>appro@openssl.org</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>info@e-szigno.hu0</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>142.251.127.82</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>142.251.127.82</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>18a78983d822afff6b477f5ac7ec160f56e9a30c8c030b2a6d9f6b88c5edcfd6</SHA-256>
              <SHA-1>1f591dab01e443bf5b0d9c09d495c89138bd3dc4</SHA-1>
              <MD5>149638790aaa1dff4e999152a072c184</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
          </files>
          <btc_wallets>
            <value>
              <btc_wallet>z3x3v3t3r3p3o3m3k3i3g3e3c3b</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
          </btc_wallets>
        </iocs>
        <name>config.arm64_v8a.apk</name>
        <report_id>7030d00f-535d-4d2b-a861-7c5b240c816a</report_id>
        <tags>
          <value>apk</value>
          <value>html</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
          <value>fingerprint</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>39b7f1a2e5f775ebb2da99aa8ae3beabea8311afed38e1a073072288ef115da0</id>
    <title>Analysis Report for 39b7f1a2e5f775ebb2da99aa8ae3beabea8311afed38e1a073072288ef115da0</title>
    <updated>2026-04-13T03:39:27Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc659180678438b878ad60</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc656c799d5bf325fa6771</flow_id>
        <hash>39b7f1a2e5f775ebb2da99aa8ae3beabea8311afed38e1a073072288ef115da0</hash>
        <iocs>
          <urls>
            <value>
              <url>https://issuetracker.google.com/issues/new?component=907884&amp;template=1466542</url>
              <origin>APK_DECODING</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>issuetracker.google.com</url>
              <origin>APK_DECODING</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>jfang593@gmail.com</email>
              <origin>APK_DECODING</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>142.251.13.101</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>142.251.13.101</ip>
              <origin>APK_DECODING</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>2306606e22d52dfe52b5a938b1165880b802c1ec467b814620e9e4368e4ae84a</SHA-256>
              <SHA-1>2b63e2ae0b411de12ad7c77559f19889e5951a01</SHA-1>
              <MD5>026edc78c793477151d20cf6bac1523e</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
        </iocs>
        <name>com.considers.mateo.cleanup.apk</name>
        <report_id>36436036-0fdd-464a-9b15-4d4a49b62b39</report_id>
        <tags>
          <value>apk</value>
          <value>html</value>
          <value>obfuscated</value>
          <value>expand</value>
          <value>lolbin</value>
          <value>anti-debug</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>fingerprint</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>c85d9d1a2e9675a375c71cb653a03af7370459fae1280124365be11cade2a886</id>
    <title>Analysis Report for c85d9d1a2e9675a375c71cb653a03af7370459fae1280124365be11cade2a886</title>
    <updated>2026-04-13T03:38:25Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc654d80678438b878ad51</_id>
        <file_type>application/x-dosexec</file_type>
        <flow_id>69dc652e5ea31bc68a249c8e</flow_id>
        <hash>c85d9d1a2e9675a375c71cb653a03af7370459fae1280124365be11cade2a886</hash>
        <iocs>
          <files>
            <value>
              <SHA-256>3083c4690072a85fcfe4b10920595d0b929cce47d7b0edcdbfdaca1a1604f555</SHA-256>
              <SHA-1>637c8db2b28336bbf779a67ad3b199971affa296</SHA-1>
              <MD5>0a0fe62c408101834337eed5411cc38a</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>text/plain</file_type>
            </value>
            <value>
              <SHA-256>4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df</SHA-256>
              <SHA-1>4260284ce14278c397aaf6f389c1609b0ab0ce51</SHA-1>
              <MD5>1e4a89b11eae0fcf8bb5fdd5ec3b6f61</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>dda282734827e2d1eb983c9cdc3eba3f4d27bc0b9e073cffedabbfb2a8679d6c</SHA-256>
              <SHA-1>d7a988f6600c42802fe0cbad3eb701c9d625eb0b</SHA-1>
              <MD5>e21be70a2eeefbac1d3bb03c5a47b9ce</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
          </files>
        </iocs>
        <name>SecuriteInfo.com.Variant.Midie.178032.56591614.exe</name>
        <report_id>929205b4-8d02-4d79-a032-3c34b2baafff</report_id>
        <tags>
          <value>peexe</value>
          <value>pedll</value>
          <value>overlay</value>
          <value>adaptive-context</value>
          <value>anti-debug</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>86dad7afa56c940715e0accf67dbe19f68ca633f98f98f7f8eac21ac34b9e61c</id>
    <title>Analysis Report for 86dad7afa56c940715e0accf67dbe19f68ca633f98f98f7f8eac21ac34b9e61c</title>
    <updated>2026-04-13T03:37:48Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc654480678438b878ad4e</_id>
        <file_type>text/html</file_type>
        <flow_id>69dc650c799d5bf325fa66e7</flow_id>
        <hash>86dad7afa56c940715e0accf67dbe19f68ca633f98f98f7f8eac21ac34b9e61c</hash>
        <iocs>
          <urls>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineservices</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://fonts.googleapis.com/css2?family=Public+Sans:ital,wght@0,100..900;1,100..900&amp;display=swap</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineregistry.lawlink.nsw.gov.au/sso/login</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineregistry.lawlink.nsw.gov.au/sso/login?fromURI=https%3A%2F%2Fportal.dcj.nsw.gov.au%2Fapp%2Fdcj-portal_ncatonlineservices_1%2Fexkfu71l1w7AikfQN4x7%2Fsso%2Fsaml%3FSAMLRequest%3DjZJLc4IwFIX%252fCpO9eQBCmlFnGN04Y7UttotumAixopBQblB%252fflO0U910uryP79xzMhmBrCu%252fEUlnd%252fpFfXYKrHeuKw3iMhmjrtXCSChBaFkrEDYXafK4ED6mommNNbmp0C3zNyIBVGtLo5E3n41RWWQ2zoJNyIeMh%252fRB0ZBvJI9YyFkUMZ9TVsgh8t5UCw4aI6fhSIBOzTVYqa1rUT8a0HDAgjUNRMAF8zHz%252fYgz%252bo68mYtUaml7emdtA4KQxrRWVrjI91jDCX%252bYI5YdkU1DXGtwmWY6l9boqtTKWT6WuYKMEXU%252bbLuYVewUJ%252bVh%252b7wMzzEBMOQ7O%252fKSn3hTo6GrVZte0NeXxe%252f1e1G875zDXN06mRdP03U6I2m6whKaM5qM%252brcVffJ28n%252bl5TRZr%252fqtqxMYkTupa3n%252fByZf%26OriginalUrl%3Dhttps%3A%2F%2Fonlineservices.justice.nsw.gov.au%2FNCATOnlineServices%2F</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/ECT_Provider/WS_ECT.asmx</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/IdPLogout</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/IdPLogout?OriginalURL=https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/css/IdPCTSDReactPlug.IdPReact.css?vxSqS0U+lbWibC6GYz0lYQ</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/css/IdPCTSDReactPlug.IdPReact.extra.css?EHsyMbbWnNNszQnt0gsdpw</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/css/OutSystemsReactWidgets.css?yU+kUMKGuLFe0VKTCD+zFA</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/css/OutSystemsUI.OutSystemsUI.css?lBktUylWqG5uMGqyIvgNnw</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/css/_Basic.css?EqGzAe81QbZLXJyfY3oLwA</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/moduleservices/moduleinfo?AFaomyafnVYoi4WMSx1EbA</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/moduleservices/moduleversioninfo?1776051485230</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/screenservices/IdPCTSDReactPlug/MainFlow/IdPLogout/ActionIdP_Logout</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/scripts/IdPCTSDReactPlug.Common.controller.js?nrZIe4KmiTzQIvo0kJxHYQ</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/scripts/IdPCTSDReactPlug.CustomWidgets.LoadingSpinner.mvc.js?XPSKKN26QvaBFpc3MiDHGA</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/scripts/IdPCTSDReactPlug.Layouts.LayoutBlank.mvc.js?SdjVWGN3tyyuBhmimKmOoQ</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/scripts/IdPCTSDReactPlug.MainFlow.IdPLogout.mvc.js?AO98HJWqJuzUDAh7t06a6Q</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/scripts/IdPCTSDReactPlug.MainFlow.controller.js?5nCb3euDSMmaxwJRSMLRPQ</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/scripts/IdPCTSDReactPlug.appDefinition.js?+qtWWn9LUgkBRxVlxo14sA</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/scripts/IdPCTSDReactPlug.clientVariables.js?AtOdOazQprvI3fSMoutGAg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/scripts/IdPCTSDReactPlug.controller.js?sSnEPEa2V8DXyfCEzEmR5A</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/scripts/IdPCTSDReactPlug.index.js?4q7JCxQrWIpDu07klxxXyQ</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/scripts/IdPCTSDReactPlug.languageResources.js?q3Yx9BaksA0zZWe4AAEkEQ</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/scripts/IdPCTSDReactPlug.model.js?o4dmt6g+kr3La09+ewoZxg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/scripts/IdPCTSDReactPlug.referencesHealth.js?Uxvph6QNlwDHvXaDUz9VtA</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/scripts/NullDebugger.js?mxOmCTXRCo4sbvT90NqUEA</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/scripts/OutSystems.js?9tn_a6LCHcoOBstQVRQEbw</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/scripts/OutSystemsManifestLoader.js?3F3fZzzNKkqKoP2DsjtxFw</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/scripts/OutSystemsReactView.js?NjTm57aNzREdmSRaNSZiKg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/scripts/OutSystemsReactWidgets.js?JJ3HMAa6vv2p99ezZWdwzQ</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/scripts/OutSystemsSettings.js?iUOzw8XNgU60rUJB2mumLg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/scripts/OutSystemsUI.Content.Card.mvc.js?MNeuPbk1Su_1pk5BprI9Jg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/scripts/OutSystemsUI.MWO.js?fZcFt60k3mJDWeENwt0Gbg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/scripts/OutSystemsUI.OutSystemsUI.js?2ewvn7wHAXa7IsFb8GCT4Q</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/scripts/OutSystemsUI.controller.js?a1R64eyu5fH3R8cFER9v3A</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/scripts/OutSystemsUI.languageResources.js?UikDUgQksiMsRqluePH2Zw</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/IdPCTSDReactPlug/scripts/OutSystemsUI.model.js?aePx53zNKG4xWrDD+bbsHg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/css/_Basic.css?EqGzAe81QbZLXJyfY3oLwA</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/moduleservices/log?clientTimeInMillis=1776051491689</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/moduleservices/moduleversioninfo?1776051490936</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/moduleservices/moduleversioninfo?1776051492981</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/screenservices/IdPCTSDReactPlug/ActionIdP_SSO_URL</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/screenservices/NCATOnlineServices/ActionGetURL</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/screenservices/NCATOnlineServices/ActionGetUserDetails</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/IdPCTSDReactPlug.clientVariables.js?AtOdOazQprvI3fSMoutGAg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/IdPCTSDReactPlug.controller.js?sSnEPEa2V8DXyfCEzEmR5A</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/IdPCTSDReactPlug.model.js?o4dmt6g+kr3La09+ewoZxg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATCommonsServices.model.js?Yt7ZB69BluxLZ4GXeHWa0Q</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATCommonsUI.Links.TopBar.mvc.js?KqOzZ3lvmHlgChruBg_5vg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATCommonsUI.Progress.LoadingOverlay.mvc.js?QCFbrldAk+GHx_uJtHMllw</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATCommonsUI.clientVariables.js?BI4u9_YSbqrbUAzKFEOYUw</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATCommonsUI.controller.js?c0TPalPKaRDkdRVYG9Xe0w</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATCommonsUI.model.js?YBsU26_fPYVqz72SdFYHdQ</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATCommonsUI.referencesHealth.js?9rWzEQ8g2h7FtpPCm4EPzg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineServices.MainFlow.Home.mvc.js?BMl3XwFDfahNdr7vRO0GUw</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineServices.MainFlow.controller.js?AtWrMxDQ_PJUIzT7K0LMXQ</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineServices.Shared.Delegators.mvc.js?OpYccfvN8lmqWKKQUSVMVg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineServices.Shared.Menu.mvc.js?JRV6TN8zqUpLPzmwIvCaUg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineServices.Shared.SelectDelegatorHome.mvc.js?5GDhZWrGe_SZfPQgU7L8SA</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineServices.Shared.Tiles.mvc.js?+rq75zkYy+t54h1nIrBNUg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineServices.Shared.UserInfo.mvc.js?CS3IJ1k6nnTDWSyHTMJ_DA</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineServices.Shared.UserMenu.mvc.js?sPKMq62YM8pUvMRGGuB8Hg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineServices.Shared.controller.js?bMLthg4LfpSTwDL0AIbmJg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineServices.appDefinition.js?TpSrmybu8Bas4lVJVWrOTg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineServices.clientVariables.js?K_gOfGmbSpFzEnhpoVgORA</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineServices.controller.js?wnAJyRbeKdUPLLajc3h4ig</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineServices.index.js?FB4MtmSpUYCBfsL7mxJhsA</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineServices.languageResources.js?nllYYMEmr+nUUR40DCEPVQ</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineServices.model.js?q+3lIoR5K0Idx6qbyS8yrg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineServices.referencesHealth.js?FGsXbP9NUwSK2OnwF9nEzQ</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineServices_BL.model.js?O0B7qilCuk4vDoa4QsqyYg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineTheme.Common.ApplicationTitle.mvc.js?m5REZvw8_bFLhzw7ZD5CpQ</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineTheme.Common.ConfirmationPopup.mvc.js?uIb94H5f3UPoc+K11gNqkA</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineTheme.Common.FooterNavigation.mvc.js?SJYK0DLfEYCXqRcWDCNqcA</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineTheme.Common.Logo.mvc.js?7hADsDZsHXLCIRRg70KY3Q</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineTheme.Common.MenuIcon.mvc.js?PNWWUmWf6VynhfbGG5ZzfA</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineTheme.Layouts.LayoutTopMenu.mvc.js?jcjWiOpXTeo+oPIJenMR4A</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineTheme.Renderer.MarkupRenderer.mvc.js?sJny1Pr1_Eyf_EKKmzbS3A</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineTheme.model.js?t5qC_Oh97pHzLe5ydLy7Ww</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NCATOnlineTheme.referencesHealth.js?UaFF_xXIyxtkrav8bdevJA</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/NullDebugger.js?mxOmCTXRCo4sbvT90NqUEA</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/OutSystems.js?9tn_a6LCHcoOBstQVRQEbw</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/OutSystemsManifestLoader.js?3F3fZzzNKkqKoP2DsjtxFw</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/OutSystemsReactView.js?NjTm57aNzREdmSRaNSZiKg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/OutSystemsReactWidgets.js?JJ3HMAa6vv2p99ezZWdwzQ</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/OutSystemsSettings.js?iUOzw8XNgU60rUJB2mumLg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/OutSystemsUI.Adaptive.Columns2.mvc.js?b7BftBWJpE7JKYRwGCVvGQ</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/OutSystemsUI.Adaptive.Columns3.mvc.js?+WCiekv2oKLZCpC7eWg+mg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/OutSystemsUI.Adaptive.DisplayOnDevice.mvc.js?k8gHbv7IjAuirIMIsIHgUQ</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/OutSystemsUI.Content.Accordion.mvc.js?rH0KHHoI3TIke7r9+8OYLw</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/OutSystemsUI.Content.AccordionItem.mvc.js?sGXyxscFWZtHKhURo2yVkg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/OutSystemsUI.Content.CardSectioned.mvc.js?iiNG6Z5bCnCEvzD3mUNEMQ</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/OutSystemsUI.Interaction.DropdownSearch.mvc.js?gg2mi5hWrXmw2+Rt7za_jg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/OutSystemsUI.Navigation.Submenu.mvc.js?bX_fIgUpGqyK0vm8mDXInQ</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/OutSystemsUI.Utilities.Separator.mvc.js?SQg59ra5xKg2oLaEIkHTug</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/OutSystemsUI.controller.js?a1R64eyu5fH3R8cFER9v3A</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/scripts/OutSystemsUI.model.js?aePx53zNKG4xWrDD+bbsHg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineservices/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineservices/css/_Basic.css?EqGzAe81QbZLXJyfY3oLwA</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineservices/moduleservices/log?clientTimeInMillis=1776051484352</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineservices/moduleservices/moduleinfo?mxsCet9D03wg9jHV1dV3Jw</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineservices/moduleservices/moduleversioninfo?1776051480504</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineservices/screenservices/NCATOnlineServices/ActionGetURL</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineservices/screenservices/NCATOnlineServices/ActionGetUserDetails</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineservices/scripts/NCATOnlineServices.appDefinition.js?TpSrmybu8Bas4lVJVWrOTg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineservices/scripts/NCATOnlineServices.index.js?FB4MtmSpUYCBfsL7mxJhsA</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineservices/scripts/NullDebugger.js?mxOmCTXRCo4sbvT90NqUEA</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineservices/scripts/OutSystems.js?9tn_a6LCHcoOBstQVRQEbw</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineservices/scripts/OutSystemsManifestLoader.js?3F3fZzzNKkqKoP2DsjtxFw</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineservices/scripts/OutSystemsReactView.js?NjTm57aNzREdmSRaNSZiKg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineservices/scripts/OutSystemsReactWidgets.js?JJ3HMAa6vv2p99ezZWdwzQ</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/NCATOnlineservices/scripts/OutSystemsSettings.js?iUOzw8XNgU60rUJB2mumLg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://onlineservices.justice.nsw.gov.au/favicon.ico</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://portal.dcj.nsw.gov.au/app/dcj-portal_ncatonlineservices_1/exkfu71l1w7AikfQN4x7/sso/saml?SAMLRequest=jZJLc4IwFIX%2fCpO9eQBCmlFnGN04Y7UttotumAixopBQblB%2fflO0U910uryP79xzMhmBrCu%2fEUlnd%2fpFfXYKrHeuKw3iMhmjrtXCSChBaFkrEDYXafK4ED6mommNNbmp0C3zNyIBVGtLo5E3n41RWWQ2zoJNyIeMh%2fRB0ZBvJI9YyFkUMZ9TVsgh8t5UCw4aI6fhSIBOzTVYqa1rUT8a0HDAgjUNRMAF8zHz%2fYgz%2bo68mYtUaml7emdtA4KQxrRWVrjI91jDCX%2bYI5YdkU1DXGtwmWY6l9boqtTKWT6WuYKMEXU%2bbLuYVewUJ%2bVh%2b7wMzzEBMOQ7O%2fKSn3hTo6GrVZte0NeXxe%2f1e1G875zDXN06mRdP03U6I2m6whKaM5qM%2brcVffJ28n%2bl5TRZr%2fqtqxMYkTupa3n%2fByZf&amp;OriginalUrl=https://onlineservices.justice.nsw.gov.au/NCATOnlineServices/</url>
              <origin>URL_RENDER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>fonts.googleapis.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>onlineregistry.lawlink.nsw.gov.au</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>onlineservices.justice.nsw.gov.au</url>
              <origin>URL_RENDER</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>104.18.34.50</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>142.251.13.95</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>52.63.19.215</ip>
              <origin>URL_RENDER</origin>
            </value>
          </ips>
        </iocs>
        <name>hxxps://onlineservices.justice.nsw.gov.au/NCATOnlineservices</name>
        <report_id>c0a49647-798c-4172-8165-a4559a2a0461</report_id>
        <tags>
          <value>html</value>
          <value>soft-404</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>4e46b54bff19ffd17556813e78f5f3bcca721999b9d8920f08477dd70f4feaa4</id>
    <title>Analysis Report for 4e46b54bff19ffd17556813e78f5f3bcca721999b9d8920f08477dd70f4feaa4</title>
    <updated>2026-04-13T03:36:45Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc64d680678438b878ad3a</_id>
        <file_type>image/svg+xml</file_type>
        <flow_id>69dc64cc799d5bf325fa667c</flow_id>
        <hash>4e46b54bff19ffd17556813e78f5f3bcca721999b9d8920f08477dd70f4feaa4</hash>
        <iocs>
          <urls>
            <value>
              <url>https://hklevelimmenslyblessings.reliableplatforms.de/RbaGl/#noreply@altisource.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>hklevelimmenslyblessings.reliableplatforms.de</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>noreply@altisource.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>ae8079f6d5819067b523a0539f9a513c58d0fe5fa7068fadab2000d48cfacc5d</SHA-256>
              <SHA-1>ae2288f48c15266dd9631212dde77b9cf0d3ca6a</SHA-1>
              <MD5>564c96a88c54ac4eabe74cca90bb4fb5</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
        </iocs>
        <name>Noreply-EFT.svg</name>
        <report_id>672c4636-0998-48ea-b7fc-afad4dedc97e</report_id>
        <tags>
          <value>svg</value>
          <value>html</value>
          <value>soft-404</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>df84bc26c813e0f066aa45b9c13af1ef490045cc8a914339505846139f15bf3b</id>
    <title>Analysis Report for df84bc26c813e0f066aa45b9c13af1ef490045cc8a914339505846139f15bf3b</title>
    <updated>2026-04-13T03:35:50Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc64cd80678438b878ad36</_id>
        <file_type>application/x-dosexec</file_type>
        <flow_id>69dc6492799d5bf325fa6612</flow_id>
        <hash>df84bc26c813e0f066aa45b9c13af1ef490045cc8a914339505846139f15bf3b</hash>
        <iocs>
          <files>
            <value>
              <SHA-256>0eb309af6e5a89f21868768d930c7acd804d170b975e14ba35f51ccb6c15dbd2</SHA-256>
              <SHA-1>37a83840b97b5d3ccce56a0b8bbd538f8d7548a5</SHA-1>
              <MD5>c23924137e43a83ddd6858b4de2a913a</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>1a956aa5027def4562b27f0c1a7bf6ec65cd2f7a1111ad8022c31a6935d48ff3</SHA-256>
              <SHA-1>9bdaf69640ca84fb378cee600eab851cf183027b</SHA-1>
              <MD5>f4d03cfc7db654f840150b913b664d8d</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>1efb6bc8314c6666cbd0629812b6549ffd4de1b0113c11e4b69f0308aa35f642</SHA-256>
              <SHA-1>9468e2f059970b25dde73c756f081c0e1bf44615</SHA-1>
              <MD5>89afa0d376da65d0fd1e26cbdfd2f3de</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>1f5ec320ab3907d69afb054869143053698bd4954710d8fa65924e676d9ba53c</SHA-256>
              <SHA-1>a40c5a5e863c0c762545770bf043ed7085b1ebe3</SHA-1>
              <MD5>8a2e63f6437e53695a9cedbf517cc003</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>20e45e1c56235aadf19ca08194f1831f8d35fd3373c82c1ce9c6012320375989</SHA-256>
              <SHA-1>39cf1bccb41c036d443506737715977792259711</SHA-1>
              <MD5>ae19cfc3f0ef1a155cd6ea0411bbb10a</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>26be3616ef35820e8991b5f898ebe206a5bb93c7662cc0ffa6a819b7aed2f16d</SHA-256>
              <SHA-1>03c23a27f9dba56e072563553af207aaaec59794</SHA-1>
              <MD5>74e40157d5047614f7acea41bf547d5c</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>26d65d989d696855b0dd93ce980812f5d3787538c16279e8b980f30b9808556c</SHA-256>
              <SHA-1>f6bfa7e4e222cc7c3db6c4792c21db9b332d86df</SHA-1>
              <MD5>c12088e83b0029e19e259b6eb31f39d6</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>35355a423719736f0c8a6f4395003bbd77b66f847d6345dd29171a880d95cc00</SHA-256>
              <SHA-1>85346985c94cf625bf5856d2f981db6a1f1aa5cc</SHA-1>
              <MD5>ad2e2c9fb800d87fa5b17b20dd50eb7c</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>4a2ed90d9047399096afe97f0ffe1e9dec7accfd4a2ced01776a9e88d34a0c64</SHA-256>
              <SHA-1>39a6defe0d2101e1cba7426b275523690bd4bf0a</SHA-1>
              <MD5>3820441875c0401b18b8c14845228d2d</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload; format=pe64</file_type>
            </value>
            <value>
              <SHA-256>50f3552d0189e25de270d8e1a3868d7498245eee9375b10bbb9dfbbf1f1ae24c</SHA-256>
              <SHA-1>2fe7b2fc1d457cd2a189b7addbbb4cc222c488e3</SHA-1>
              <MD5>0d37dc384353f12cc67f1e1b83ecb732</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload; format=pe64</file_type>
            </value>
            <value>
              <SHA-256>53e1ae451cc50888f7c9185f188047244ca6187aef9e0b8e47c3ca8723320685</SHA-256>
              <SHA-1>2a3d19423a49b93592ade7c92c6d09ba4738cadf</SHA-1>
              <MD5>b7f5f38403a43aedb24c14450d61c477</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>59ba97d56a01766792386c3b379946bb613c8921e3daf8a878855a268ad5e4aa</SHA-256>
              <SHA-1>c0a369f6f0e77b89c5d9d37fb94e1d5e2d431b5b</SHA-1>
              <MD5>245b863be176aab16ef1dbe168defe03</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>6f5d670f0d9784646ed8be92f87aff79b5149a24c03f82476eff221c1cdbfe5d</SHA-256>
              <SHA-1>d89c737b058e1bffb0cfd3c42665724e701427cc</SHA-1>
              <MD5>42cbb50e8afc8ee1216d53a307e4c834</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>6fdc87998725e4f2386b472d157ac232712ef9632dbe059d3b5a3c558051d9f9</SHA-256>
              <SHA-1>2601fefe4b5f88902b9862b12ee6fc92d73d065a</SHA-1>
              <MD5>179fa62e60fcca3562408bcef09cbbc3</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>7d66b0d47dfabba3612f5d1e38166982f31f57fc7436b8ba831116541aa5ac7c</SHA-256>
              <SHA-1>c416cb847819601840c6a56cb293eceb1a774547</SHA-1>
              <MD5>f86427116cc4954fe0045471de1dcae3</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload; format=pe64</file_type>
            </value>
            <value>
              <SHA-256>806ce4e1e64808b14f264d19cfdd30169ca2ead55eefae2417674cbc565d9b59</SHA-256>
              <SHA-1>b73f3e43018b06b3fa5865b2c8ad8743e8e7666a</SHA-1>
              <MD5>90219a0150d0a3fce3b4e8ac73657638</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>9f999ec295a73f09aa28a66193ce2b9e4d1dfbe27afae6c9c1071f32e352c94d</SHA-256>
              <SHA-1>26046a372bf879725ce1586c2b5922807cbed7e6</SHA-1>
              <MD5>7360dd8f33c65f153da5583834093ebd</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload; format=pe64</file_type>
            </value>
            <value>
              <SHA-256>a73f26a8d504043f785d7360e8febf2eeb8522ec873a0d4dd5d1d4bfd1e67d3d</SHA-256>
              <SHA-1>6c93b8c5fde8be4b2231dca6b8ec513cdc82c991</SHA-1>
              <MD5>5aa04ce935e78505e230765e85c34355</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>bb5ea8a37d319ee3d86294bcf07ba43c219d0b9436e1c65e9febce8e0d502ef2</SHA-256>
              <SHA-1>3bf8632211735c0d5b51665e2b1a0819f7ea79a3</SHA-1>
              <MD5>ee540934c1132e87f10a14606e8588cb</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload; format=pe64</file_type>
            </value>
            <value>
              <SHA-256>c74eb467fe1b2be4ed8aac44d293f95447ecbc154ba8e91ccff8dea4c1db6460</SHA-256>
              <SHA-1>0a3c819c88958a35fb79c70d71a607e77c033225</SHA-1>
              <MD5>f1b174c9cda87e57d8823eb8dbc6fbc0</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>ce95734d57ceed48b4d8a8970975bf54edb5c4be42a829aa4a5e80d481e2bb6f</SHA-256>
              <SHA-1>f961bb5445f56ec25c5f68a11a1f6b25e69c4d0d</SHA-1>
              <MD5>18504321eef4b9e7b12cd9d9c88f7422</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>e2bdc6690be004dd41c9ba655b0e929194b08f7bbfe48953ca349d6b841be681</SHA-256>
              <SHA-1>a7bb39010bf7f627029da76b2fe5c1536a059259</SHA-1>
              <MD5>2acb6d895b48da626d848d4ef2638abc</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>f63cfb5bd92e79f8d33c8cf4c9cd03e72984d88ef4b9886cde63d3ad025e9be8</SHA-256>
              <SHA-1>97f30e2c72700c0c0e8095bdafb01132edd267a1</SHA-1>
              <MD5>16f28cc0a3d7ad8161345a54df75d4a0</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
          </files>
          <btc_wallets>
            <value>
              <btc_wallet>DhhnhjE2uM48SkwTb7BfiPsg8wSrBPnY</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
          </btc_wallets>
        </iocs>
        <name>Hotmail-Checker.exe</name>
        <report_id>17c54dad-bd05-4eca-848b-a2fb792c770d</report_id>
        <tags>
          <value>peexe</value>
          <value>meterpreter</value>
          <value>krypt</value>
          <value>stealc</value>
          <value>unsafe</value>
          <value>vidar</value>
          <value>windows</value>
          <value>stealer</value>
          <value>packed</value>
          <value>overlay</value>
          <value>anti-debug</value>
          <value>anti-vm</value>
          <value>fingerprint</value>
          <value>lolbin</value>
          <value>wmic</value>
          <value>obfuscated</value>
          <value>golang</value>
          <value>microsoft_visual_cc</value>
          <value>base64</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>c85d9d1a2e9675a375c71cb653a03af7370459fae1280124365be11cade2a886</id>
    <title>Analysis Report for c85d9d1a2e9675a375c71cb653a03af7370459fae1280124365be11cade2a886</title>
    <updated>2026-04-13T03:35:30Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc64a080678438b878ad2c</_id>
        <file_type>application/x-dosexec</file_type>
        <flow_id>69dc647f799d5bf325fa65de</flow_id>
        <hash>c85d9d1a2e9675a375c71cb653a03af7370459fae1280124365be11cade2a886</hash>
        <iocs>
          <files>
            <value>
              <SHA-256>3083c4690072a85fcfe4b10920595d0b929cce47d7b0edcdbfdaca1a1604f555</SHA-256>
              <SHA-1>637c8db2b28336bbf779a67ad3b199971affa296</SHA-1>
              <MD5>0a0fe62c408101834337eed5411cc38a</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>text/plain</file_type>
            </value>
            <value>
              <SHA-256>4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df</SHA-256>
              <SHA-1>4260284ce14278c397aaf6f389c1609b0ab0ce51</SHA-1>
              <MD5>1e4a89b11eae0fcf8bb5fdd5ec3b6f61</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>dda282734827e2d1eb983c9cdc3eba3f4d27bc0b9e073cffedabbfb2a8679d6c</SHA-256>
              <SHA-1>d7a988f6600c42802fe0cbad3eb701c9d625eb0b</SHA-1>
              <MD5>e21be70a2eeefbac1d3bb03c5a47b9ce</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
          </files>
        </iocs>
        <name>SecuriteInfo.com.Variant.Midie.178032.56591614.exe</name>
        <report_id>dd4c57ba-cd25-4df9-a219-e62375b83e8f</report_id>
        <tags>
          <value>peexe</value>
          <value>pedll</value>
          <value>overlay</value>
          <value>adaptive-context</value>
          <value>anti-debug</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>a133298be4d78535abc6fb16627d2baa573a9a6ce71f017b27a907b82a4b900c</id>
    <title>Analysis Report for a133298be4d78535abc6fb16627d2baa573a9a6ce71f017b27a907b82a4b900c</title>
    <updated>2026-04-13T03:32:32Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc63de80678438b878ad06</_id>
        <file_type>application/x-msdownload</file_type>
        <flow_id>69dc63ced920e19044f92b5e</flow_id>
        <hash>a133298be4d78535abc6fb16627d2baa573a9a6ce71f017b27a907b82a4b900c</hash>
        <iocs>
          <ips>
            <value>
              <ip>1.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>6.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>51733e4f25b05615ccce32d50dfc3fae67c6cd2e82637c052e71ccbe01c5cdfb</SHA-256>
              <SHA-1>9b3855237f8dacda527c014a709ebc72764c02f1</SHA-1>
              <MD5>83c6a2e1932d7e783d0841afc40a0e36</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>637311be80857a7be2c7d12567108e4e73e1497aaec83853a4f4e12e15ef0a58</SHA-256>
              <SHA-1>e2d07317d30160608213b6148c0f6b73ed44fb42</SHA-1>
              <MD5>9b0184f1e96d499c0cb5f0cc45767df4</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>8aecd886e67d8cbe30bc719e7c0df4cd4f4a7e000d14f296e8a1af2c6fb04a11</SHA-256>
              <SHA-1>f2ee97c66ac167b7bb8ddb35c50464102dc716fd</SHA-1>
              <MD5>48b7daa094a69053983c7c0a1a9d1892</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>ef04457e0e73ac21b26411830132357cfa0f66d70eb83c64619397c914d1873c</SHA-256>
              <SHA-1>6e5609f9292fa275dc35ef188e7ebf645926224f</SHA-1>
              <MD5>bd8f0598d4d9fda3b70e052ded9c8e89</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>f9b1c190609ad79731aa037e1648db1d8f3720c9829d6b2af5a70dcd59ddef79</SHA-256>
              <SHA-1>de7448894494b11bc7af5fef668e30bf9a0134d2</SHA-1>
              <MD5>21e64fbed783721f3b1472bad78c78a7</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
          </files>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
          </registry>
        </iocs>
        <name>a133298be4d78535abc6fb16627d2baa573a9a6ce71f017b27a907b82a4b900c.dll</name>
        <report_id>e831eccb-cd5d-4be3-adf0-96421b0c845b</report_id>
        <tags>
          <value>peexe</value>
          <value>pedll</value>
          <value>unsafe</value>
          <value>evasive</value>
          <value>adaptive-context</value>
          <value>anti-debug</value>
          <value>crypto</value>
          <value>hacktool</value>
          <value>packed</value>
          <value>microsoft_visual_cc</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>f94d223b1d99de41e25a87c63aee98bac978150710f1481abc5f25330ad66f1b</id>
    <title>Analysis Report for f94d223b1d99de41e25a87c63aee98bac978150710f1481abc5f25330ad66f1b</title>
    <updated>2026-04-13T03:32:23Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc63ea80678438b878ad0b</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc63c3fd15f1ca1ccf888d</flow_id>
        <hash>f94d223b1d99de41e25a87c63aee98bac978150710f1481abc5f25330ad66f1b</hash>
        <iocs>
          <urls>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://hwnp.org/api/log</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>INPUT_FILE</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://127.0.0.1/Admin</url>
              <origin>UNC_PATH</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://hwnp.org/api/log</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>hwnp.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>hwnp.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>ransomware@onion.com</email>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <email>ransomware@onion.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>UNC_PATH</origin>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>1.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.96.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.96.3</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>44577b7d1c30056a17af85d37aa7bfac61a2835bd7af707a969849de9e504476</SHA-256>
              <SHA-1>a4fd1b0c2121dfdca66132b6728ea60459c1febc</SHA-1>
              <MD5>8346eebdf376771f93509c94551a6802</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f</SHA-256>
              <SHA-1>879dcf690e5bf1941b27cf13c8bcf72f8356c650</SHA-1>
              <MD5>a19a2658ba69030c6ac9d11fd7d7e3c1</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>72befb5732d1dfa586c1d7db6865fc5c3b0e473f7d58428be66080679b57211f</SHA-256>
              <SHA-1>4859b1ac452337cea2869293cc0e1f480272cba5</SHA-1>
              <MD5>499dc42ff233a04b8d9d70b5b80160fe</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>c43c99daa4b093544881001252171418a8537e8c244e42e3330c7d6f2087ea42</SHA-256>
              <SHA-1>55f7e6e254e4680d276be6e84a2546ee071443b8</SHA-1>
              <MD5>a42a96eb18533306c5a8016352884947</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\REvil</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings\shell\open\command</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <registry>Software\LockBit</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\WannaCry</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </registry>
        </iocs>
        <name>hwnp.org_2.exe</name>
        <report_id>147dce76-6f9b-4b44-a01c-55cf9f7d09e9</report_id>
        <tags>
          <value>peexe</value>
          <value>html</value>
          <value>dotnet_pe</value>
          <value>ransomware</value>
          <value>cryptear</value>
          <value>cryptolocker</value>
          <value>filecoder</value>
          <value>hiddentear</value>
          <value>lockfile</value>
          <value>unsafe</value>
          <value>anti-vm</value>
          <value>evasive</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>cmd</value>
          <value>reconnaissance</value>
          <value>wscript</value>
          <value>lolbin</value>
          <value>netsh</value>
          <value>runonce</value>
          <value>schtasks</value>
          <value>smb</value>
          <value>wmic</value>
          <value>obfuscated</value>
          <value>soft-404</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>3d20ecd21dd1f6cf77e89aab1a190738c3f902b4dd8a118e3aaa91a23adc3d4c</id>
    <title>Analysis Report for 3d20ecd21dd1f6cf77e89aab1a190738c3f902b4dd8a118e3aaa91a23adc3d4c</title>
    <updated>2026-04-13T03:32:17Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc63e380678438b878ad09</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc63be5ea31bc68a2498ca</flow_id>
        <hash>3d20ecd21dd1f6cf77e89aab1a190738c3f902b4dd8a118e3aaa91a23adc3d4c</hash>
        <iocs>
          <urls>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://hwnp.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://127.0.0.1/Admin</url>
              <origin>UNC_PATH</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://hwnp.org</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>INPUT_FILE</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>hwnp.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>hwnp.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>ransomware@onion.com</email>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <email>ransomware@onion.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>1.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>UNC_PATH</origin>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.96.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.96.3</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>4e402a1d3fb0195088ee6cf76061fbaf19d6be9e76f6120fe560dd8a909ce82b</SHA-256>
              <SHA-1>5d9b14f2eee932716e9ea21803250e603bd5b021</SHA-1>
              <MD5>d0688ebcbf5ba5a35151dd33e555fe9f</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f</SHA-256>
              <SHA-1>879dcf690e5bf1941b27cf13c8bcf72f8356c650</SHA-1>
              <MD5>a19a2658ba69030c6ac9d11fd7d7e3c1</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>72befb5732d1dfa586c1d7db6865fc5c3b0e473f7d58428be66080679b57211f</SHA-256>
              <SHA-1>4859b1ac452337cea2869293cc0e1f480272cba5</SHA-1>
              <MD5>499dc42ff233a04b8d9d70b5b80160fe</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>286b13052c8e4056ded9cce76561ea300c2d05f56e7f619b56c6b2a8f55bd326</SHA-256>
              <SHA-1>c63193a1b688b01dcaf0dcff6a695159837ee1a1</SHA-1>
              <MD5>ba5fb02ccb0fbaca4e3d7d2382b7d129</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\REvil</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings\shell\open\command</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <registry>Software\LockBit</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\WannaCry</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
          </registry>
        </iocs>
        <name>hwnp.org.exe</name>
        <report_id>5879d26e-f233-4011-9dc4-64c4cec06beb</report_id>
        <tags>
          <value>peexe</value>
          <value>html</value>
          <value>dotnet_pe</value>
          <value>ransomware</value>
          <value>cryptear</value>
          <value>cryptolocker</value>
          <value>filecoder</value>
          <value>hiddentear</value>
          <value>lockfile</value>
          <value>unsafe</value>
          <value>anti-vm</value>
          <value>evasive</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>cmd</value>
          <value>masquerade</value>
          <value>reconnaissance</value>
          <value>wscript</value>
          <value>lolbin</value>
          <value>netsh</value>
          <value>runonce</value>
          <value>schtasks</value>
          <value>smb</value>
          <value>wmic</value>
          <value>obfuscated</value>
          <value>soft-404</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>a4c5a267a687d04f777a73e5ab01c91dfb2ccf67630b46153e24e5577dc4e3cb</id>
    <title>Analysis Report for a4c5a267a687d04f777a73e5ab01c91dfb2ccf67630b46153e24e5577dc4e3cb</title>
    <updated>2026-04-13T03:31:32Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc639b80678438b878acf4</_id>
        <file_type>application/json</file_type>
        <flow_id>69dc63905ea31bc68a24982f</flow_id>
        <hash>a4c5a267a687d04f777a73e5ab01c91dfb2ccf67630b46153e24e5577dc4e3cb</hash>
        <iocs/>
        <name>manifest.json</name>
        <report_id>d1dee0de-0c03-466f-9316-669229c051b4</report_id>
        <tags>
          <value>json</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>fb1db4ddbb8174e604b4f24701a87bab7f3a6a40ddea96c00d551edba94d61da</id>
    <title>Analysis Report for fb1db4ddbb8174e604b4f24701a87bab7f3a6a40ddea96c00d551edba94d61da</title>
    <updated>2026-04-13T03:31:32Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc63a480678438b878acf8</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc63905ea31bc68a24982f</flow_id>
        <hash>fb1db4ddbb8174e604b4f24701a87bab7f3a6a40ddea96c00d551edba94d61da</hash>
        <iocs>
          <btc_wallets>
            <value>
              <btc_wallet>11111111111111111111111111111</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
          </btc_wallets>
        </iocs>
        <name>config.arm64_v8a.apk</name>
        <report_id>3dcac1bd-2a8c-4965-9b31-a6bd11bf0192</report_id>
        <tags>
          <value>apk</value>
          <value>signed</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>e7617ef13af50974f8867b8053f700af07923440bb936b32475c4c7703206b28</id>
    <title>Analysis Report for e7617ef13af50974f8867b8053f700af07923440bb936b32475c4c7703206b28</title>
    <updated>2026-04-13T03:31:32Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc63c780678438b878ad00</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc63905ea31bc68a24982f</flow_id>
        <hash>e7617ef13af50974f8867b8053f700af07923440bb936b32475c4c7703206b28</hash>
        <iocs>
          <urls>
            <value>
              <url>https://fundingchoicesmessages.google.com/a/consent</url>
              <origin>APK_DECODING</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://issuetracker.google.com/issues/116541301</url>
              <origin>APK_DECODING</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>fundingchoicesmessages.google.com</url>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <url>issuetracker.google.com</url>
              <origin>APK_DECODING</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>142.251.110.101</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>142.250.154.102</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>142.250.154.102</ip>
              <origin>APK_DECODING</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>142.251.110.101</ip>
              <origin>APK_DECODING</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>25bd2bc068712b0c391b433afe12825bf3bfe202cdbc0db8d4345a8890c9c390</SHA-256>
              <SHA-1>ff6e8e2f0b54a61a45571181659274c625c0f3e9</SHA-1>
              <MD5>686e35d981080fe1a38dbcb02a9ee5ee</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>d48d0fead7fd43d645cde2989fd2ddf353493631a031257559bd2402ac83533e</SHA-256>
              <SHA-1>ffa38105acb9f1558f0f4d4fa9503ce61e2b1678</SHA-1>
              <MD5>7d914b4d4002a8a1f1ffd61ff9d3452a</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
        </iocs>
        <name>com.textmessageapp.rcssms.fastsms.textsms.apk</name>
        <report_id>85a252ef-5efb-43e6-b9e8-599c5ada407d</report_id>
        <tags>
          <value>apk</value>
          <value>html</value>
          <value>fingerprint</value>
          <value>persistence</value>
          <value>signed</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>soft-404</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>fe1e6f26cbfbc15fcb979a8b74540ab876be21262034eb6edd49b6877c3d127b</id>
    <title>Analysis Report for fe1e6f26cbfbc15fcb979a8b74540ab876be21262034eb6edd49b6877c3d127b</title>
    <updated>2026-04-13T03:31:13Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc63a180678438b878acf6</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc637f799d5bf325fa63da</flow_id>
        <hash>fe1e6f26cbfbc15fcb979a8b74540ab876be21262034eb6edd49b6877c3d127b</hash>
        <iocs>
          <urls>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://watch-monster.com/api/log</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://127.0.0.1/Admin</url>
              <origin>UNC_PATH</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>INPUT_FILE</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://watch-monster.com/api/log</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>malware.wicar.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>watch-monster.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>watch-monster.com</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>ransomware@onion.com</email>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <email>ransomware@onion.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>UNC_PATH</origin>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>1.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>a2b248b3ee59141fa4c8a3669ed18565572d5a778f66e042254f6a730d541eff</SHA-256>
              <SHA-1>970bf7ecd169ce37e2e3e240a0bcf5d9b0b1f965</SHA-1>
              <MD5>6072eca6a74711a6f65e4bbf3517fe46</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f</SHA-256>
              <SHA-1>879dcf690e5bf1941b27cf13c8bcf72f8356c650</SHA-1>
              <MD5>a19a2658ba69030c6ac9d11fd7d7e3c1</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>72befb5732d1dfa586c1d7db6865fc5c3b0e473f7d58428be66080679b57211f</SHA-256>
              <SHA-1>4859b1ac452337cea2869293cc0e1f480272cba5</SHA-1>
              <MD5>499dc42ff233a04b8d9d70b5b80160fe</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>c170362d7c50b5dad41ebd42ff5d7fb6867cb22fc4640f7230cfdac5ad26144b</SHA-256>
              <SHA-1>bac7e8b05941eb5dea7c471a8606eaa0ccfdc551</SHA-1>
              <MD5>34a15e6c967312976efb40c2ae6f6d21</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
          </files>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\REvil</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings\shell\open\command</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <registry>Software\LockBit</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\WannaCry</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </registry>
        </iocs>
        <name>watch-monster.com_2.exe</name>
        <report_id>8c3ca5c0-332a-4314-9991-87c83742fb3a</report_id>
        <tags>
          <value>peexe</value>
          <value>html</value>
          <value>dotnet_pe</value>
          <value>ransomware</value>
          <value>cryptear</value>
          <value>cryptolocker</value>
          <value>filecoder</value>
          <value>hiddentear</value>
          <value>lockfile</value>
          <value>unsafe</value>
          <value>anti-vm</value>
          <value>evasive</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>cmd</value>
          <value>reconnaissance</value>
          <value>wscript</value>
          <value>lolbin</value>
          <value>netsh</value>
          <value>runonce</value>
          <value>schtasks</value>
          <value>smb</value>
          <value>wmic</value>
          <value>obfuscated</value>
          <value>soft-404</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>bf22c374d014332101740c9432d2cb070b2d4d09efa4ca49cf913dedcde1c45a</id>
    <title>Analysis Report for bf22c374d014332101740c9432d2cb070b2d4d09efa4ca49cf913dedcde1c45a</title>
    <updated>2026-04-13T03:31:01Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc639380678438b878acf1</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc6374799d5bf325fa63c9</flow_id>
        <hash>bf22c374d014332101740c9432d2cb070b2d4d09efa4ca49cf913dedcde1c45a</hash>
        <iocs>
          <urls>
            <value>
              <url>http://127.0.0.1/Admin</url>
              <origin>UNC_PATH</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://watch-monster.com</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>INPUT_FILE</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://watch-monster.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>malware.wicar.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>watch-monster.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>watch-monster.com</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>ransomware@onion.com</email>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <email>ransomware@onion.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>UNC_PATH</origin>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>1.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>877d40994e74cabe8b483eed13545ff94fbd73e41e3b933db2269b10e430fdb1</SHA-256>
              <SHA-1>2f3231119fa40dee0ad675990173c12d7f841472</SHA-1>
              <MD5>b191d8882c6b6ba29cb2a52e38e8e7f0</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f</SHA-256>
              <SHA-1>879dcf690e5bf1941b27cf13c8bcf72f8356c650</SHA-1>
              <MD5>a19a2658ba69030c6ac9d11fd7d7e3c1</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>72befb5732d1dfa586c1d7db6865fc5c3b0e473f7d58428be66080679b57211f</SHA-256>
              <SHA-1>4859b1ac452337cea2869293cc0e1f480272cba5</SHA-1>
              <MD5>499dc42ff233a04b8d9d70b5b80160fe</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>f12f605b53f1fdc59577c699ba39e92fc08114ac503825eec62470fde206008a</SHA-256>
              <SHA-1>f29e0ddac205bbba2141658f83556a94c46cc6cd</SHA-1>
              <MD5>c43d5d6826fc0f96118a1fc1e8daa713</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
          </files>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\REvil</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings\shell\open\command</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <registry>Software\LockBit</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\WannaCry</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
          </registry>
        </iocs>
        <name>watch-monster.com.exe</name>
        <report_id>edf4aa83-bed5-432f-bc8b-840a156dd0a2</report_id>
        <tags>
          <value>peexe</value>
          <value>html</value>
          <value>dotnet_pe</value>
          <value>ransomware</value>
          <value>cryptear</value>
          <value>cryptolocker</value>
          <value>filecoder</value>
          <value>hiddentear</value>
          <value>lockfile</value>
          <value>unsafe</value>
          <value>anti-vm</value>
          <value>evasive</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>cmd</value>
          <value>masquerade</value>
          <value>reconnaissance</value>
          <value>wscript</value>
          <value>lolbin</value>
          <value>netsh</value>
          <value>runonce</value>
          <value>schtasks</value>
          <value>smb</value>
          <value>wmic</value>
          <value>obfuscated</value>
          <value>soft-404</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>f3e383dcd84c7b4eeb421a812340ad85f33bd99483d6f10f9d3639cec842a33f</id>
    <title>Analysis Report for f3e383dcd84c7b4eeb421a812340ad85f33bd99483d6f10f9d3639cec842a33f</title>
    <updated>2026-04-13T03:30:31Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc637480678438b878acea</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc63559124ebc087508818</flow_id>
        <hash>f3e383dcd84c7b4eeb421a812340ad85f33bd99483d6f10f9d3639cec842a33f</hash>
        <iocs>
          <urls>
            <value>
              <url>http://schemas.microsoft.com/SMI/2005/WindowsSettings</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://schemas.microsoft.com/SMI/2016/WindowsSettings</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>schemas.microsoft.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>lNEeJAX@7L6.H3</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>6.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>13.107.226.45</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>13.107.226.45</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>04addc2f763bd9e8f029fc2f8a0deefaefa2053eef1e42f7acaedbe25202161c</SHA-256>
              <SHA-1>4e1801a565cf7c9bcb8ecb806d44f438db77a3b5</SHA-1>
              <MD5>c2e65dcc7a094a688615f0966849858d</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>133c637d3617359262fd5e844b43a38130d7c0bfec50647325c87f097955b605</SHA-256>
              <SHA-1>80a011e25225fd477f8f11beb1f9a44cd4662764</SHA-1>
              <MD5>5f4ce4f1b4e7b77d98600f271b56aa50</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>2213c994d4914a528636f2db6eb15f9dc5c730ca90831fc9ad53855312b3853d</SHA-256>
              <SHA-1>f4ac9364e078bac43b8feacf0c480c234c6f1eef</SHA-1>
              <MD5>cd5b9713eedc3ce297d90a73246113d3</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>230f52364ff197b5416d740dc555e077d826a6caec2af05442bcd20043420cb3</SHA-256>
              <SHA-1>88a372202f69203ff4a531cbf94359562c4339cf</SHA-1>
              <MD5>c1f089ab3dde341f4f24a826aa8049fb</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>23442236cca002b6590ba2add737e8fb74c02aa3167868128c200c8d21bd0ed9</SHA-256>
              <SHA-1>a95f13b292018908e1d0a1e1ef547aff00202de2</SHA-1>
              <MD5>ea12f0a1d404b0fb1d7e331350425d43</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>279c1a8c9d16870d3c077dfc36c7a68c7a9009bbf73537a1bc0fb6121dff054b</SHA-256>
              <SHA-1>f304ba06ca242967a0a5e18f939502c2361aea8c</SHA-1>
              <MD5>48e26afb0c2641a351ae9e53b29745e6</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>2b42922b4d2edf9fc7db86695aee0eaa5ed3d02831b78f02421a025161f32473</SHA-256>
              <SHA-1>f8024bf404051e75c8f5f9def8a6fbebeee9ff91</SHA-1>
              <MD5>4dad6868ab9b2ca4e9c94836c2ebd5a8</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>495529a1fb068648831f5ffa85f76c6506b00f532c119d1c77b2f0be0567dfdd</SHA-256>
              <SHA-1>ec5c8492d0fd5358044aa4b1e5c07b60274f6b76</SHA-1>
              <MD5>7498a5aad7daf29b8985043bf8562e47</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>50708d2e94389cd35cd783788657d91b1866e2eb8c8b5a58719455021d07c15b</SHA-256>
              <SHA-1>024a1c1aa9ff0517022863a3adf6bae81618b60c</SHA-1>
              <MD5>6bcb5c6b87eafafc78ca32459c8c8713</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>59921b5d0e9cb6c169040917a5e0fc56525efa8f2b517621536ecae838dae70f</SHA-256>
              <SHA-1>27c4d223b1a0b05f7a27243947fefe06235dc8e9</SHA-1>
              <MD5>f90e5167e0e2a3ece9cdf7627f028df2</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>5cbb0607e70ca2fba5a5d68d9d5ad2127e1f1ad72ddd72a5a9ba29042d9e5086</SHA-256>
              <SHA-1>98fa729d23d8dd339a313c3a1a63a651c1a13088</SHA-1>
              <MD5>10b6b09a9d96060c27d4798f98b6d8be</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>601b97dc83478a95349e6e79c7776782208bcf3928a66d91cda75c5a1ffa6456</SHA-256>
              <SHA-1>f5c716761176bc51e5e41e7c0c3779e4fc105e26</SHA-1>
              <MD5>043114e3d6cd11bb28fbe6144142bf8f</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>6d7f6d695fd757e872e59a33e07bc8871d223518138fe3b2c81537d2a5a0d56e</SHA-256>
              <SHA-1>edd52a65edab1817989ff6cdf647f0797c8a5a25</SHA-1>
              <MD5>2016d4b7ba0ae12a2f31c40c44e97a6f</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>72db19dedd02f9843e54440caa0602358e617940dc6ddb72051c055f1c427136</SHA-256>
              <SHA-1>964d9108efcd120fa2585ae1f2db745ba66df416</SHA-1>
              <MD5>9d89798f749b30a01fbbb1624f734163</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>74176740948e1af1d49c9b37e2aa7b90e889fa63320c231272cb435f8e69b716</SHA-256>
              <SHA-1>6dad65482d4b193c95daf4841f0245f3d7f39f6d</SHA-1>
              <MD5>b9502b418a3f459a91c66c2aa233b330</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>a8cc6a4a72a8e3ae131164a0e4a0b12a21d0abe117d3165f8bf37fc4c7211f86</SHA-256>
              <SHA-1>98cbcb05fe7dc610bc45a2d9cf9698e1e101f079</SHA-1>
              <MD5>e96690f1adb53aa28377e4a32666a81d</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>ac74bf999a2ef7e67abd35ee34b9c887c17ee79f7fe6924d2a9680436bff59b4</SHA-256>
              <SHA-1>5159ad1e4e12897ba62df6afc7014788aebf15e1</SHA-1>
              <MD5>e2964c772ea1a3aa46b8e3a4b56eaba2</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>b501863345fe35b904dae16fe54c7cec150a6f2dc1a4b0760354f3919c6874f3</SHA-256>
              <SHA-1>9288fc59b057ebb35e5b2e7fae454242dd03573d</SHA-1>
              <MD5>c22459685d164d416c2b2b63521016d8</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>bde1630904b074691d41a77890ff13c84a2dfa39d429d92cad74eeb2da7d59e5</SHA-256>
              <SHA-1>2947d390cd4a054199138d95b4ccebf74f554bf5</SHA-1>
              <MD5>664e9887cb442cba0b1866e904e808b6</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>e74c18e9860d454eabd4c6efc99a8f086572c12a47f90de929da0b27eda5279d</SHA-256>
              <SHA-1>741446aefd7d0c03c1c8dd26f349c8434b6e3cbf</SHA-1>
              <MD5>80e16f750b8ca25b11de68229270e82f</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
          </files>
          <uuids>
            <value>
              <uuid>1f676c76-80e1-4239-95bb-83d0f6d0da78</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>35138b9a-5d96-4fbd-8e2d-a2440225f93a</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>e2011457-1546-43c5-a5fe-008deee3d3f0</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
          <btc_wallets>
            <value>
              <btc_wallet>364934b29f3e73e6b43381f413eb8a64</btc_wallet>
              <origin>EXTERNAL_PARSER</origin>
            </value>
          </btc_wallets>
        </iocs>
        <name>f3e383dcd84c7b4eeb421a812340ad85f33bd99483d6f10f9d3639cec842a33f.exe</name>
        <report_id>0e55a1e4-15fb-4ada-a4ff-0b0a90280c80</report_id>
        <tags>
          <value>peexe</value>
          <value>zusy</value>
          <value>crypt</value>
          <value>tvrat</value>
          <value>unsafe</value>
          <value>keylogger</value>
          <value>adaptive-context</value>
          <value>anti-debug</value>
          <value>packed</value>
          <value>expand</value>
          <value>explorer</value>
          <value>fingerprint</value>
          <value>lolbin</value>
          <value>microsoft_visual_cc</value>
          <value>installer-heuristic</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>be429ef13c45abb6f1b85e09bf48e7fe5c40747c372ae22412022af7052f630b</id>
    <title>Analysis Report for be429ef13c45abb6f1b85e09bf48e7fe5c40747c372ae22412022af7052f630b</title>
    <updated>2026-04-13T03:28:45Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc62fa80678438b878acd2</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc62ed3a506932d7c07548</flow_id>
        <hash>be429ef13c45abb6f1b85e09bf48e7fe5c40747c372ae22412022af7052f630b</hash>
        <iocs>
          <files>
            <value>
              <SHA-256>a3638b1318ef23fdf06ed38196c8303dfabdd72a8b666f90f5ec188c23e0484c</SHA-256>
              <SHA-1>292b7cb2eb893b44304d7fb074fda6196806af01</SHA-1>
              <MD5>141758990a6b208c9dd670201dbee330</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
          </files>
        </iocs>
        <name>client.dll</name>
        <report_id>a08b7119-02de-414f-8f96-d6a5d757909f</report_id>
        <tags>
          <value>peexe</value>
          <value>pedll</value>
          <value>microsoft_visual_cc</value>
          <value>overlay</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>bf22c374d014332101740c9432d2cb070b2d4d09efa4ca49cf913dedcde1c45a</id>
    <title>Analysis Report for bf22c374d014332101740c9432d2cb070b2d4d09efa4ca49cf913dedcde1c45a</title>
    <updated>2026-04-13T03:27:44Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc62e4f9522792fdaf802a</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc62adc33dc5a985d798c1</flow_id>
        <hash>bf22c374d014332101740c9432d2cb070b2d4d09efa4ca49cf913dedcde1c45a</hash>
        <iocs>
          <urls>
            <value>
              <url>http://127.0.0.1/Admin</url>
              <origin>UNC_PATH</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://watch-monster.com</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://avast.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://bitdefender.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://eicar.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://emotet.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://eset.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://extra.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://google.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>http://i2p2.de</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://kaspersky.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>INPUT_FILE</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://malwarebytes.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://mcafee.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://onion.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://ryuk.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://symantec.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://torproject.org</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://trendmicro.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://trickbot.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://virustotal.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://wannacry-decryptor.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://watch-monster.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://www.google.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>watch-monster.com</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>avast.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>bitdefender.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>eicar.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>emotet.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>eset.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>extra.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>google.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>i2p2.de</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>kaspersky.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>malwarebytes.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>mcafee.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>onion.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>ryuk.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>symantec.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>torproject.org</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>trendmicro.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>trickbot.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>virustotal.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>wannacry-decryptor.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>watch-monster.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>ransomware@onion.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>UNC_PATH</origin>
            </value>
            <value>
              <ip>89.238.73.97</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>95.216.163.36</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>192.0.66.233</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>192.0.66.48</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>150.70.232.194</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>54.243.117.197</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>91.195.241.232</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>104.18.14.223</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>91.228.167.128</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>185.85.15.46</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>81.7.7.63</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>54.68.22.26</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>72.246.29.222</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>104.18.95.219</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>216.239.34.21</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.96.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>100.20.214.93</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>watch-monster.com</ip>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <ip>avast.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>bitdefender.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>eicar.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>eset.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>extra.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>i2p2.de</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>kaspersky.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>malware.wicar.org</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>malwarebytes.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>mcafee.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>onion.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>ryuk.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>symantec.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>torproject.org</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>trendmicro.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>trickbot.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>virustotal.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <MD5>b191d8882c6b6ba29cb2a52e38e8e7f0</MD5>
              <SHA-1>2f3231119fa40dee0ad675990173c12d7f841472</SHA-1>
              <SHA-256>877d40994e74cabe8b483eed13545ff94fbd73e41e3b933db2269b10e430fdb1</SHA-256>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <MD5>a19a2658ba69030c6ac9d11fd7d7e3c1</MD5>
              <SHA-1>879dcf690e5bf1941b27cf13c8bcf72f8356c650</SHA-1>
              <SHA-256>c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f</SHA-256>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <MD5>79d4d1c94a9fd4cadf08c23fac57c418</MD5>
              <SHA-1>bb8ca70def0bb9a54f85b736d3d658e1ba9b237f</SHA-1>
              <SHA-256>e02a7ce3a3b27c10795975312d3a3971a55f9abc8742e407ce61ecec3797aebd</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <MD5>27686ea6fa029972ec8951f42e5c3323</MD5>
              <SHA-1>cb206800f0b0ca8b68514fcca14319816aaefc29</SHA-1>
              <SHA-256>4b48f46d87a5310235ab05ebb71335a8043584424f4f4858f42089138eb1a5b9</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <MD5>e45cb85562617e45d4d11104c38ba8b4</MD5>
              <SHA-1>c30777231976f5f5fafc281490d930627b48f5eb</SHA-1>
              <SHA-256>39743d4c4615daed94d20c0b77d9d1572b0a0cf062be2b04bc6aaf5d2922148f</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <MD5>b7cc4f85746a437560b735f8b1e4f080</MD5>
              <SHA-1>f589e35c5e5bcfffc2bb2b904b7959d07510e42f</SHA-1>
              <SHA-256>27af50aae9c294b74bccdab2956d52404643978cf7770314d991aaf9073fae6e</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <MD5>a03b2398f5edecc232d7bd12ffef4828</MD5>
              <SHA-1>139296f4ddca23056e048c220be5dfefceb08c14</SHA-1>
              <SHA-256>ca31d65deda777a0c842f94329a9f6fe9b4447c17e471a110db4e19d43f8e599</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <MD5>c2146794630d6906b5b07c7c0f2c407f</MD5>
              <SHA-1>bfa6c370b7dab691fa17472129809df5fd87382b</SHA-1>
              <SHA-256>f4b787908b1f85cfff8210b9613456a7ba0be995d53aceec2d44b9221d572aa3</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <MD5>4babf690232429756c42ddac89b5378e</MD5>
              <SHA-1>f50324cd95d7ece511f4f8d9b24442ccf9db3c43</SHA-1>
              <SHA-256>9eef78bb8d31662beb900ef5b5dd22b08038eb37dbcf148ef5b2c8e8af8a339d</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </registry>
        </iocs>
        <name>watch-monster.com.exe</name>
        <report_id>5f83a381-edd7-445a-ba49-4b3f29b35fcc</report_id>
        <tags>
          <value>peexe</value>
          <value>html</value>
          <value>txt</value>
          <value>dotnet_pe</value>
          <value>ransomware</value>
          <value>threat</value>
          <value>unknown</value>
          <value>anti-vm</value>
          <value>evasive</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>cmd</value>
          <value>lolbin</value>
          <value>masquerade</value>
          <value>reconnaissance</value>
          <value>wscript</value>
          <value>netsh</value>
          <value>runonce</value>
          <value>schtasks</value>
          <value>smb</value>
          <value>wmic</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>f94d223b1d99de41e25a87c63aee98bac978150710f1481abc5f25330ad66f1b</id>
    <title>Analysis Report for f94d223b1d99de41e25a87c63aee98bac978150710f1481abc5f25330ad66f1b</title>
    <updated>2026-04-13T03:27:20Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc62ba3040601e24ad5dcb</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc62985ea31bc68a249564</flow_id>
        <hash>f94d223b1d99de41e25a87c63aee98bac978150710f1481abc5f25330ad66f1b</hash>
        <iocs>
          <urls>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://hwnp.org/api/log</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>INPUT_FILE</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://hwnp.org/api/log</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://127.0.0.1/Admin</url>
              <origin>UNC_PATH</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>hwnp.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>hwnp.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>ransomware@onion.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>ransomware@onion.com</email>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>UNC_PATH</origin>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>1.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>44577b7d1c30056a17af85d37aa7bfac61a2835bd7af707a969849de9e504476</SHA-256>
              <SHA-1>a4fd1b0c2121dfdca66132b6728ea60459c1febc</SHA-1>
              <MD5>8346eebdf376771f93509c94551a6802</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f</SHA-256>
              <SHA-1>879dcf690e5bf1941b27cf13c8bcf72f8356c650</SHA-1>
              <MD5>a19a2658ba69030c6ac9d11fd7d7e3c1</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>72befb5732d1dfa586c1d7db6865fc5c3b0e473f7d58428be66080679b57211f</SHA-256>
              <SHA-1>4859b1ac452337cea2869293cc0e1f480272cba5</SHA-1>
              <MD5>499dc42ff233a04b8d9d70b5b80160fe</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>2869b5a19ae60442fac6930ee2512b5f1b6c5a8ce06b6648c022fbaacc4e7cd9</SHA-256>
              <SHA-1>855601618676fa7956b333abd984c60a2969c14c</SHA-1>
              <MD5>92d4bac12746a187a3a2bf8b33f518cb</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>8778d079e0c4f32d40666d8a1fbe68813a066b39fb9f2927ae8bf06199f7d65f</SHA-256>
              <SHA-1>432560dd67a8be4f600d9e88ddafc4bb28347b82</SHA-1>
              <MD5>6ed9c632febbdf8ffe6c3cd81e17852e</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\REvil</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings\shell\open\command</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <registry>Software\LockBit</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\WannaCry</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
          </registry>
        </iocs>
        <name>hwnp.org_2.exe</name>
        <report_id>48a5ba27-fbf3-4dab-8f9f-7e0d969bf67f</report_id>
        <tags>
          <value>peexe</value>
          <value>html</value>
          <value>dotnet_pe</value>
          <value>ransomware</value>
          <value>cryptear</value>
          <value>cryptolocker</value>
          <value>filecoder</value>
          <value>hiddentear</value>
          <value>lockfile</value>
          <value>unsafe</value>
          <value>anti-vm</value>
          <value>evasive</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>cmd</value>
          <value>reconnaissance</value>
          <value>wscript</value>
          <value>lolbin</value>
          <value>netsh</value>
          <value>runonce</value>
          <value>schtasks</value>
          <value>smb</value>
          <value>wmic</value>
          <value>obfuscated</value>
          <value>soft-404</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>3d20ecd21dd1f6cf77e89aab1a190738c3f902b4dd8a118e3aaa91a23adc3d4c</id>
    <title>Analysis Report for 3d20ecd21dd1f6cf77e89aab1a190738c3f902b4dd8a118e3aaa91a23adc3d4c</title>
    <updated>2026-04-13T03:26:41Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc629380678438b878acbf</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc62705ea31bc68a24951a</flow_id>
        <hash>3d20ecd21dd1f6cf77e89aab1a190738c3f902b4dd8a118e3aaa91a23adc3d4c</hash>
        <iocs>
          <urls>
            <value>
              <url>http://127.0.0.1/Admin</url>
              <origin>UNC_PATH</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://hwnp.org</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>INPUT_FILE</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://hwnp.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>hwnp.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>hwnp.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>ransomware@onion.com</email>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <email>ransomware@onion.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>UNC_PATH</origin>
            </value>
            <value>
              <ip>1.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.96.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.96.3</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>4e402a1d3fb0195088ee6cf76061fbaf19d6be9e76f6120fe560dd8a909ce82b</SHA-256>
              <SHA-1>5d9b14f2eee932716e9ea21803250e603bd5b021</SHA-1>
              <MD5>d0688ebcbf5ba5a35151dd33e555fe9f</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f</SHA-256>
              <SHA-1>879dcf690e5bf1941b27cf13c8bcf72f8356c650</SHA-1>
              <MD5>a19a2658ba69030c6ac9d11fd7d7e3c1</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>72befb5732d1dfa586c1d7db6865fc5c3b0e473f7d58428be66080679b57211f</SHA-256>
              <SHA-1>4859b1ac452337cea2869293cc0e1f480272cba5</SHA-1>
              <MD5>499dc42ff233a04b8d9d70b5b80160fe</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>f06901c89a7b17025a48fbdf12517105938a91e57efa9adbbe882b76216fb48c</SHA-256>
              <SHA-1>329baab25bb41b6ebaf6394c62beef5f6ce1e16e</SHA-1>
              <MD5>8821275d60f3d75a22a85e4a05ed3880</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\REvil</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings\shell\open\command</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <registry>Software\LockBit</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\WannaCry</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
          </registry>
        </iocs>
        <name>hwnp.org.exe</name>
        <report_id>02146256-0ec9-4c8c-b000-4c18044298ef</report_id>
        <tags>
          <value>peexe</value>
          <value>html</value>
          <value>dotnet_pe</value>
          <value>ransomware</value>
          <value>cryptear</value>
          <value>cryptolocker</value>
          <value>filecoder</value>
          <value>hiddentear</value>
          <value>lockfile</value>
          <value>unsafe</value>
          <value>anti-vm</value>
          <value>evasive</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>cmd</value>
          <value>masquerade</value>
          <value>reconnaissance</value>
          <value>wscript</value>
          <value>lolbin</value>
          <value>netsh</value>
          <value>runonce</value>
          <value>schtasks</value>
          <value>smb</value>
          <value>wmic</value>
          <value>obfuscated</value>
          <value>soft-404</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>54b0b819cd8fe1000bd7d07ba2bb5d05308343bbda028c30de3642159951e1e5</id>
    <title>Analysis Report for 54b0b819cd8fe1000bd7d07ba2bb5d05308343bbda028c30de3642159951e1e5</title>
    <updated>2026-04-13T03:26:32Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc626f80678438b878acb8</_id>
        <file_type>text/plain</file_type>
        <flow_id>69dc62653a506932d7c07513</flow_id>
        <hash>54b0b819cd8fe1000bd7d07ba2bb5d05308343bbda028c30de3642159951e1e5</hash>
        <iocs/>
        <name>user.scr</name>
        <report_id>88cf5fda-7d2b-4b66-8506-cd0927cf995c</report_id>
        <tags>
          <value>txt</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>f94d223b1d99de41e25a87c63aee98bac978150710f1481abc5f25330ad66f1b</id>
    <title>Analysis Report for f94d223b1d99de41e25a87c63aee98bac978150710f1481abc5f25330ad66f1b</title>
    <updated>2026-04-13T03:26:02Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc626d80678438b878acb6</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc6248d920e19044f9296a</flow_id>
        <hash>f94d223b1d99de41e25a87c63aee98bac978150710f1481abc5f25330ad66f1b</hash>
        <iocs>
          <urls>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://hwnp.org/api/log</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://hwnp.org/api/log</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>INPUT_FILE</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://127.0.0.1/Admin</url>
              <origin>UNC_PATH</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>hwnp.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>hwnp.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>ransomware@onion.com</email>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <email>ransomware@onion.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>1.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>UNC_PATH</origin>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.96.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.96.3</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>44577b7d1c30056a17af85d37aa7bfac61a2835bd7af707a969849de9e504476</SHA-256>
              <SHA-1>a4fd1b0c2121dfdca66132b6728ea60459c1febc</SHA-1>
              <MD5>8346eebdf376771f93509c94551a6802</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f</SHA-256>
              <SHA-1>879dcf690e5bf1941b27cf13c8bcf72f8356c650</SHA-1>
              <MD5>a19a2658ba69030c6ac9d11fd7d7e3c1</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>72befb5732d1dfa586c1d7db6865fc5c3b0e473f7d58428be66080679b57211f</SHA-256>
              <SHA-1>4859b1ac452337cea2869293cc0e1f480272cba5</SHA-1>
              <MD5>499dc42ff233a04b8d9d70b5b80160fe</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>b19adc215f37c78d5047e1f513b90af5ff46fbf7c5570f7f612cca8480da48e6</SHA-256>
              <SHA-1>5bf7da7c3c969b5f459e7d68543abcab6b94e37e</SHA-1>
              <MD5>fa298eae8be9ba55c98740e472040b01</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\REvil</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings\shell\open\command</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <registry>Software\LockBit</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\WannaCry</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </registry>
        </iocs>
        <name>hwnp.org_2.exe</name>
        <report_id>73aafbbe-c1ff-4bdc-aa52-c649db1ee4a5</report_id>
        <tags>
          <value>peexe</value>
          <value>html</value>
          <value>dotnet_pe</value>
          <value>ransomware</value>
          <value>cryptear</value>
          <value>cryptolocker</value>
          <value>filecoder</value>
          <value>hiddentear</value>
          <value>lockfile</value>
          <value>unsafe</value>
          <value>anti-vm</value>
          <value>evasive</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>cmd</value>
          <value>reconnaissance</value>
          <value>wscript</value>
          <value>lolbin</value>
          <value>netsh</value>
          <value>runonce</value>
          <value>schtasks</value>
          <value>smb</value>
          <value>wmic</value>
          <value>obfuscated</value>
          <value>soft-404</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>ccb7465023ca4f7bbba6c9cdf9860313cb8be98fa8eeedd1b214d095ea87f788</id>
    <title>Analysis Report for ccb7465023ca4f7bbba6c9cdf9860313cb8be98fa8eeedd1b214d095ea87f788</title>
    <updated>2026-04-13T03:25:36Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc623d80678438b878acac</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc622dd920e19044f92955</flow_id>
        <hash>ccb7465023ca4f7bbba6c9cdf9860313cb8be98fa8eeedd1b214d095ea87f788</hash>
        <iocs>
          <urls>
            <value>
              <url>https://api.junkie-development.de/api/v1/luascripts/public/d91a6b0a9f4bf73de91a7fb568911b9c289c84a16b72b616c3b6c9b628bccc5b/download</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>api.junkie-development.de</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>188.114.96.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.96.3</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
        </iocs>
        <name>sniper_duels__silent_aim__trigger_bot__visuals.txt</name>
        <report_id>a6a28f47-0717-4b04-8bb8-5310e2342618</report_id>
        <tags>
          <value>javascript</value>
          <value>repaired</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>3d20ecd21dd1f6cf77e89aab1a190738c3f902b4dd8a118e3aaa91a23adc3d4c</id>
    <title>Analysis Report for 3d20ecd21dd1f6cf77e89aab1a190738c3f902b4dd8a118e3aaa91a23adc3d4c</title>
    <updated>2026-04-13T03:25:05Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc623080678438b878aca8</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc6210d920e19044f92927</flow_id>
        <hash>3d20ecd21dd1f6cf77e89aab1a190738c3f902b4dd8a118e3aaa91a23adc3d4c</hash>
        <iocs>
          <urls>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://hwnp.org</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://85.17.56.34/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://94.102.61.78/</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://hwnp.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://malware.wicar.org/data/ms09_002_memory_corruption.html</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.zeltser.com/misc/malware-test-file.txt</url>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://127.0.0.1/Admin</url>
              <origin>UNC_PATH</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>hwnp.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>hwnp.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>malware.wicar.org</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <url>zeltser.com</url>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>ransomware@onion.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>ransomware@onion.com</email>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>188.114.96.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>UNC_PATH</origin>
            </value>
            <value>
              <ip>1.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <ip>85.17.56.34</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>94.102.61.78</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.96.3</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>208.94.116.246</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>188.114.97.3</ip>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>4e402a1d3fb0195088ee6cf76061fbaf19d6be9e76f6120fe560dd8a909ce82b</SHA-256>
              <SHA-1>5d9b14f2eee932716e9ea21803250e603bd5b021</SHA-1>
              <MD5>d0688ebcbf5ba5a35151dd33e555fe9f</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f</SHA-256>
              <SHA-1>879dcf690e5bf1941b27cf13c8bcf72f8356c650</SHA-1>
              <MD5>a19a2658ba69030c6ac9d11fd7d7e3c1</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>72befb5732d1dfa586c1d7db6865fc5c3b0e473f7d58428be66080679b57211f</SHA-256>
              <SHA-1>4859b1ac452337cea2869293cc0e1f480272cba5</SHA-1>
              <MD5>499dc42ff233a04b8d9d70b5b80160fe</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>5c9e85ac15acd1586c6a87b546d08cd7598772e4a2a35b0e5731f9bf9f017b49</SHA-256>
              <SHA-1>d5163fa015decda02ce2cf5397bfbb66229db4b9</SHA-1>
              <MD5>cf2e7a999a66b214d5c44538b9852d53</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\REvil</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings\shell\open\command</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <registry>Software\LockBit</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\WannaCry</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore</registry>
              <origin>INPUT_FILE</origin>
              <verdict>LIKELY_MALICIOUS</verdict>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>SYSTEM\CurrentControlSet\Control\SafeBoot</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Classes\ms-settings</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\Policies\System</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\Microsoft\Windows\CurrentVersion\RunOnce</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </registry>
        </iocs>
        <name>hwnp.org.exe</name>
        <report_id>f44618e2-4d9f-48ff-bec9-03d7c15b4521</report_id>
        <tags>
          <value>peexe</value>
          <value>html</value>
          <value>dotnet_pe</value>
          <value>ransomware</value>
          <value>cryptear</value>
          <value>cryptolocker</value>
          <value>filecoder</value>
          <value>hiddentear</value>
          <value>lockfile</value>
          <value>unsafe</value>
          <value>anti-vm</value>
          <value>evasive</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>cmd</value>
          <value>masquerade</value>
          <value>reconnaissance</value>
          <value>wscript</value>
          <value>lolbin</value>
          <value>netsh</value>
          <value>runonce</value>
          <value>schtasks</value>
          <value>smb</value>
          <value>wmic</value>
          <value>obfuscated</value>
          <value>soft-404</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>98dd40746bde5dfff1a7100749624e1d22503f9207ca2349b4cce1b1d8c99aaf</id>
    <title>Analysis Report for 98dd40746bde5dfff1a7100749624e1d22503f9207ca2349b4cce1b1d8c99aaf</title>
    <updated>2026-04-13T03:25:01Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6221f9522792fdaf8005</_id>
        <file_type>application/x-powershell</file_type>
        <flow_id>69dc61fe799d5bf325fa6123</flow_id>
        <hash>98dd40746bde5dfff1a7100749624e1d22503f9207ca2349b4cce1b1d8c99aaf</hash>
        <iocs/>
        <name>cc6361d120f1bd76b129dd827724e54f</name>
        <report_id>1bf66d4b-8e37-42f9-a1a4-431bcb682abe</report_id>
        <tags>
          <value>powershell</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>e67b382426a32484e416685359d551fc953c1c41171393945eb4facec7340860</id>
    <title>Analysis Report for e67b382426a32484e416685359d551fc953c1c41171393945eb4facec7340860</title>
    <updated>2026-04-13T03:25:01Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6220f9522792fdaf8004</_id>
        <file_type>application/x-powershell</file_type>
        <flow_id>69dc61fd5ea31bc68a2493df</flow_id>
        <hash>e67b382426a32484e416685359d551fc953c1c41171393945eb4facec7340860</hash>
        <iocs>
          <urls>
            <value>
              <url>https://i.imgur.com/8ywQ2xz.jpeg</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>i.imgur.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
        </iocs>
        <name>9be3a08bef60c94784b70c5ca427a08d</name>
        <report_id>ee963dcd-c00d-4196-a4e9-18d85379f53d</report_id>
        <tags>
          <value>powershell</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>5317073a8e911eaa0201291730aea02ffe9759812ae590eaffff573524dc90e0</id>
    <title>Analysis Report for 5317073a8e911eaa0201291730aea02ffe9759812ae590eaffff573524dc90e0</title>
    <updated>2026-04-13T03:24:52Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6229f9522792fdaf8008</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc61f3c33dc5a985d7985f</flow_id>
        <hash>5317073a8e911eaa0201291730aea02ffe9759812ae590eaffff573524dc90e0</hash>
        <iocs>
          <urls>
            <value>
              <url>https://instagram.com/hosseinabaspanahoriginal</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://patch.chelpus.com/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.luckypatchers.com/download/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>instagram.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>luckypatchers.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>patch.chelpus.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>alyaksandr.koshal@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>lp.chelpus@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot-core-oj.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@core.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@framework.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@services.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>nSaNX@forpda.ru</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>pkg.apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>APK_DECODING</origin>
            </value>
          </ips>
        </iocs>
        <name>1996c6ff111606bd29009eb1c0b00e62</name>
        <report_id>4da7165c-fef6-4878-8afe-ca30c979b11b</report_id>
        <tags>
          <value>apk</value>
          <value>invalid-signature</value>
          <value>fingerprint</value>
          <value>persistence</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>3a216e5a180bb536a981868b58dddca5ca2ef185ef33bc75d6e96e430964927b</id>
    <title>Analysis Report for 3a216e5a180bb536a981868b58dddca5ca2ef185ef33bc75d6e96e430964927b</title>
    <updated>2026-04-13T03:24:51Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6213f9522792fdaf7ffc</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc61f2799d5bf325fa610b</flow_id>
        <hash>3a216e5a180bb536a981868b58dddca5ca2ef185ef33bc75d6e96e430964927b</hash>
        <iocs/>
        <name>5a1a0de8fcc961a59eb0876b493e12fa</name>
        <report_id>b48360aa-51a2-4446-a511-2ae472d4a491</report_id>
        <tags>
          <value>javascript</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>049855cf5cf03dc576687b38e817f3a6b854f025bc3ce774144f53a0db2b4587</id>
    <title>Analysis Report for 049855cf5cf03dc576687b38e817f3a6b854f025bc3ce774144f53a0db2b4587</title>
    <updated>2026-04-13T03:24:47Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc620680678438b878ac9e</_id>
        <file_type>text/plain</file_type>
        <flow_id>69dc61fcd920e19044f9290f</flow_id>
        <hash>049855cf5cf03dc576687b38e817f3a6b854f025bc3ce774144f53a0db2b4587</hash>
        <iocs>
          <emails>
            <value>
              <email>thibiasfast_@hotmail.com</email>
              <origin>CONTENT_PARSE</origin>
            </value>
            <value>
              <email>thobias.fast@gmail.com</email>
              <origin>CONTENT_PARSE</origin>
            </value>
            <value>
              <email>thibiasfast_@hotmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>thobias.fast@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
        </iocs>
        <name>titles.txt</name>
        <report_id>320a1371-b65c-45ba-8823-aea59e1c9c5c</report_id>
        <tags>
          <value>txt</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>cb3cf23e7122b71013e8785d4977aad82ee48e2c85b083156efa255767747f47</id>
    <title>Analysis Report for cb3cf23e7122b71013e8785d4977aad82ee48e2c85b083156efa255767747f47</title>
    <updated>2026-04-13T03:24:46Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc620ff9522792fdaf7ff8</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc61eb5ea31bc68a2493b8</flow_id>
        <hash>cb3cf23e7122b71013e8785d4977aad82ee48e2c85b083156efa255767747f47</hash>
        <iocs/>
        <name>47d8573dd24b52ad2312339833b3ef13</name>
        <report_id>2e76d17b-e5f2-43d4-b822-37c37c3aeb93</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>a82ac470f726c7f5dec4b28e4abdd4314b3b12446a583e391b43d0534a263fa0</id>
    <title>Analysis Report for a82ac470f726c7f5dec4b28e4abdd4314b3b12446a583e391b43d0534a263fa0</title>
    <updated>2026-04-13T03:24:46Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc621ef9522792fdaf8003</_id>
        <file_type>text/x-vbscript</file_type>
        <flow_id>69dc61f0d920e19044f928fc</flow_id>
        <hash>a82ac470f726c7f5dec4b28e4abdd4314b3b12446a583e391b43d0534a263fa0</hash>
        <iocs>
          <urls>
            <value>
              <url>http://www.youtube.com/t3chyy</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>youtube.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <registry>
            <value>
              <registry>HKLM\Software\Microsoft\Windows\CurrentVersion\Run\AVPCC</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>HKLM\Software\Microsoft\Windows\CurrentVersion\Run\NAVW32</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>HKLM\Software\Microsoft\Windows\CurrentVersion\Run\SystemTray</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>HKLM\Software\Microsoft\Windows\CurrentVersion\Run\TrueVector</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>HKLM\Software\Microsoft\Windows\CurrentVersion\Run\ZoneAlarm Pro</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </registry>
        </iocs>
        <name>ac066a8eb6e8252b571c6283032173fd</name>
        <report_id>31fd3aac-59fa-460a-8f95-bc67185c9e68</report_id>
        <tags>
          <value>vbs</value>
          <value>anti-vm</value>
          <value>fingerprint</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>b2bb2ad16b9d6b37dd1d2ca1770e509fa6b7286b328f85ef46a418746b2592c6</id>
    <title>Analysis Report for b2bb2ad16b9d6b37dd1d2ca1770e509fa6b7286b328f85ef46a418746b2592c6</title>
    <updated>2026-04-13T03:24:46Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc620ef9522792fdaf7ff6</_id>
        <file_type>text/x-msdos-batch</file_type>
        <flow_id>69dc61f05ea31bc68a2493cb</flow_id>
        <hash>b2bb2ad16b9d6b37dd1d2ca1770e509fa6b7286b328f85ef46a418746b2592c6</hash>
        <iocs/>
        <name>46a0c19e253ae93194b49f963f8263c7</name>
        <report_id>9018153e-53ec-41bb-99b9-e98dca697dd8</report_id>
        <tags>
          <value>bat</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>052fb757916828fd217ad82a3b8f5d36ce5a4d5447ac06a61389335c71569cdc</id>
    <title>Analysis Report for 052fb757916828fd217ad82a3b8f5d36ce5a4d5447ac06a61389335c71569cdc</title>
    <updated>2026-04-13T03:24:39Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6223f9522792fdaf8006</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc61e89124ebc0875086de</flow_id>
        <hash>052fb757916828fd217ad82a3b8f5d36ce5a4d5447ac06a61389335c71569cdc</hash>
        <iocs>
          <urls>
            <value>
              <url>http://www.slf4j.org/codes.html#null_MDCA</url>
              <origin>APK_DECODING</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://xmlpull.org/v1/doc/properties.html#xmldecl-version</url>
              <origin>APK_DECODING</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://developer.android.com/guide/appendix/media-formats.html</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://schemas.xmlsoap.org/soap/encoding</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://schemas.xmlsoap.org/soap/envelope</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://twitter.com/oauth_clients/new</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://www.twitter.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://goo.gle/compose-feedback</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>slf4j.org</url>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <url>xmlpull.org</url>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <url>developer.android.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>goo.gle</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>schemas.xmlsoap.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>twitter.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </domains>
          <emails>
            <value>
              <email>apps@toot.fedilab.app</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>1.3.101.112</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>INPUT_FILE</origin>
            </value>
          </ips>
        </iocs>
        <name>195c22e5e0be409c736a4fbb8fa7a4a6</name>
        <report_id>4330c73a-79c3-4795-b8f9-7fbf8c1349cd</report_id>
        <tags>
          <value>apk</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>b84758a943f6e748e219da654defc0554966aee15571a83cc6c119a219e8d79c</id>
    <title>Analysis Report for b84758a943f6e748e219da654defc0554966aee15571a83cc6c119a219e8d79c</title>
    <updated>2026-04-13T03:24:39Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6206f9522792fdaf7ff1</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc61e89124ebc0875086e1</flow_id>
        <hash>b84758a943f6e748e219da654defc0554966aee15571a83cc6c119a219e8d79c</hash>
        <iocs/>
        <name>7dae094b7da67937aa219c8754678ece</name>
        <report_id>91f15dd9-9909-4caa-a742-7a66435ed04c</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>efe5b2ead68f63e11de2afeac5746c241bcefe2936fb6c97bcd142e38c2f3f06</id>
    <title>Analysis Report for efe5b2ead68f63e11de2afeac5746c241bcefe2936fb6c97bcd142e38c2f3f06</title>
    <updated>2026-04-13T03:24:30Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc61fef9522792fdaf7fed</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc61e0c33dc5a985d79857</flow_id>
        <hash>efe5b2ead68f63e11de2afeac5746c241bcefe2936fb6c97bcd142e38c2f3f06</hash>
        <iocs/>
        <name>faf3ed8ac0a9adf3b4d7cfeceb714391</name>
        <report_id>0b919bad-ff2e-4661-8856-a257eae4a120</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>43aa7fc14979838fc6d6487cf33ccbbc932dc881bbcc10f70ef306d5ca625007</id>
    <title>Analysis Report for 43aa7fc14979838fc6d6487cf33ccbbc932dc881bbcc10f70ef306d5ca625007</title>
    <updated>2026-04-13T03:24:24Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6217f9522792fdaf7ffd</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc61d5c33dc5a985d7983f</flow_id>
        <hash>43aa7fc14979838fc6d6487cf33ccbbc932dc881bbcc10f70ef306d5ca625007</hash>
        <iocs>
          <urls>
            <value>
              <url>https://developer.android.com/guide/topics/media/issues/cleartext-not-permitted</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://developers.google.com/admob/android/test-ads#enable_test_devices</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://goo.gl/J1sWQy</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://googlemobileadssdk.page.link/ad-manager-android-update-manifest.</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://googlemobileadssdk.page.link/admob-android-update-manifest</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>developer.android.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>developers.google.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>goo.gl</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>googlemobileadssdk.page.link</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>android@android.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>android@android.com0</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
        </iocs>
        <name>192e1a1e45063b9d61b1dac74bc8cfc3</name>
        <report_id>6adda07d-384c-451c-89c4-d545f670e939</report_id>
        <tags>
          <value>apk</value>
          <value>mobidash</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
          <value>tracker</value>
          <value>persistence</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>fingerprint</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>f850ba895cb0232ccf4f81a077b2da662daee0a3b95d08b93c10b39847f71a66</id>
    <title>Analysis Report for f850ba895cb0232ccf4f81a077b2da662daee0a3b95d08b93c10b39847f71a66</title>
    <updated>2026-04-13T03:24:18Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc61f3f9522792fdaf7fe8</_id>
        <file_type>application/x-powershell</file_type>
        <flow_id>69dc61d3c33dc5a985d7983a</flow_id>
        <hash>f850ba895cb0232ccf4f81a077b2da662daee0a3b95d08b93c10b39847f71a66</hash>
        <iocs/>
        <name>91289b5b89326ca765ba8cea1567a586</name>
        <report_id>f009aca2-8b6d-4531-87a3-b17577c0709e</report_id>
        <tags>
          <value>powershell</value>
          <value>unsafe</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>c456a2a4cd6717ea33e5798d6e439226fdcf4b6975ef9f0ec798aaec48ab30dc</id>
    <title>Analysis Report for c456a2a4cd6717ea33e5798d6e439226fdcf4b6975ef9f0ec798aaec48ab30dc</title>
    <updated>2026-04-13T03:24:18Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc61f2f9522792fdaf7fe7</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc61d1799d5bf325fa60b3</flow_id>
        <hash>c456a2a4cd6717ea33e5798d6e439226fdcf4b6975ef9f0ec798aaec48ab30dc</hash>
        <iocs/>
        <name>9bd0a78c3930ae47fefbe084bdf4ff0b</name>
        <report_id>3879ccad-f4a4-4009-8fa0-7cd725336470</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>6cc495b10fb230d526075802cf4b1de2d08809184d0928297ecc2401c5cb66ab</id>
    <title>Analysis Report for 6cc495b10fb230d526075802cf4b1de2d08809184d0928297ecc2401c5cb66ab</title>
    <updated>2026-04-13T03:24:00Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc61f5f9522792fdaf7fe9</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc61c09124ebc0875086a5</flow_id>
        <hash>6cc495b10fb230d526075802cf4b1de2d08809184d0928297ecc2401c5cb66ab</hash>
        <iocs>
          <urls>
            <value>
              <url>http://ns.adobe.com/xap/1.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://ns.adobe.com/xap/1.0/mm</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://ns.adobe.com/xap/1.0/sType/ResourceRef</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://github.com/vinc3m1</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://github.com/vinc3m1/RoundedImageView</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>github.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>ns.adobe.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
        </iocs>
        <name>190b40340783fa747b26a9ab3c5e0e4e</name>
        <report_id>6fee00cf-5578-4988-8209-875ae03e4bb7</report_id>
        <tags>
          <value>apk</value>
          <value>android</value>
          <value>triada</value>
          <value>fingerprint</value>
          <value>persistence</value>
          <value>evasive</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
          <value>icrypt</value>
          <value>ijiami</value>
          <value>obfuscated</value>
          <value>packed</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>935fdba176629ebd895ac234a17397ceabff1caae439667599663b9c0841d50f</id>
    <title>Analysis Report for 935fdba176629ebd895ac234a17397ceabff1caae439667599663b9c0841d50f</title>
    <updated>2026-04-13T03:23:59Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc61e1f9522792fdaf7fe0</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc61bd799d5bf325fa6082</flow_id>
        <hash>935fdba176629ebd895ac234a17397ceabff1caae439667599663b9c0841d50f</hash>
        <iocs/>
        <name>b1214709f4836f3aa683b5b2b7286e39</name>
        <report_id>c53182c2-f352-43c1-89f3-24a4761c12ad</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>f3334dd9d538f5a4308f027203264d440d27056bb1193d7cb533bd6a257af0ea</id>
    <title>Analysis Report for f3334dd9d538f5a4308f027203264d440d27056bb1193d7cb533bd6a257af0ea</title>
    <updated>2026-04-13T03:23:59Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc61e0f9522792fdaf7fdf</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc61c23a506932d7c074d2</flow_id>
        <hash>f3334dd9d538f5a4308f027203264d440d27056bb1193d7cb533bd6a257af0ea</hash>
        <iocs/>
        <name>c085c297b54f4e6ffbde2faa53db3af5</name>
        <report_id>eecfd709-7fc4-40cb-b0b2-fa48bbbb67ef</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>ab6eaed8176195f0570cd58ef4daf6d182bec05eaf5831a72e2d5025e1dd36a0</id>
    <title>Analysis Report for ab6eaed8176195f0570cd58ef4daf6d182bec05eaf5831a72e2d5025e1dd36a0</title>
    <updated>2026-04-13T03:23:53Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc61d9f9522792fdaf7fda</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc61b95ea31bc68a2492f9</flow_id>
        <hash>ab6eaed8176195f0570cd58ef4daf6d182bec05eaf5831a72e2d5025e1dd36a0</hash>
        <iocs/>
        <name>08b84926569f09dbe0a3ab873f2140cd</name>
        <report_id>9ad60bff-d912-4049-bb02-df484eb7ea3c</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>793a14ee26a31b9c399d9f1647b19d03b99e68717731a9c3825ea5855ccf3f52</id>
    <title>Analysis Report for 793a14ee26a31b9c399d9f1647b19d03b99e68717731a9c3825ea5855ccf3f52</title>
    <updated>2026-04-13T03:23:49Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc61d4f9522792fdaf7fd8</_id>
        <file_type>application/x-powershell</file_type>
        <flow_id>69dc61b05ea31bc68a2492dd</flow_id>
        <hash>793a14ee26a31b9c399d9f1647b19d03b99e68717731a9c3825ea5855ccf3f52</hash>
        <iocs>
          <ips>
            <value>
              <ip>192.168.1.10</ip>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </ips>
        </iocs>
        <name>58fedd974bcd2f81e61833dbf50ef728</name>
        <report_id>a26b4940-f9a1-4800-a472-3978c27f81ad</report_id>
        <tags>
          <value>powershell</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>c9408a25b88ba252d458d9c88448c58bec682fd60c38f0310462cbbd771be559</id>
    <title>Analysis Report for c9408a25b88ba252d458d9c88448c58bec682fd60c38f0310462cbbd771be559</title>
    <updated>2026-04-13T03:23:42Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc61cff9522792fdaf7fd5</_id>
        <file_type>text/x-vbscript</file_type>
        <flow_id>69dc61ae5ea31bc68a2492cd</flow_id>
        <hash>c9408a25b88ba252d458d9c88448c58bec682fd60c38f0310462cbbd771be559</hash>
        <iocs/>
        <name>682b7484a433ead9be30e80ef5ccea6d</name>
        <report_id>a5497257-d312-4ad0-99d4-6a20416cf475</report_id>
        <tags>
          <value>vbs</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>d1b6b6735a46a7e5635bd21f50c826c22ed2d2d9a3f9806049e7d7e2ddf56960</id>
    <title>Analysis Report for d1b6b6735a46a7e5635bd21f50c826c22ed2d2d9a3f9806049e7d7e2ddf56960</title>
    <updated>2026-04-13T03:23:31Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc61c4f9522792fdaf7fd2</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc61a55ea31bc68a24929d</flow_id>
        <hash>d1b6b6735a46a7e5635bd21f50c826c22ed2d2d9a3f9806049e7d7e2ddf56960</hash>
        <iocs/>
        <name>7ad6278478367f9234e415add8e8e330</name>
        <report_id>b9ee4748-2c92-4af8-be34-58871f372bc8</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>b95ed4eef22eb90461b9ce0461bbcb99fed78ab903c5b1b8ec3de9e61634dc22</id>
    <title>Analysis Report for b95ed4eef22eb90461b9ce0461bbcb99fed78ab903c5b1b8ec3de9e61634dc22</title>
    <updated>2026-04-13T03:23:31Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc61c3f9522792fdaf7fd1</_id>
        <file_type>text/plain</file_type>
        <flow_id>69dc61a45ea31bc68a249297</flow_id>
        <hash>b95ed4eef22eb90461b9ce0461bbcb99fed78ab903c5b1b8ec3de9e61634dc22</hash>
        <iocs/>
        <name>066d9382b4e9d145e91d029b9b392f59</name>
        <report_id>b78ad4b3-e313-46ad-9174-d0bb12d0b042</report_id>
        <tags>
          <value>txt</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>4ce34b0a807f502f0b7e082425c0268ab413840d616f2427432845a7bea92f00</id>
    <title>Analysis Report for 4ce34b0a807f502f0b7e082425c0268ab413840d616f2427432845a7bea92f00</title>
    <updated>2026-04-13T03:23:23Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc61baf9522792fdaf7fca</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc619ad920e19044f92858</flow_id>
        <hash>4ce34b0a807f502f0b7e082425c0268ab413840d616f2427432845a7bea92f00</hash>
        <iocs/>
        <name>23e2ca1d68ffcc233726957c6540f8a9</name>
        <report_id>dbf17f62-f3da-46d5-a053-311bfeda1def</report_id>
        <tags>
          <value>javascript</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>2059c6398fdfd8e983292117707ec8606c2cd155c156ee068331607d78ec4fc4</id>
    <title>Analysis Report for 2059c6398fdfd8e983292117707ec8606c2cd155c156ee068331607d78ec4fc4</title>
    <updated>2026-04-13T03:23:10Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc61b1f9522792fdaf7fc7</_id>
        <file_type>application/x-powershell</file_type>
        <flow_id>69dc6191799d5bf325fa6015</flow_id>
        <hash>2059c6398fdfd8e983292117707ec8606c2cd155c156ee068331607d78ec4fc4</hash>
        <iocs>
          <urls>
            <value>
              <url>https://1.1.1.1/dns-query</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://get.activated.win</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>get.activated.win</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>1.1.1.1</ip>
              <origin>INPUT_FILE</origin>
            </value>
          </ips>
        </iocs>
        <name>764e42991a78d2501ec76fd4019564f9</name>
        <report_id>947dc9a6-a91d-4e78-ae46-e27a32108eb5</report_id>
        <tags>
          <value>powershell</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>1b40912854ef78e170ad2e9dda484d97b8ada27870c4b34994ca5bfd1c0c6cd9</id>
    <title>Analysis Report for 1b40912854ef78e170ad2e9dda484d97b8ada27870c4b34994ca5bfd1c0c6cd9</title>
    <updated>2026-04-13T03:23:10Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc61aef9522792fdaf7fc4</_id>
        <file_type>text/x-msdos-batch</file_type>
        <flow_id>69dc6191d920e19044f92846</flow_id>
        <hash>1b40912854ef78e170ad2e9dda484d97b8ada27870c4b34994ca5bfd1c0c6cd9</hash>
        <iocs/>
        <name>f8879918c29ed2cfed4a54bf06454ad6</name>
        <report_id>82525124-67b3-4e0b-8c82-a9c58d13f9c8</report_id>
        <tags>
          <value>bat</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>031b498372e670ce57af05b7d06c551dd74ef088a79a3f31833fc0cfa895f509</id>
    <title>Analysis Report for 031b498372e670ce57af05b7d06c551dd74ef088a79a3f31833fc0cfa895f509</title>
    <updated>2026-04-13T03:23:04Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc61a8f9522792fdaf7fbe</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc6187799d5bf325fa5ff9</flow_id>
        <hash>031b498372e670ce57af05b7d06c551dd74ef088a79a3f31833fc0cfa895f509</hash>
        <iocs/>
        <name>bdb9d49d0eef3c8f728cba6911cc6317</name>
        <report_id>ae0ef80e-72ea-4274-a13a-87048225b978</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>1f23dbb73f96fd8ce80543d607ffb7f2aabbcdcb5924973c21f2bd2fb9e1188e</id>
    <title>Analysis Report for 1f23dbb73f96fd8ce80543d607ffb7f2aabbcdcb5924973c21f2bd2fb9e1188e</title>
    <updated>2026-04-13T03:22:58Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc61a0f9522792fdaf7fba</_id>
        <file_type>application/x-powershell</file_type>
        <flow_id>69dc6184799d5bf325fa5ff6</flow_id>
        <hash>1f23dbb73f96fd8ce80543d607ffb7f2aabbcdcb5924973c21f2bd2fb9e1188e</hash>
        <iocs>
          <urls>
            <value>
              <url>http://127.0.0.1:8082/service.enc</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>INPUT_FILE</origin>
            </value>
          </ips>
        </iocs>
        <name>bbd53d1069f07cff8e0623c4b3066831</name>
        <report_id>a4b9e5bb-4dfe-418b-ae22-0ddf936d5b27</report_id>
        <tags>
          <value>powershell</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>bcf42c36ea9c60b32a730ebacfb4d5cf7a785c6ddb8c3fc08458a2a4ba703b3e</id>
    <title>Analysis Report for bcf42c36ea9c60b32a730ebacfb4d5cf7a785c6ddb8c3fc08458a2a4ba703b3e</title>
    <updated>2026-04-13T03:22:51Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc61a9f9522792fdaf7fbf</_id>
        <file_type>text/x-vbscript</file_type>
        <flow_id>69dc61779124ebc08750864a</flow_id>
        <hash>bcf42c36ea9c60b32a730ebacfb4d5cf7a785c6ddb8c3fc08458a2a4ba703b3e</hash>
        <iocs/>
        <name>96bc5b920f85c97fda0140895236cbc9</name>
        <report_id>71563e3e-11b4-432b-a9a1-e5028a49bc17</report_id>
        <tags>
          <value>vbs</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>ee6fc91557431998d4c39f4f8b52f63c4d815a2a6852caee06ea684c315f3459</id>
    <title>Analysis Report for ee6fc91557431998d4c39f4f8b52f63c4d815a2a6852caee06ea684c315f3459</title>
    <updated>2026-04-13T03:22:51Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc619bf9522792fdaf7fb7</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc61775ea31bc68a249236</flow_id>
        <hash>ee6fc91557431998d4c39f4f8b52f63c4d815a2a6852caee06ea684c315f3459</hash>
        <iocs/>
        <name>82a0aca934eb617862510492d1b8e6fe</name>
        <report_id>333d1e1a-2b51-4b4d-8c33-8ec727ddd6d7</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>e3a2ad60760b6aad791a9ecb333e7f6c03d6f77920715c20c3e9d84a6bf8a127</id>
    <title>Analysis Report for e3a2ad60760b6aad791a9ecb333e7f6c03d6f77920715c20c3e9d84a6bf8a127</title>
    <updated>2026-04-13T03:22:49Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc619e3040601e24ad5d98</_id>
        <file_type>application/x-dosexec</file_type>
        <flow_id>69dc61865ea31bc68a249261</flow_id>
        <hash>e3a2ad60760b6aad791a9ecb333e7f6c03d6f77920715c20c3e9d84a6bf8a127</hash>
        <iocs>
          <ips>
            <value>
              <ip>1.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>0af5f402d0b26ab544614614985a913bd0a36096daf85af7e29d4acc143ad7b2</SHA-256>
              <SHA-1>2725c61b5bcbb07270522c5c76337fd13ce7d1ec</SHA-1>
              <MD5>498745d88d7d011477735cf2c59d584d</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>3f921d65d0ba465f97f4d44efb8a13ebb76f8df0dde7d69b42f78a9e8318b239</SHA-256>
              <SHA-1>3318c5cac272603074afea437f074fd6cefcef6a</SHA-1>
              <MD5>3ecf6a0cb6b6734b55a5d50a5ec9526d</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload; format=pe32</file_type>
            </value>
            <value>
              <SHA-256>5d4178cf1a6395612176b1e59ad7695eb3f20b6e6d883dc944ef90050dfe8f47</SHA-256>
              <SHA-1>f311210544859bcbd991463872ade18d4751be59</SHA-1>
              <MD5>671b9ad23b1ccbbd14292aa586afe8eb</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>6f88bc7cb02ccb2dbc26b5f4ce53e355b331e31bb920b2ba8cbbcd1b5d4cd5a0</SHA-256>
              <SHA-1>dc9804dd3aa348fb0c05f53c53c698518af514a0</SHA-1>
              <MD5>9ce8c70178061cc4cf4a6bb1e291df93</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>99b34120f6f6f5f7f54d08837cc0be9b8d6a93afd3d478e43128ea8bcccadc50</SHA-256>
              <SHA-1>e99d086235a1bb1a93f0eb534b0b9c449ef6ef05</SHA-1>
              <MD5>08e1cdebb5ff5922837711ff7792bf1d</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>b5fae454eae83931e8508b3c158b122f7100b65d70065e8af2aaeddb639a5c40</SHA-256>
              <SHA-1>f51d2ad16dc79373001160a2b5e7a2f861f60d5c</SHA-1>
              <MD5>0d62df6f0138e145185b2c1c45bf72bc</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f</SHA-256>
              <SHA-1>879dcf690e5bf1941b27cf13c8bcf72f8356c650</SHA-1>
              <MD5>a19a2658ba69030c6ac9d11fd7d7e3c1</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>c49db3fb9a74c55628b2cf900ca305ede59e01d6332a000d23d0b44be9be06bf</SHA-256>
              <SHA-1>bbe465451083ea2dba8ac4bdf7bcce1e38df3c8c</SHA-1>
              <MD5>ad4e7a7a96e8a94df215a45a172ce7cb</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
          </files>
          <uuids>
            <value>
              <uuid>3fe8fa79-5dce-4503-ab23-464ea24babff</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>DOTNET_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <registry>Software\</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
            <value>
              <registry>SOFTWARE\Microsoft\Windows\CurrentVersion\Run</registry>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </registry>
        </iocs>
        <name>xe3a2ad60760b6aad791a9ecb333e7f6c03d6f77920715c20c3e9d84a6bf8a127.exe</name>
        <report_id>525926e6-485c-4bb3-9f82-f5fd1541f41e</report_id>
        <tags>
          <value>peexe</value>
          <value>xworm</value>
          <value>njrat</value>
          <value>unsafe</value>
          <value>virus</value>
          <value>anti-vm</value>
          <value>fingerprint</value>
          <value>obfuscated</value>
          <value>overlay</value>
          <value>base64</value>
          <value>reconnaissance</value>
          <value>anti-debug</value>
          <value>microsoft_visual_cc</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>ddce7d9c3af0672266b52eb960f13859433f12eebd7c350d0af7bed03ece8403</id>
    <title>Analysis Report for ddce7d9c3af0672266b52eb960f13859433f12eebd7c350d0af7bed03ece8403</title>
    <updated>2026-04-13T03:22:46Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc61bdf9522792fdaf7fcc</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc6172799d5bf325fa5fbd</flow_id>
        <hash>ddce7d9c3af0672266b52eb960f13859433f12eebd7c350d0af7bed03ece8403</hash>
        <iocs>
          <urls>
            <value>
              <url>https://instagram.com/hosseinabaspanahoriginal</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://patch.chelpus.com/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.luckypatchers.com/download/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>instagram.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>luckypatchers.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>patch.chelpus.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot-core-oj.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@core.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@framework.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@services.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>nSaNX@forpda.ru</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>pkg.apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>alyaksandr.koshal@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>lp.chelpus@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>APK_DECODING</origin>
            </value>
          </ips>
        </iocs>
        <name>17ed35774bd7f1b672a15fe9c74b0bad</name>
        <report_id>abc2f287-bb56-4a4f-a1a7-08781ae31c59</report_id>
        <tags>
          <value>apk</value>
          <value>invalid-signature</value>
          <value>fingerprint</value>
          <value>persistence</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>8e424137405a1cdc92f7e020928c0c3e46ab2ee1b494e76f294e0bf81630eb5d</id>
    <title>Analysis Report for 8e424137405a1cdc92f7e020928c0c3e46ab2ee1b494e76f294e0bf81630eb5d</title>
    <updated>2026-04-13T03:22:43Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc618a3040601e24ad5d93</_id>
        <file_type>text/x-config</file_type>
        <flow_id>69dc6180c33dc5a985d797e9</flow_id>
        <hash>8e424137405a1cdc92f7e020928c0c3e46ab2ee1b494e76f294e0bf81630eb5d</hash>
        <iocs/>
        <name>skillopfor.cfg</name>
        <report_id>7d6e41b1-42ec-4848-9252-400995bcc20b</report_id>
        <tags>
          <value>txt</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>8e3d5d3b7d943f5be0bad31f454c1cb2c0019f457facc4310ac8ee7253670084</id>
    <title>Analysis Report for 8e3d5d3b7d943f5be0bad31f454c1cb2c0019f457facc4310ac8ee7253670084</title>
    <updated>2026-04-13T03:22:36Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc619cf9522792fdaf7fb8</_id>
        <file_type>text/x-vbscript</file_type>
        <flow_id>69dc616c9124ebc087508634</flow_id>
        <hash>8e3d5d3b7d943f5be0bad31f454c1cb2c0019f457facc4310ac8ee7253670084</hash>
        <iocs>
          <ips>
            <value>
              <ip>192.168.43.131</ip>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </ips>
        </iocs>
        <name>d1ffc19402488491d90f375a9bce7cd6</name>
        <report_id>e6940d99-330f-4a23-a0fb-5113089a85af</report_id>
        <tags>
          <value>vbs</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>0a2c7296a870d358628b025fbfd3226ab20b83a2f79512c8cb1e33e1059f7a13</id>
    <title>Analysis Report for 0a2c7296a870d358628b025fbfd3226ab20b83a2f79512c8cb1e33e1059f7a13</title>
    <updated>2026-04-13T03:22:30Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6189f9522792fdaf7faf</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc6164d920e19044f927e3</flow_id>
        <hash>0a2c7296a870d358628b025fbfd3226ab20b83a2f79512c8cb1e33e1059f7a13</hash>
        <iocs/>
        <name>10a876efa13f876461de5e298bd8355c</name>
        <report_id>b2885d60-be90-4726-b1f0-597de23f81a3</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>b655af5b6711ef37b2422ef56a49146795fa1609e5ad24089b0a6d26342acde4</id>
    <title>Analysis Report for b655af5b6711ef37b2422ef56a49146795fa1609e5ad24089b0a6d26342acde4</title>
    <updated>2026-04-13T03:22:18Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6185f9522792fdaf7fad</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc6154799d5bf325fa5f76</flow_id>
        <hash>b655af5b6711ef37b2422ef56a49146795fa1609e5ad24089b0a6d26342acde4</hash>
        <iocs>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>APK_DECODING</origin>
            </value>
          </ips>
        </iocs>
        <name>176a31025cf9b2b2d387c64ee99fef28</name>
        <report_id>211d90c4-4f3c-497d-b17f-be95d957470d</report_id>
        <tags>
          <value>apk</value>
          <value>signed</value>
          <value>persistence</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>fingerprint</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>1aea3b06f609a03fca066fdf1e2d3a27a038628fa4ccb118c82b253f5e153774</id>
    <title>Analysis Report for 1aea3b06f609a03fca066fdf1e2d3a27a038628fa4ccb118c82b253f5e153774</title>
    <updated>2026-04-13T03:22:08Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6171f9522792fdaf7fa7</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc61539124ebc087508616</flow_id>
        <hash>1aea3b06f609a03fca066fdf1e2d3a27a038628fa4ccb118c82b253f5e153774</hash>
        <iocs/>
        <name>0ace3de055764457d5f46b1545dd1623</name>
        <report_id>aa7f56d1-b964-42b9-ba66-c3f2896b3827</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>7398a7a607e96a66b1b0e4c2dc57b2403090728a2c80c271e6e0ff084f0268e1</id>
    <title>Analysis Report for 7398a7a607e96a66b1b0e4c2dc57b2403090728a2c80c271e6e0ff084f0268e1</title>
    <updated>2026-04-13T03:22:02Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc617cf9522792fdaf7fa9</_id>
        <file_type>text/x-vbscript</file_type>
        <flow_id>69dc6147799d5bf325fa5f56</flow_id>
        <hash>7398a7a607e96a66b1b0e4c2dc57b2403090728a2c80c271e6e0ff084f0268e1</hash>
        <iocs/>
        <name>8bea19c7b89156675c928c68f283ec36</name>
        <report_id>f46bb945-0ba1-4236-ac5c-e408e53c3c03</report_id>
        <tags>
          <value>vbs</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>613ec04d07a63015fa601b2e0be9ed346c400d01f82fbe03e7c9aaaba6a761b0</id>
    <title>Analysis Report for 613ec04d07a63015fa601b2e0be9ed346c400d01f82fbe03e7c9aaaba6a761b0</title>
    <updated>2026-04-13T03:21:57Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc615d80678438b878ac7e</_id>
        <file_type>text/plain</file_type>
        <flow_id>69dc6154799d5bf325fa5f78</flow_id>
        <hash>613ec04d07a63015fa601b2e0be9ed346c400d01f82fbe03e7c9aaaba6a761b0</hash>
        <iocs/>
        <name>ServerBrowser.vdf</name>
        <report_id>fd238885-e27f-48d6-9321-e747732768f3</report_id>
        <tags>
          <value>txt</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>52ecc39a82b7869491703758d5cfe2ed933635e813ffc06ff75fda7f056a4375</id>
    <title>Analysis Report for 52ecc39a82b7869491703758d5cfe2ed933635e813ffc06ff75fda7f056a4375</title>
    <updated>2026-04-13T03:21:53Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6160f9522792fdaf7fa0</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc61435ea31bc68a249164</flow_id>
        <hash>52ecc39a82b7869491703758d5cfe2ed933635e813ffc06ff75fda7f056a4375</hash>
        <iocs/>
        <name>d6303da1c64f155b96240a8a4c4e7418</name>
        <report_id>dc9e6b82-81d8-423e-a5f1-aed92a75e724</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>f61f9b81e5481609989dcd978b5bd41ecb15702ccbc5e083672b3c385e2f920b</id>
    <title>Analysis Report for f61f9b81e5481609989dcd978b5bd41ecb15702ccbc5e083672b3c385e2f920b</title>
    <updated>2026-04-13T03:21:48Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc615880678438b878ac7c</_id>
        <file_type>text/x-vbscript</file_type>
        <flow_id>69dc614c5ea31bc68a249178</flow_id>
        <hash>f61f9b81e5481609989dcd978b5bd41ecb15702ccbc5e083672b3c385e2f920b</hash>
        <iocs/>
        <name>Scan_5_18_4_1202_09.04.2026.pdf</name>
        <report_id>6944ffda-c178-4c91-81a0-367fd7e8f4fe</report_id>
        <tags>
          <value>vbs</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>2944edd839a25217f0fcf8a28de979c6ab78c318d539d34cd35413b63193d7ea</id>
    <title>Analysis Report for 2944edd839a25217f0fcf8a28de979c6ab78c318d539d34cd35413b63193d7ea</title>
    <updated>2026-04-13T03:21:41Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6155f9522792fdaf7f9a</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc6134799d5bf325fa5f1a</flow_id>
        <hash>2944edd839a25217f0fcf8a28de979c6ab78c318d539d34cd35413b63193d7ea</hash>
        <iocs/>
        <name>3d6361a73bf9cfb2d47dfeb2a1be227a</name>
        <report_id>7ccd485a-eb21-42b1-9ac5-5d21ca3343d7</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>581502f7710a25c6653ab1446a3d89dcf462853213d66b76cc08f23dcfe717b6</id>
    <title>Analysis Report for 581502f7710a25c6653ab1446a3d89dcf462853213d66b76cc08f23dcfe717b6</title>
    <updated>2026-04-13T03:21:35Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc616af9522792fdaf7fa2</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc6132d920e19044f9278b</flow_id>
        <hash>581502f7710a25c6653ab1446a3d89dcf462853213d66b76cc08f23dcfe717b6</hash>
        <iocs>
          <urls>
            <value>
              <url>https://instagram.com/hosseinabaspanahoriginal</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://patch.chelpus.com/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.luckypatchers.com/download/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>instagram.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>luckypatchers.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>patch.chelpus.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot-core-oj.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@core.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@framework.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@services.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>nSaNX@forpda.ru</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>pkg.apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>alyaksandr.koshal@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>lp.chelpus@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>APK_DECODING</origin>
            </value>
          </ips>
        </iocs>
        <name>1718b2d5bb8d060418a010e84889f45c</name>
        <report_id>234e3559-3aaf-4f33-a00e-0e53d4f4842e</report_id>
        <tags>
          <value>apk</value>
          <value>invalid-signature</value>
          <value>fingerprint</value>
          <value>persistence</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>d68494e1ee647d7b5194350081af7474730ce2bafea611ce131a959a5cfcdd9e</id>
    <title>Analysis Report for d68494e1ee647d7b5194350081af7474730ce2bafea611ce131a959a5cfcdd9e</title>
    <updated>2026-04-13T03:21:35Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc614df9522792fdaf7f97</_id>
        <file_type>application/x-powershell</file_type>
        <flow_id>69dc612d799d5bf325fa5f08</flow_id>
        <hash>d68494e1ee647d7b5194350081af7474730ce2bafea611ce131a959a5cfcdd9e</hash>
        <iocs/>
        <name>7cfc345c322e263841f85caad2056c5a</name>
        <report_id>9f522ad0-c94e-431d-81a4-788de4e36d86</report_id>
        <tags>
          <value>powershell</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>7de053d2906bd05dead7716244cd4ee7d45391f2d70df3128a3ab1b0a48b5589</id>
    <title>Analysis Report for 7de053d2906bd05dead7716244cd4ee7d45391f2d70df3128a3ab1b0a48b5589</title>
    <updated>2026-04-13T03:21:23Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6158f9522792fdaf7f9b</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc61235ea31bc68a2490ca</flow_id>
        <hash>7de053d2906bd05dead7716244cd4ee7d45391f2d70df3128a3ab1b0a48b5589</hash>
        <iocs>
          <urls>
            <value>
              <url>https://red-x-v3-default-rtdb.firebaseio.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>red-x-v3-default-rtdb.firebaseio.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
        </iocs>
        <name>1706e2c58abe3f5805ea2f3b36a03b5b</name>
        <report_id>4462b582-4653-46fb-8a09-3ba7132ce40c</report_id>
        <tags>
          <value>apk</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>3f2e0d23ef4aa2e34e1e355ae268fa3f43eacc0a4b746d2b57bf3408a40636e8</id>
    <title>Analysis Report for 3f2e0d23ef4aa2e34e1e355ae268fa3f43eacc0a4b746d2b57bf3408a40636e8</title>
    <updated>2026-04-13T03:21:05Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6139f9522792fdaf7f90</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc6114fd15f1ca1ccf87eb</flow_id>
        <hash>3f2e0d23ef4aa2e34e1e355ae268fa3f43eacc0a4b746d2b57bf3408a40636e8</hash>
        <iocs>
          <urls>
            <value>
              <url>http://a.admob.com/f0?</url>
              <origin>APK_DECODING</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://api.admob.com/v1/pubcode/android_sdk_emulator_notice</url>
              <origin>APK_DECODING</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://mm.admob.com/static/android/i18n/20101012</url>
              <origin>APK_DECODING</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://r.admob.com/ad_source.php</url>
              <origin>APK_DECODING</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://schemas.android.com/apk/res/</url>
              <origin>APK_DECODING</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>a.admob.com</url>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <url>api.admob.com</url>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <url>mm.admob.com</url>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <url>r.admob.com</url>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <url>schemas.android.com</url>
              <origin>APK_DECODING</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>9@7245.02</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>android@android.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>android@android.com0</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>h@rFT.n7</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
        </iocs>
        <name>16dcc15c2f66715af3462d3f2f839811</name>
        <report_id>dff6faab-811c-4faa-a7db-6ee14397e2e5</report_id>
        <tags>
          <value>apk</value>
          <value>signed</value>
          <value>crypto</value>
          <value>evasive</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>419129ace362fca60c3865c05fa41cfd3beb6b1e2a2b7777870481d312ddf027</id>
    <title>Analysis Report for 419129ace362fca60c3865c05fa41cfd3beb6b1e2a2b7777870481d312ddf027</title>
    <updated>2026-04-13T03:20:49Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6123f9522792fdaf7f88</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc6104799d5bf325fa5e90</flow_id>
        <hash>419129ace362fca60c3865c05fa41cfd3beb6b1e2a2b7777870481d312ddf027</hash>
        <iocs/>
        <name>5ddd8fe7d450818babf4a9a04b9526ab</name>
        <report_id>2c120eb0-0f04-4dcf-852a-5ac8f601866b</report_id>
        <tags>
          <value>javascript</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>ec91633fb729d3e3efe54665f1b3390310dfcbb93dd9087b08abe6dd7b1e315a</id>
    <title>Analysis Report for ec91633fb729d3e3efe54665f1b3390310dfcbb93dd9087b08abe6dd7b1e315a</title>
    <updated>2026-04-13T03:20:49Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc612df9522792fdaf7f8c</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc6105799d5bf325fa5e94</flow_id>
        <hash>ec91633fb729d3e3efe54665f1b3390310dfcbb93dd9087b08abe6dd7b1e315a</hash>
        <iocs>
          <urls>
            <value>
              <url>https://issuetracker.google.com/issues/new?component=413107&amp;template=1096568</url>
              <origin>APK_DECODING</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>issuetracker.google.com</url>
              <origin>APK_DECODING</origin>
            </value>
          </domains>
        </iocs>
        <name>16bbd53932d77b9f4cb906d8334d4d75</name>
        <report_id>c201309b-0367-4ad3-a1f8-fc08d9a612ed</report_id>
        <tags>
          <value>apk</value>
          <value>signed</value>
          <value>expand</value>
          <value>finger</value>
          <value>lolbin</value>
          <value>tracker</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>6b282029744bc7c5ea834b2533933c853a8b37931f961d93030018c266840f6f</id>
    <title>Analysis Report for 6b282029744bc7c5ea834b2533933c853a8b37931f961d93030018c266840f6f</title>
    <updated>2026-04-13T03:20:41Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6119f9522792fdaf7f84</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc60f25ea31bc68a24900c</flow_id>
        <hash>6b282029744bc7c5ea834b2533933c853a8b37931f961d93030018c266840f6f</hash>
        <iocs/>
        <name>51b527786c75da4664eb69c3b6d270eb</name>
        <report_id>03621f85-9fb9-499c-8dcc-48fbc366e557</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>47e378dbf7bfdc2637808af230e7146aae7520f59fb0d6dbd141c9047df65fe2</id>
    <title>Analysis Report for 47e378dbf7bfdc2637808af230e7146aae7520f59fb0d6dbd141c9047df65fe2</title>
    <updated>2026-04-13T03:20:17Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6101f9522792fdaf7f7b</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc60e0799d5bf325fa5e3c</flow_id>
        <hash>47e378dbf7bfdc2637808af230e7146aae7520f59fb0d6dbd141c9047df65fe2</hash>
        <iocs/>
        <name>9366021f62a7beb00ef4c7eaaa3bce3b</name>
        <report_id>1ebb3c45-c2e9-4b3a-ac81-87e1eb53794f</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>675d2f3d8402e21781bfd24e23ada456476e6af86d0468f5adc216d87bcded9b</id>
    <title>Analysis Report for 675d2f3d8402e21781bfd24e23ada456476e6af86d0468f5adc216d87bcded9b</title>
    <updated>2026-04-13T03:20:10Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6108f9522792fdaf7f80</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc60db799d5bf325fa5e2f</flow_id>
        <hash>675d2f3d8402e21781bfd24e23ada456476e6af86d0468f5adc216d87bcded9b</hash>
        <iocs>
          <emails>
            <value>
              <email>android@android.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>android@android.com0</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
        </iocs>
        <name>15eb10bf1a0b097114141542840368ae</name>
        <report_id>015253ea-96fa-48e7-bc76-066ddd035fd3</report_id>
        <tags>
          <value>apk</value>
          <value>android</value>
          <value>signed</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>931b1df71833eb74ca2c27ff86a5d33304bb9e817cdecc1f143cc863ee6bdc18</id>
    <title>Analysis Report for 931b1df71833eb74ca2c27ff86a5d33304bb9e817cdecc1f143cc863ee6bdc18</title>
    <updated>2026-04-13T03:20:04Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6102f9522792fdaf7f7d</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc60d5d920e19044f926e7</flow_id>
        <hash>931b1df71833eb74ca2c27ff86a5d33304bb9e817cdecc1f143cc863ee6bdc18</hash>
        <iocs>
          <emails>
            <value>
              <email>android@android.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>android@android.com0</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
        </iocs>
        <name>15e3db39aa587cca3e63677955bac87d</name>
        <report_id>7ce17657-def7-467e-8195-59e27f711e63</report_id>
        <tags>
          <value>apk</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
          <value>evasive</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>33a9c1481d8e7a9ea09b9a148ba3f1ab7c8fefcd68f44aafa67f8291c8d36f5d</id>
    <title>Analysis Report for 33a9c1481d8e7a9ea09b9a148ba3f1ab7c8fefcd68f44aafa67f8291c8d36f5d</title>
    <updated>2026-04-13T03:20:04Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc60f4f9522792fdaf7f75</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc60d6d920e19044f926ed</flow_id>
        <hash>33a9c1481d8e7a9ea09b9a148ba3f1ab7c8fefcd68f44aafa67f8291c8d36f5d</hash>
        <iocs/>
        <name>396287837f9508b2d888ebf49f562d78</name>
        <report_id>80fbbcd4-f25b-4fa6-9ec0-47d14ff7c1be</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>dc38c2b8c26479b6f2b845320116fe91fa7e7f4b9c90315297c04f40b4e9b95d</id>
    <title>Analysis Report for dc38c2b8c26479b6f2b845320116fe91fa7e7f4b9c90315297c04f40b4e9b95d</title>
    <updated>2026-04-13T03:20:03Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc612380678438b878ac72</_id>
        <file_type>text/plain</file_type>
        <flow_id>69dc60e1799d5bf325fa5e3e</flow_id>
        <hash>dc38c2b8c26479b6f2b845320116fe91fa7e7f4b9c90315297c04f40b4e9b95d</hash>
        <iocs>
          <urls>
            <value>
              <url>https://www.freesound.org/people/11linda/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.freesound.org/people/11linda/</url>
              <origin>CONTENT_PARSE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>freesound.org</url>
              <origin>CONTENT_PARSE</origin>
            </value>
            <value>
              <url>freesound.org</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>thibiasfast_@hotmail.com</email>
              <origin>CONTENT_PARSE</origin>
            </value>
            <value>
              <email>thobias.fast@gmail.com</email>
              <origin>CONTENT_PARSE</origin>
            </value>
            <value>
              <email>thibiasfast_@hotmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>thobias.fast@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>37.27.227.73</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>37.27.227.73</ip>
              <origin>CONTENT_PARSE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
        </iocs>
        <name>README.txt</name>
        <report_id>a81ded93-e5e4-4cd3-a30b-2ec8a4dcf977</report_id>
        <tags>
          <value>txt</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>7eeb921e0c26ece738ce5f9dc359d3c0a0b0cb809ce8e511e0ad32a5d7394aff</id>
    <title>Analysis Report for 7eeb921e0c26ece738ce5f9dc359d3c0a0b0cb809ce8e511e0ad32a5d7394aff</title>
    <updated>2026-04-13T03:20:00Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc60f0f9522792fdaf7f72</_id>
        <file_type>text/javascript</file_type>
        <flow_id>69dc60d09124ebc087508551</flow_id>
        <hash>7eeb921e0c26ece738ce5f9dc359d3c0a0b0cb809ce8e511e0ad32a5d7394aff</hash>
        <iocs/>
        <name>ae4f76c89b5e5028a01393110fb00e7a</name>
        <report_id>53f29e0a-85cb-46d4-936d-ddb225b2856d</report_id>
        <tags>
          <value>javascript</value>
          <value>phishing</value>
          <value>evasive</value>
          <value>repaired</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>5fd901285fd1a85f07e2b8e35bb1692f00f78b3c147774445e83261d95e6f691</id>
    <title>Analysis Report for 5fd901285fd1a85f07e2b8e35bb1692f00f78b3c147774445e83261d95e6f691</title>
    <updated>2026-04-13T03:19:46Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6106f9522792fdaf7f7f</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc60c15ea31bc68a248f9b</flow_id>
        <hash>5fd901285fd1a85f07e2b8e35bb1692f00f78b3c147774445e83261d95e6f691</hash>
        <iocs>
          <urls>
            <value>
              <url>https://github.com/journeyapps/zxing-android-embedded</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://journeyapps.com/</url>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://127.0.0.1</url>
              <origin>APK_DECODING</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/app-store/apps/</url>
              <origin>APK_DECODING</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/community/modules/</url>
              <origin>APK_DECODING</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/community/posts/</url>
              <origin>APK_DECODING</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/community/posts/user/</url>
              <origin>APK_DECODING</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/community/posts?page=</url>
              <origin>APK_DECODING</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/community/users/</url>
              <origin>APK_DECODING</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/community/users/search?q=</url>
              <origin>APK_DECODING</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/modules/</url>
              <origin>APK_DECODING</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/notifications</url>
              <origin>APK_DECODING</origin>
              <verdict>MALICIOUS</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/notifications/read/</url>
              <origin>APK_DECODING</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/teams/</url>
              <origin>APK_DECODING</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/user/devices/</url>
              <origin>APK_DECODING</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/users/</url>
              <origin>APK_DECODING</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>github.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>journeyapps.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>api.shiaho.sbs</url>
              <origin>APK_DECODING</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>APK_DECODING</origin>
            </value>
          </ips>
        </iocs>
        <name>15a96d0f92500541b2a43d4f2a169371</name>
        <report_id>7a4058b2-2945-484e-8e66-b4fb6d415ab8</report_id>
        <tags>
          <value>apk</value>
          <value>android</value>
          <value>fingerprint</value>
          <value>persistence</value>
          <value>anti-debug</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>3128d84e49563b3aaa24759d4202e87c2d1d35b70d64c465b6019a973259e67b</id>
    <title>Analysis Report for 3128d84e49563b3aaa24759d4202e87c2d1d35b70d64c465b6019a973259e67b</title>
    <updated>2026-04-13T03:19:27Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc610a80678438b878ac6a</_id>
        <file_type>image/png</file_type>
        <flow_id>69dc60bcd920e19044f926c9</flow_id>
        <hash>3128d84e49563b3aaa24759d4202e87c2d1d35b70d64c465b6019a973259e67b</hash>
        <iocs/>
        <name>Preview.png</name>
        <report_id>cb7e1aef-8b09-4316-9102-87630ac6c6e1</report_id>
        <tags>
          <value>png</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>c5a5863e434e05f920f52b4be16da2ee2158107db4072695aab2afd44b7047bd</id>
    <title>Analysis Report for c5a5863e434e05f920f52b4be16da2ee2158107db4072695aab2afd44b7047bd</title>
    <updated>2026-04-13T03:19:27Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc610480678438b878ac64</_id>
        <file_type>application/json</file_type>
        <flow_id>69dc60bcd920e19044f926c9</flow_id>
        <hash>c5a5863e434e05f920f52b4be16da2ee2158107db4072695aab2afd44b7047bd</hash>
        <iocs/>
        <name>tex 1 - doggy.json</name>
        <report_id>65b0047e-4d35-4a71-bbad-49ec0a86aba1</report_id>
        <tags>
          <value>json</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>9c608d56383f1aa49bfe527a874c24ada3d9b8b55bc29a6932b7a95211eb0efb</id>
    <title>Analysis Report for 9c608d56383f1aa49bfe527a874c24ada3d9b8b55bc29a6932b7a95211eb0efb</title>
    <updated>2026-04-13T03:19:27Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc610780678438b878ac66</_id>
        <file_type>image/png</file_type>
        <flow_id>69dc60bcd920e19044f926c9</flow_id>
        <hash>9c608d56383f1aa49bfe527a874c24ada3d9b8b55bc29a6932b7a95211eb0efb</hash>
        <iocs/>
        <name>tex 1 - doggy_texture0_layer20.png</name>
        <report_id>44186eac-5be0-4574-aada-8e0138a43ac3</report_id>
        <tags>
          <value>png</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>5fa0ab5ba75257f0d2e5232087aa765a616b24e6e4bca2d1677d92841e516577</id>
    <title>Analysis Report for 5fa0ab5ba75257f0d2e5232087aa765a616b24e6e4bca2d1677d92841e516577</title>
    <updated>2026-04-13T03:19:27Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc610880678438b878ac68</_id>
        <file_type>image/png</file_type>
        <flow_id>69dc60bcd920e19044f926c9</flow_id>
        <hash>5fa0ab5ba75257f0d2e5232087aa765a616b24e6e4bca2d1677d92841e516577</hash>
        <iocs/>
        <name>tex 2 - blowjob, cowgirl, interaction, missionary_texture0_layer20.png</name>
        <report_id>641e0665-1620-498f-aaa5-3e6224163568</report_id>
        <tags>
          <value>png</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>ebbc5e2f245b05306006d810e2aee5fb22aeb3f7c347667b08c3ae3aea0ab327</id>
    <title>Analysis Report for ebbc5e2f245b05306006d810e2aee5fb22aeb3f7c347667b08c3ae3aea0ab327</title>
    <updated>2026-04-13T03:19:27Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc60dd80678438b878ac4d</_id>
        <file_type>text/html</file_type>
        <flow_id>69dc60bcd920e19044f926c9</flow_id>
        <hash>ebbc5e2f245b05306006d810e2aee5fb22aeb3f7c347667b08c3ae3aea0ab327</hash>
        <iocs>
          <urls>
            <value>
              <url>https://discord.com</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://discordapp.com</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://discord.com/channels/813853552400138261/1113813630585151488/1134535643695956021</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://discord.com/api/v9/apex/experiments?surface=2</url>
              <origin>URL_RENDER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://discord.com/api/v9/auth/conditional/start</url>
              <origin>URL_RENDER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://discord.com/api/v9/auth/location-metadata</url>
              <origin>URL_RENDER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://discord.com/api/v9/experiments?with_guild_experiments=true</url>
              <origin>URL_RENDER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://discord.com/api/v9/promotions?locale=en-US&amp;platform=0</url>
              <origin>URL_RENDER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://discord.com/api/v9/science</url>
              <origin>URL_RENDER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://discord.com/assets/01b790a3321ae708.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/02ad649b758f0f8d.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/02b9c8ff28b6d8ee.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/041d4b087d772174.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/0612bc56be2c1526.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/0842371cd1057263.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/09c00a6068bffa27.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/09de95354b4499d9.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/0b2b5a75df91c962.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/0d61e2dd0ed79c7f.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/0e25cfc07c72a231.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/0f5a920733283a3e.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/0ff91fbd57421053.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/10d822c5f82f39f1.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/10f195a0b91680bf.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/113c61e295c5e37e.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/12c60365823e0311.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/131c318dd45b7aa4.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/140728482e2a6eab.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/14110f5b067be0bb.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/14c47dc75392520d.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/14f27012d8820609.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/189422196a4f8b53.woff2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/19bc3e20f2bcfc4e.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/1c390c7ecaffc09e.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/1cdb969bf4db6f8b.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/1da9301f86593ddf.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/2094d72b5bac8530.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/209a4acf5023c4c3.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/2186ede217779298.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/22b99d9b446dd162.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/239fe8238a898225.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/25901bc2f17186be.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/2681623fb3f7aa56.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/272ebc854494a527.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/2818eddf67686d06.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/2bc16dec265e3970.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/2df2c3ff74408972.woff2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/2eea69d4e2016f9b.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/2fead22c6285ade4.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/35e64c0120e8dd34.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/37fa54d2de393c81.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/38e65dfa94aeb601.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/3979d8b9295719ae.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/3a4d707c8396fdc7.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/3a5fa97ee3be5298.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/3ad76b7e8dd2b226.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/3b7448570abb3316.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/3b87a6e556f49216.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/3db9313caadae340.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/3ecbbda45d7769b2.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/41fe19f3a1b78c2a.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/438bc87f4cb0ffed.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/445889698313e440.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/48ba5b4ef54ee8c3.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/4aa76269c22deb2f.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/4e7e7967f69b9bb7.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/4ecb1979cdd9199f.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/508a99ee7deba906.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/518ca10eb2e1a3c9.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/51929a0a413ab4e8.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/533fc0132ab822b7.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/53fb6f9ac75b4ccf.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/541036a4c53ae058.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/57862f68f7d3f4ce.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/58c8527033ed390c.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/59a2d3b72cb83c47.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/5be0063ee6bfc2e7.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/5cc7d65f5af1abda.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/5e474abc187208fe.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/6109834e7e31609c.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/61b556d43e497624.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/62aaa00b571b93e8.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/62cf4baefb127681.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/64516dbe6bfac804.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/66d715454104d24e.woff2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/67dc5a884b9f207b.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/6824f810f7e089a9.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/6a881baafbc99d68.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/6ad96c8f79c19828.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/6dad26b797daf414.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/6ddf47a90889594c.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/6e8807e6bf88c112.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/6f73d14c34a70753.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/6f7713d5b10d7cb3.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/7174bfd27735ed7d.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/72b0678d6f38507c.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/72dd40866bc16010.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/7505aab6251559a4.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/76e0e5f980849694.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/77f51312dba6240d.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/7a6a566c2e88a35d.woff2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/7ba1c3e1b978fcbd.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/7ba7fcf2c4710bb7.webm</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/7ec60f3c14a5e7db.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/7ecd3f232f02ddeb.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/832ad8dc0d14f87c.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/84c87d1b0da4002a.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/84f15ae1ece1945c.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/879ad25901769f1c.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/87a2fcb53036c730.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/89303650b25da344.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/8cd44e13e08a252f.module.wasm</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/8cde7e5edb6acf5b.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/8f1ec5d3d9f644a8.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/8fcaeb9e7482f0d5.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/93346f188d69eb83.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/93b280a10e9f289b.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/95dd134767338c18.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/961979cc2cb70828.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/96e81ba43b4186c1.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/99c37d0072d3b000.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/9a441f860b911e94.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/9a95768058e96af9.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/9b7bdb27f48609b5.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/9e43c2da1b17c285.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/a0505118251a9496.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/a06f142ee55db4f5.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/a12ce3e3be17e36a.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/a3426c951840fec7.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/a54ced41e117f81b.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/a6acc105efd21d26.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/a80fabb681f3fdd2.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/a9ecd532b2e5bf6e.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/a9f5471b6d3c522b.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/aba5de1cc1b1e323.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/afe4a860d9be8eba.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/b1b3d26d2a7d9b96.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/b22e5865d82ce354.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/b272b33815319bae.woff2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/b50f68c594f2af63.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/bda518d3a06c437b.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/bdc0a5eccabdb31e.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/be33018b165e04b2.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/bff79b33c442e873.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/c1ecfe01ce7b086e.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/c2d7b0c7b5e967f6.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/c310477686ad0f26.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/c35c199e60055d29.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/c3672e0e685c0dac.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/c436641309bdcb6e.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/c61841379084f081.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/c6b4f2297bec6f8d.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/c746297372d59cfd.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/c9de4336226c2f57.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/cb2006dbced0e246.woff2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/cba6f86affd194d4.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/cd5df0d17c718b95.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/cda64dd87ed3dc76.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/ce3b8055f5114434.woff2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/cee370db11d8545c.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/cf1a3755df715418.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/cf2fab52286b6cbd.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/cfc7eccd1e273d09.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/d017bd86c9c06760.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/d0c3c4034abca9f5.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/d24718d1c5e787bf.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/d66ca34cbc4abf1c.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/d67c4227449d07d9.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/d7d4925cad6ad23d.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/d86149d8c002fb12.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/d8680b1c1576ecc8.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/dd05fd1ea37e7747.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/dd24010f3cf7def7.woff2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/dd7a8cd5f37444ea.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/ddada180f50dc482.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/ddd5cca3ef51afc4.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e00c5f9f3a8ae894.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e10b84683a05b641.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e1ebca2b27f020e8.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e2d32c242db2061a.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e30d84cffa256274.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e465a903c9673be6.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e52f0cba712e2fb4.woff2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e69a38f1245a8131.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e71f1f2e02d8ee24.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e76f35da0b2d5caf.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e7dca8a547f66c9b.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e832823a0689d31f.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e8537e821787a9a7.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e853b060972acde9.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e8d8bb6730441f48.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e9b432a13db41b27.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/ea203513d4589d6b.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/ea83e37a45b8988b.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/ec14088158e391e2.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/edc9f8e745cef52a.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/eefcfb71d2322823.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/f06ae592d2222cf1.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/f14a5e5757b219fc.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/f405d8ee38d35380.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/f5082ff45959302c.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/f5bfdb2fbf278395.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/f8deaa78c9522ef8.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/f8e7c687d8b4cc91.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/fast-connect.ee0ab932b2f33ff7.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/favicon.ico</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/fb5f16ba55d359ac.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/fc121197ac9cadc5.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/fd738c52e64cda29.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/fd82403fd44549a1.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/fe290ce2b8a4eb30.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/libdiscore-wasm-fetch.b0c160428febe877.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/sentry.1161f90347c4d3bf.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/web.ee8abcd88fd4b6bb.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/web.fcb00153ab24278e.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/cdn-cgi/challenge-platform/h/g/jsd/oneshot/b0a7532ac8ec/0.7992019116858529:1776049718:43jheXab4LELZ_X1otk0DbqQ6Y6Ijm2Rfcvl5e5WBlw/9eb7546ec9e0d21f</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/cdn-cgi/challenge-platform/h/g/scripts/jsd/b0a7532ac8ec/main.js?</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/channels/813853552400138261/1113813630585151488/1134535643695956021</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/login?redirect_to=%2Fchannels%2F813853552400138261%2F1113813630585151488%2F1134535643695956021</url>
              <origin>URL_RENDER</origin>
            </value>
          </urls>
          <domains>
            <value>
              <url>discord.com</url>
              <origin>URL_RENDER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </domains>
          <ips>
            <value>
              <ip>162.159.135.232</ip>
              <origin>URL_RENDER</origin>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>5a2701622e8dfe4aa60431b6379b33091d173d47263617c71e3fd0fb7ed39db8</SHA-256>
              <SHA-1>e510f87452f436d2aaee288862ef70b3f67fc404</SHA-1>
              <MD5>c3716c8ad4e0a2b4f8f7efdf2d3db8f4</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>f617631a733e22bb96089f98b24f574cffc5dc242e4a113dc0b288207c3a3849</SHA-256>
              <SHA-1>2e7eae65198cbffe7f0ddf8882df45ed5c220c01</SHA-1>
              <MD5>823b396cce5717abb32b9107718ae984</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
        </iocs>
        <name>Original Post on Discord.TXT</name>
        <report_id>783e9bca-4424-4eae-b133-c9ee60e5a594</report_id>
        <tags>
          <value>html</value>
          <value>base64</value>
          <value>soft-404</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>98c4ca2b7477b777f0cb0171150221bff36f02294bff7f9d4b2e5003ee5e7bb7</id>
    <title>Analysis Report for 98c4ca2b7477b777f0cb0171150221bff36f02294bff7f9d4b2e5003ee5e7bb7</title>
    <updated>2026-04-13T03:19:27Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc60f680678438b878ac58</_id>
        <file_type>application/json</file_type>
        <flow_id>69dc60bcd920e19044f926c9</flow_id>
        <hash>98c4ca2b7477b777f0cb0171150221bff36f02294bff7f9d4b2e5003ee5e7bb7</hash>
        <iocs/>
        <name>tex 2 - blowjob, cowgirl, interaction, missionary.json</name>
        <report_id>a10bfafb-2aea-4bfd-aa1e-44b979b9fd38</report_id>
        <tags>
          <value>json</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>ef9d7e2f00ebd60005e53237fccc7702df490338c7cd1a033e1b4685f402539a</id>
    <title>Analysis Report for ef9d7e2f00ebd60005e53237fccc7702df490338c7cd1a033e1b4685f402539a</title>
    <updated>2026-04-13T03:19:27Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc610280678438b878ac62</_id>
        <file_type>image/png</file_type>
        <flow_id>69dc60bcd920e19044f926c9</flow_id>
        <hash>ef9d7e2f00ebd60005e53237fccc7702df490338c7cd1a033e1b4685f402539a</hash>
        <iocs/>
        <name>tex 2 - blowjob, cowgirl, interaction, missionary_texture0_layer20.png</name>
        <report_id>9741f54a-f5cb-46a2-817c-96dd4ddbbc8a</report_id>
        <tags>
          <value>png</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>1cfcda3ed87b3b0949a041f09394b414bf5336db4c718ea67e2e5dbb2dce9644</id>
    <title>Analysis Report for 1cfcda3ed87b3b0949a041f09394b414bf5336db4c718ea67e2e5dbb2dce9644</title>
    <updated>2026-04-13T03:19:27Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc60f380678438b878ac53</_id>
        <file_type>application/json</file_type>
        <flow_id>69dc60bcd920e19044f926c9</flow_id>
        <hash>1cfcda3ed87b3b0949a041f09394b414bf5336db4c718ea67e2e5dbb2dce9644</hash>
        <iocs/>
        <name>tex 2 - blowjob, cowgirl, interaction, missionary.json</name>
        <report_id>578f4ef2-01eb-4bd7-bd72-b13bb0f7b480</report_id>
        <tags>
          <value>json</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>bc9babff91bd508c2c5665a77f22fca9cac88f4204b8bfad9f487e23ccbe902a</id>
    <title>Analysis Report for bc9babff91bd508c2c5665a77f22fca9cac88f4204b8bfad9f487e23ccbe902a</title>
    <updated>2026-04-13T03:19:27Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc60f480678438b878ac56</_id>
        <file_type>image/png</file_type>
        <flow_id>69dc60bcd920e19044f926c9</flow_id>
        <hash>bc9babff91bd508c2c5665a77f22fca9cac88f4204b8bfad9f487e23ccbe902a</hash>
        <iocs/>
        <name>tex 1 - doggy_texture0_layer5.png</name>
        <report_id>bcbc11b5-cde9-4aa2-b55b-bd386a228379</report_id>
        <tags>
          <value>png</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>8b76b82fc04c57f9b20eddc226958705f5f123d0df8ab780cf4988bedd33c9e1</id>
    <title>Analysis Report for 8b76b82fc04c57f9b20eddc226958705f5f123d0df8ab780cf4988bedd33c9e1</title>
    <updated>2026-04-13T03:19:27Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc610080678438b878ac5f</_id>
        <file_type>application/json</file_type>
        <flow_id>69dc60bcd920e19044f926c9</flow_id>
        <hash>8b76b82fc04c57f9b20eddc226958705f5f123d0df8ab780cf4988bedd33c9e1</hash>
        <iocs/>
        <name>tex 1 - doggy.json</name>
        <report_id>a51d58bd-9beb-4899-a650-1200cae69619</report_id>
        <tags>
          <value>json</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>cd9479deff97a1cce09f490ad3603bf8b9a7e0c872fac7c4f2439bdfd045d26f</id>
    <title>Analysis Report for cd9479deff97a1cce09f490ad3603bf8b9a7e0c872fac7c4f2439bdfd045d26f</title>
    <updated>2026-04-13T03:19:27Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc60f180678438b878ac51</_id>
        <file_type>image/png</file_type>
        <flow_id>69dc60bcd920e19044f926c9</flow_id>
        <hash>cd9479deff97a1cce09f490ad3603bf8b9a7e0c872fac7c4f2439bdfd045d26f</hash>
        <iocs/>
        <name>tex 1 - doggy_texture0_layer5.png</name>
        <report_id>48b7493a-0545-4922-a6c9-143a16a661d0</report_id>
        <tags>
          <value>png</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>3068d27818aebf442f30c3cca5442544cdfe041406371557d12fd929c2d98327</id>
    <title>Analysis Report for 3068d27818aebf442f30c3cca5442544cdfe041406371557d12fd929c2d98327</title>
    <updated>2026-04-13T03:19:27Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc60ff80678438b878ac5c</_id>
        <file_type>image/png</file_type>
        <flow_id>69dc60bcd920e19044f926c9</flow_id>
        <hash>3068d27818aebf442f30c3cca5442544cdfe041406371557d12fd929c2d98327</hash>
        <iocs/>
        <name>tex 2 - blowjob, cowgirl, interaction, missionary_texture0_layer5.png</name>
        <report_id>f3daade8-3cad-44a1-9d3d-daaf793ec95f</report_id>
        <tags>
          <value>png</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>f3ebfd0f090d89833fe927b8c3a258247b8fe958a24518cb38aed11d55c71e4f</id>
    <title>Analysis Report for f3ebfd0f090d89833fe927b8c3a258247b8fe958a24518cb38aed11d55c71e4f</title>
    <updated>2026-04-13T03:19:27Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc60fd80678438b878ac5a</_id>
        <file_type>image/png</file_type>
        <flow_id>69dc60bcd920e19044f926c9</flow_id>
        <hash>f3ebfd0f090d89833fe927b8c3a258247b8fe958a24518cb38aed11d55c71e4f</hash>
        <iocs/>
        <name>Preview.png</name>
        <report_id>318c6bba-10a1-4086-a49e-663d9f53dd3c</report_id>
        <tags>
          <value>png</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>3a7b855ef1811ef0d95cbc2a95753f558c7d4759689e86d97efc5937153a4311</id>
    <title>Analysis Report for 3a7b855ef1811ef0d95cbc2a95753f558c7d4759689e86d97efc5937153a4311</title>
    <updated>2026-04-13T03:19:15Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc60d0f9522792fdaf7f6a</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc60a5c33dc5a985d79723</flow_id>
        <hash>3a7b855ef1811ef0d95cbc2a95753f558c7d4759689e86d97efc5937153a4311</hash>
        <iocs>
          <urls>
            <value>
              <url>http://schemas.android.com/apk/res/android</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://android.googlesource.com/toolchain/llvm-project</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>android.googlesource.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>schemas.android.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
        </iocs>
        <name>15547839c82e1fcc6060417cd18ad770</name>
        <report_id>c0a118bb-0103-4790-8473-a85248d40249</report_id>
        <tags>
          <value>apk</value>
          <value>invalid-signature</value>
          <value>android</value>
          <value>bankbot</value>
          <value>signed</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>d8de40b3eb7ff342b0b554cae70946387c2909a0eb4e1e92f9e7a1f3773f6a23</id>
    <title>Analysis Report for d8de40b3eb7ff342b0b554cae70946387c2909a0eb4e1e92f9e7a1f3773f6a23</title>
    <updated>2026-04-13T03:18:57Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc60aff9522792fdaf7f63</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc6093d920e19044f92681</flow_id>
        <hash>d8de40b3eb7ff342b0b554cae70946387c2909a0eb4e1e92f9e7a1f3773f6a23</hash>
        <iocs>
          <urls>
            <value>
              <url>http://ns.adobe.com/iX/1.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://ns.adobe.com/pdf/1.3</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://ns.adobe.com/xap/1.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://ns.adobe.com/xap/1.0/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://ns.adobe.com/xap/1.0/'</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://ns.adobe.com/xap/1.0/mm</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://ns.adobe.com/xap/1.0/mm/'</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://ns.adobe.com/xap/1.0/sType/ResourceRef#'</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>ns.adobe.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>1.11.12.22</ip>
              <origin>INPUT_FILE</origin>
            </value>
          </ips>
          <uuids>
            <value>
              <uuid>a095384b-69e2-11e8-a692-f609affd0dac</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>a095384e-69e2-11e8-a692-f609affd0dac</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>a0953850-69e2-11e8-a692-f609affd0dac</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
          <btc_wallets>
            <value>
              <btc_wallet>333333333333333333333333333333</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
          </btc_wallets>
        </iocs>
        <name>152d41b5b05dbdceb208f973f525e0ff</name>
        <report_id>9f9e3f65-75e2-47d9-a38e-1fafdf7fd9c0</report_id>
        <tags>
          <value>apk</value>
          <value>signed</value>
          <value>jiagu</value>
          <value>obfuscated</value>
          <value>packed</value>
          <value>fingerprint</value>
          <value>evasive</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>99be1b4868ae387d351228afbf3e566bc35adf483a39942419c2aac68c156261</id>
    <title>Analysis Report for 99be1b4868ae387d351228afbf3e566bc35adf483a39942419c2aac68c156261</title>
    <updated>2026-04-13T03:18:12Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc609af9522792fdaf7f5d</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc60669124ebc0875084c6</flow_id>
        <hash>99be1b4868ae387d351228afbf3e566bc35adf483a39942419c2aac68c156261</hash>
        <iocs/>
        <name>1499a935678f267c58c5d0ceaec0b610</name>
        <report_id>610321c4-4496-4c3b-9699-510a61869d92</report_id>
        <tags>
          <value>apk</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>6b1695c86f1edc8de8fdf3fec530330c05679b3ed351f1e2a81875c668adf375</id>
    <title>Analysis Report for 6b1695c86f1edc8de8fdf3fec530330c05679b3ed351f1e2a81875c668adf375</title>
    <updated>2026-04-13T03:18:02Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc607480678438b878ac28</_id>
        <file_type>application/json</file_type>
        <flow_id>69dc6069d920e19044f92641</flow_id>
        <hash>6b1695c86f1edc8de8fdf3fec530330c05679b3ed351f1e2a81875c668adf375</hash>
        <iocs/>
        <name>tex 3 - missionary.json</name>
        <report_id>fb8071e5-e521-4d8d-bcb1-39edff38584d</report_id>
        <tags>
          <value>json</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>b4cb68c91e1a960f7f3635afd34b765766bff571ab7ef5cb1f7f274d78f672d6</id>
    <title>Analysis Report for b4cb68c91e1a960f7f3635afd34b765766bff571ab7ef5cb1f7f274d78f672d6</title>
    <updated>2026-04-13T03:18:02Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc607680678438b878ac29</_id>
        <file_type>application/json</file_type>
        <flow_id>69dc6069d920e19044f92641</flow_id>
        <hash>b4cb68c91e1a960f7f3635afd34b765766bff571ab7ef5cb1f7f274d78f672d6</hash>
        <iocs/>
        <name>tex 1 - doggy.json</name>
        <report_id>bb21276c-3d11-47cd-9844-6571917f2877</report_id>
        <tags>
          <value>json</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>1a89a5c6872d9e340afcd14a0b31273502e5e7354331eff0d31d56a8f8d2555c</id>
    <title>Analysis Report for 1a89a5c6872d9e340afcd14a0b31273502e5e7354331eff0d31d56a8f8d2555c</title>
    <updated>2026-04-13T03:18:02Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc607f80678438b878ac2e</_id>
        <file_type>image/png</file_type>
        <flow_id>69dc6069d920e19044f92641</flow_id>
        <hash>1a89a5c6872d9e340afcd14a0b31273502e5e7354331eff0d31d56a8f8d2555c</hash>
        <iocs/>
        <name>tex 4 - blowjob_texture0_layer1.png</name>
        <report_id>65cde64c-42dd-4ec6-b244-8b595613384c</report_id>
        <tags>
          <value>png</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>0048c805544287743e08ebb59994c5592a8690637ed2602291620cc15f43c3c7</id>
    <title>Analysis Report for 0048c805544287743e08ebb59994c5592a8690637ed2602291620cc15f43c3c7</title>
    <updated>2026-04-13T03:18:02Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc607380678438b878ac27</_id>
        <file_type>image/png</file_type>
        <flow_id>69dc6069d920e19044f92641</flow_id>
        <hash>0048c805544287743e08ebb59994c5592a8690637ed2602291620cc15f43c3c7</hash>
        <iocs/>
        <name>Preview.png</name>
        <report_id>a039d78c-1101-48b5-a2ea-d63e750211de</report_id>
        <tags>
          <value>png</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>0ffa889ee05572a3a3aa078803c2643bd49a7e2807184df6a996c570491edccd</id>
    <title>Analysis Report for 0ffa889ee05572a3a3aa078803c2643bd49a7e2807184df6a996c570491edccd</title>
    <updated>2026-04-13T03:18:02Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc607d80678438b878ac2c</_id>
        <file_type>image/png</file_type>
        <flow_id>69dc6069d920e19044f92641</flow_id>
        <hash>0ffa889ee05572a3a3aa078803c2643bd49a7e2807184df6a996c570491edccd</hash>
        <iocs/>
        <name>tex 3 - missionary_texture0_layer1.png</name>
        <report_id>3f08dd98-3c4c-4919-a3af-1bd242b2bc13</report_id>
        <tags>
          <value>png</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>b8eaafc34f87061bf0f8abb50146f3aeb9103577b7f98e1c80a7e11735e877f2</id>
    <title>Analysis Report for b8eaafc34f87061bf0f8abb50146f3aeb9103577b7f98e1c80a7e11735e877f2</title>
    <updated>2026-04-13T03:18:02Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc609480678438b878ac33</_id>
        <file_type>text/html</file_type>
        <flow_id>69dc6069d920e19044f92641</flow_id>
        <hash>b8eaafc34f87061bf0f8abb50146f3aeb9103577b7f98e1c80a7e11735e877f2</hash>
        <iocs>
          <urls>
            <value>
              <url>https://discord.com</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://discordapp.com</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://discord.com/channels/813853552400138261/1113813630585151488/1113831243939844178</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://discord.com/api/v9/apex/experiments?surface=2</url>
              <origin>URL_RENDER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://discord.com/api/v9/auth/conditional/start</url>
              <origin>URL_RENDER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://discord.com/api/v9/auth/location-metadata</url>
              <origin>URL_RENDER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://discord.com/api/v9/experiments?with_guild_experiments=true</url>
              <origin>URL_RENDER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://discord.com/api/v9/promotions?locale=en-US&amp;platform=0</url>
              <origin>URL_RENDER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://discord.com/api/v9/science</url>
              <origin>URL_RENDER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://discord.com/assets/01b790a3321ae708.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/02ad649b758f0f8d.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/02b9c8ff28b6d8ee.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/041d4b087d772174.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/0612bc56be2c1526.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/0842371cd1057263.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/09c00a6068bffa27.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/09de95354b4499d9.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/0b2b5a75df91c962.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/0d61e2dd0ed79c7f.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/0e25cfc07c72a231.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/0f5a920733283a3e.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/0ff91fbd57421053.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/10d822c5f82f39f1.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/10f195a0b91680bf.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/113c61e295c5e37e.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/12c60365823e0311.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/131c318dd45b7aa4.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/140728482e2a6eab.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/14110f5b067be0bb.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/14c47dc75392520d.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/14f27012d8820609.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/189422196a4f8b53.woff2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/19bc3e20f2bcfc4e.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/1c390c7ecaffc09e.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/1cdb969bf4db6f8b.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/1da9301f86593ddf.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/2094d72b5bac8530.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/209a4acf5023c4c3.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/2186ede217779298.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/22b99d9b446dd162.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/239fe8238a898225.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/25901bc2f17186be.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/2681623fb3f7aa56.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/272ebc854494a527.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/2818eddf67686d06.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/2bc16dec265e3970.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/2df2c3ff74408972.woff2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/2eea69d4e2016f9b.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/2fead22c6285ade4.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/35e64c0120e8dd34.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/37fa54d2de393c81.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/38e65dfa94aeb601.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/3979d8b9295719ae.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/3a4d707c8396fdc7.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/3a5fa97ee3be5298.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/3ad76b7e8dd2b226.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/3b7448570abb3316.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/3b87a6e556f49216.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/3db9313caadae340.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/3ecbbda45d7769b2.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/41fe19f3a1b78c2a.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/438bc87f4cb0ffed.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/445889698313e440.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/48ba5b4ef54ee8c3.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/4aa76269c22deb2f.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/4e7e7967f69b9bb7.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/4ecb1979cdd9199f.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/508a99ee7deba906.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/518ca10eb2e1a3c9.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/51929a0a413ab4e8.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/533fc0132ab822b7.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/53fb6f9ac75b4ccf.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/541036a4c53ae058.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/57862f68f7d3f4ce.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/58c8527033ed390c.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/59a2d3b72cb83c47.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/5be0063ee6bfc2e7.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/5cc7d65f5af1abda.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/5e474abc187208fe.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/6109834e7e31609c.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/61b556d43e497624.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/62aaa00b571b93e8.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/62cf4baefb127681.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/64516dbe6bfac804.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/66d715454104d24e.woff2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/67dc5a884b9f207b.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/6824f810f7e089a9.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/6a881baafbc99d68.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/6ad96c8f79c19828.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/6dad26b797daf414.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/6ddf47a90889594c.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/6e8807e6bf88c112.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/6f73d14c34a70753.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/6f7713d5b10d7cb3.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/7174bfd27735ed7d.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/72b0678d6f38507c.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/72dd40866bc16010.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/7505aab6251559a4.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/76e0e5f980849694.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/77f51312dba6240d.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/7a6a566c2e88a35d.woff2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/7ba1c3e1b978fcbd.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/7ba7fcf2c4710bb7.webm</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/7ec60f3c14a5e7db.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/7ecd3f232f02ddeb.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/832ad8dc0d14f87c.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/84c87d1b0da4002a.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/84f15ae1ece1945c.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/879ad25901769f1c.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/87a2fcb53036c730.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/89303650b25da344.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/8cd44e13e08a252f.module.wasm</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/8cde7e5edb6acf5b.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/8f1ec5d3d9f644a8.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/8fcaeb9e7482f0d5.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/93346f188d69eb83.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/93b280a10e9f289b.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/95dd134767338c18.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/961979cc2cb70828.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/96e81ba43b4186c1.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/99c37d0072d3b000.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/9a441f860b911e94.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/9a95768058e96af9.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/9b7bdb27f48609b5.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/9e43c2da1b17c285.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/a0505118251a9496.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/a06f142ee55db4f5.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/a12ce3e3be17e36a.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/a3426c951840fec7.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/a54ced41e117f81b.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/a6acc105efd21d26.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/a80fabb681f3fdd2.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/a9ecd532b2e5bf6e.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/a9f5471b6d3c522b.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/aba5de1cc1b1e323.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/afe4a860d9be8eba.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/b1b3d26d2a7d9b96.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/b22e5865d82ce354.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/b272b33815319bae.woff2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/b50f68c594f2af63.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/bda518d3a06c437b.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/bdc0a5eccabdb31e.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/be33018b165e04b2.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/bff79b33c442e873.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/c1ecfe01ce7b086e.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/c2d7b0c7b5e967f6.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/c310477686ad0f26.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/c35c199e60055d29.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/c3672e0e685c0dac.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/c436641309bdcb6e.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/c61841379084f081.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/c6b4f2297bec6f8d.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/c746297372d59cfd.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/c9de4336226c2f57.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/cb2006dbced0e246.woff2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/cba6f86affd194d4.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/cd5df0d17c718b95.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/cda64dd87ed3dc76.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/ce3b8055f5114434.woff2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/cee370db11d8545c.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/cf1a3755df715418.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/cf2fab52286b6cbd.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/cfc7eccd1e273d09.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/d017bd86c9c06760.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/d0c3c4034abca9f5.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/d24718d1c5e787bf.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/d66ca34cbc4abf1c.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/d67c4227449d07d9.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/d7d4925cad6ad23d.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/d86149d8c002fb12.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/d8680b1c1576ecc8.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/dd05fd1ea37e7747.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/dd24010f3cf7def7.woff2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/dd7a8cd5f37444ea.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/ddada180f50dc482.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/ddd5cca3ef51afc4.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e00c5f9f3a8ae894.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e10b84683a05b641.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e1ebca2b27f020e8.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e2d32c242db2061a.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e30d84cffa256274.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e465a903c9673be6.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e52f0cba712e2fb4.woff2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e69a38f1245a8131.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e71f1f2e02d8ee24.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e76f35da0b2d5caf.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e7dca8a547f66c9b.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e832823a0689d31f.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e8537e821787a9a7.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e853b060972acde9.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e8d8bb6730441f48.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/e9b432a13db41b27.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/ea203513d4589d6b.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/ea83e37a45b8988b.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/ec14088158e391e2.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/edc9f8e745cef52a.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/eefcfb71d2322823.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/f06ae592d2222cf1.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/f14a5e5757b219fc.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/f405d8ee38d35380.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/f5082ff45959302c.svg</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/f5bfdb2fbf278395.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/f8deaa78c9522ef8.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/f8e7c687d8b4cc91.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/fast-connect.ee0ab932b2f33ff7.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/favicon.ico</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/fb5f16ba55d359ac.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/fc121197ac9cadc5.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/fd738c52e64cda29.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/fd82403fd44549a1.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/fe290ce2b8a4eb30.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/libdiscore-wasm-fetch.b0c160428febe877.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/sentry.1161f90347c4d3bf.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/web.ee8abcd88fd4b6bb.css</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/assets/web.fcb00153ab24278e.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/cdn-cgi/challenge-platform/h/g/jsd/oneshot/b0a7532ac8ec/0.22535194111859658:1776046159:LQfTk5Gu_gnF43G-LOnFF7hPmF-McrkHniUK1qDF7zI/9eb75257ebe2d34a</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/cdn-cgi/challenge-platform/h/g/scripts/jsd/b0a7532ac8ec/main.js?</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/channels/813853552400138261/1113813630585151488/1113831243939844178</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://discord.com/login?redirect_to=%2Fchannels%2F813853552400138261%2F1113813630585151488%2F1113831243939844178</url>
              <origin>URL_RENDER</origin>
            </value>
          </urls>
          <domains>
            <value>
              <url>discord.com</url>
              <origin>URL_RENDER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </domains>
          <ips>
            <value>
              <ip>162.159.138.232</ip>
              <origin>URL_RENDER</origin>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>1c1bac0a489e946231c9e8a9a69400e4cf8b45872c40436ae3efdd7411a21442</SHA-256>
              <SHA-1>748cb479e761a7a14fff9fa1788d669e07979803</SHA-1>
              <MD5>ab46baaa85c664bd18b406ec3075e796</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>508f469c2464fd20922702e55f1eb96f7ff3e9209cdef415af9a5dc105183184</SHA-256>
              <SHA-1>c1778009cfe8697e95857b27bc8c839bb5914f4a</SHA-1>
              <MD5>4f778b02167f0b81f4e1858086484607</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
        </iocs>
        <name>Original Post on Discord.TXT</name>
        <report_id>692d758b-ebe0-4db5-a04c-4cdf3c28da15</report_id>
        <tags>
          <value>html</value>
          <value>base64</value>
          <value>soft-404</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>dafac8240c56ba0406fc570030d53f8b4705e1167217f881781cafd07addb685</id>
    <title>Analysis Report for dafac8240c56ba0406fc570030d53f8b4705e1167217f881781cafd07addb685</title>
    <updated>2026-04-13T03:18:02Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc60d680678438b878ac4b</_id>
        <file_type>application/json</file_type>
        <flow_id>69dc6069d920e19044f92641</flow_id>
        <hash>dafac8240c56ba0406fc570030d53f8b4705e1167217f881781cafd07addb685</hash>
        <iocs/>
        <name>tex 4 - blowjob.json</name>
        <report_id>384fa890-ed97-4d62-84fc-336282c32dc9</report_id>
        <tags>
          <value>json</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>a8640c51bfd30ae3ca712a950f1dd50ae1c50524ed7f2eba8eb2deb51c800b11</id>
    <title>Analysis Report for a8640c51bfd30ae3ca712a950f1dd50ae1c50524ed7f2eba8eb2deb51c800b11</title>
    <updated>2026-04-13T03:18:02Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc60b980678438b878ac40</_id>
        <file_type>image/png</file_type>
        <flow_id>69dc6069d920e19044f92641</flow_id>
        <hash>a8640c51bfd30ae3ca712a950f1dd50ae1c50524ed7f2eba8eb2deb51c800b11</hash>
        <iocs>
          <urls>
            <value>
              <url>http://ns.adobe.com/tiff/1.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://ns.adobe.com/xap/1.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://ns.adobe.com/xap/1.0/mm</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://ns.adobe.com/xap/1.0/sType/ResourceEvent</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://purl.org/dc/elements/1.1</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://www.gimp.org/xmp</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>gimp.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>ns.adobe.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>purl.org</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>98.86.250.202</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>207.241.225.157</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>98.86.250.202</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>207.241.225.157</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>04e4cdf95adae426a9416074d312ace423cb6c4b23ddf07499497ae0f22053dc</SHA-256>
              <SHA-1>b34c8194bb3b0f056fb8ef7384b7c7d8d3230686</SHA-1>
              <MD5>34ea7d1b65cf3ada50f9b82a3a64db16</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
          </files>
          <uuids>
            <value>
              <uuid>311ea40d-4d0d-46e9-b639-171186430b8a</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>b3ac8c24-e1ca-4ee6-9eb0-1bec0d6d62aa</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>eddfa02e-ee5d-4a83-a615-421c87e49900</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
        </iocs>
        <name>tex 3 - blowjob_texture0_layer0.png</name>
        <report_id>2f1fd5dd-ca6b-4517-b51f-d5925863bcf3</report_id>
        <tags>
          <value>png</value>
          <value>html</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>90ed4a6a81617ed6e63f84b1129a4e5f3768017eaca76a6175d5477495d91255</id>
    <title>Analysis Report for 90ed4a6a81617ed6e63f84b1129a4e5f3768017eaca76a6175d5477495d91255</title>
    <updated>2026-04-13T03:18:02Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc60c780678438b878ac44</_id>
        <file_type>image/png</file_type>
        <flow_id>69dc6069d920e19044f92641</flow_id>
        <hash>90ed4a6a81617ed6e63f84b1129a4e5f3768017eaca76a6175d5477495d91255</hash>
        <iocs>
          <urls>
            <value>
              <url>http://ns.adobe.com/tiff/1.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://ns.adobe.com/xap/1.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://ns.adobe.com/xap/1.0/mm</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://ns.adobe.com/xap/1.0/sType/ResourceEvent</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://purl.org/dc/elements/1.1</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://www.gimp.org/xmp</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>gimp.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>ns.adobe.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>purl.org</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>98.86.250.202</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>207.241.225.157</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>98.86.250.202</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>207.241.225.157</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>04e4cdf95adae426a9416074d312ace423cb6c4b23ddf07499497ae0f22053dc</SHA-256>
              <SHA-1>b34c8194bb3b0f056fb8ef7384b7c7d8d3230686</SHA-1>
              <MD5>34ea7d1b65cf3ada50f9b82a3a64db16</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
          </files>
          <uuids>
            <value>
              <uuid>77b33de7-faac-4ae2-9f2d-4799332c1bc6</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>865cf8dd-6283-4317-a661-c1473dd16216</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>aabbf288-a47d-4c29-b456-ecba68baf4c3</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
        </iocs>
        <name>tex 4 - cowgirl_texture0_layer0.png</name>
        <report_id>9e7d222c-cf5b-42d5-9821-f45139cdd40b</report_id>
        <tags>
          <value>png</value>
          <value>html</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>50557a20f4fe5e7014df57136a7fd7c1698dcaac97a3e878d1bc5ac0cad033a2</id>
    <title>Analysis Report for 50557a20f4fe5e7014df57136a7fd7c1698dcaac97a3e878d1bc5ac0cad033a2</title>
    <updated>2026-04-13T03:18:02Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc60d480678438b878ac49</_id>
        <file_type>image/png</file_type>
        <flow_id>69dc6069d920e19044f92641</flow_id>
        <hash>50557a20f4fe5e7014df57136a7fd7c1698dcaac97a3e878d1bc5ac0cad033a2</hash>
        <iocs/>
        <name>Preview.png</name>
        <report_id>62981ce5-1f88-49fe-a30e-d73c1b3dd63b</report_id>
        <tags>
          <value>png</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>652d222119cbc64d2b990dbbbfe43dfefd7b93896804d34c99fa305685f7e5f4</id>
    <title>Analysis Report for 652d222119cbc64d2b990dbbbfe43dfefd7b93896804d34c99fa305685f7e5f4</title>
    <updated>2026-04-13T03:18:02Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc607180678438b878ac25</_id>
        <file_type>application/json</file_type>
        <flow_id>69dc6069d920e19044f92641</flow_id>
        <hash>652d222119cbc64d2b990dbbbfe43dfefd7b93896804d34c99fa305685f7e5f4</hash>
        <iocs/>
        <name>tex 4 - cowgirl.json</name>
        <report_id>a0fc8839-31c5-4ce0-b426-4b15b5384434</report_id>
        <tags>
          <value>json</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>8ae74b263464a43d4ce6b9c4aea7804f770a212c3fbeedc5467d5220ab8ad788</id>
    <title>Analysis Report for 8ae74b263464a43d4ce6b9c4aea7804f770a212c3fbeedc5467d5220ab8ad788</title>
    <updated>2026-04-13T03:18:02Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc60aa80678438b878ac39</_id>
        <file_type>image/png</file_type>
        <flow_id>69dc6069d920e19044f92641</flow_id>
        <hash>8ae74b263464a43d4ce6b9c4aea7804f770a212c3fbeedc5467d5220ab8ad788</hash>
        <iocs>
          <urls>
            <value>
              <url>http://ns.adobe.com/tiff/1.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://ns.adobe.com/xap/1.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://ns.adobe.com/xap/1.0/mm</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://ns.adobe.com/xap/1.0/sType/ResourceEvent</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://purl.org/dc/elements/1.1</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://www.gimp.org/xmp</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>gimp.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>ns.adobe.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>purl.org</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>98.86.250.202</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>207.241.225.157</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>98.86.250.202</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>207.241.225.157</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>04e4cdf95adae426a9416074d312ace423cb6c4b23ddf07499497ae0f22053dc</SHA-256>
              <SHA-1>b34c8194bb3b0f056fb8ef7384b7c7d8d3230686</SHA-1>
              <MD5>34ea7d1b65cf3ada50f9b82a3a64db16</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
          </files>
          <uuids>
            <value>
              <uuid>2ca8adfe-2330-46b6-82ed-4a95a26348a3</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>e13c34bd-a8e7-47e5-a80d-ffcbc757223c</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>ee73957e-98e8-43b0-a558-377e8deece10</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
        </iocs>
        <name>tex 2 - doggy_texture0_layer0.png</name>
        <report_id>aa6d1b7a-ac9f-4c82-9f28-dcd680500929</report_id>
        <tags>
          <value>png</value>
          <value>html</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>e6524c921e8ca07b09ea4d2062cd7812e700de37119f29bb18bbdb4a54083dd2</id>
    <title>Analysis Report for e6524c921e8ca07b09ea4d2062cd7812e700de37119f29bb18bbdb4a54083dd2</title>
    <updated>2026-04-13T03:18:02Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc60b780678438b878ac3e</_id>
        <file_type>application/json</file_type>
        <flow_id>69dc6069d920e19044f92641</flow_id>
        <hash>e6524c921e8ca07b09ea4d2062cd7812e700de37119f29bb18bbdb4a54083dd2</hash>
        <iocs/>
        <name>tex 3 - blowjob.json</name>
        <report_id>d9e2a9e5-7472-4ed3-88d9-0cc4f92b78e5</report_id>
        <tags>
          <value>json</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>d9a5dc47457c7f2d3b70e8ea49467bdc0953a0b930d6718bffff04fc0f06ee01</id>
    <title>Analysis Report for d9a5dc47457c7f2d3b70e8ea49467bdc0953a0b930d6718bffff04fc0f06ee01</title>
    <updated>2026-04-13T03:17:32Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6073f9522792fdaf7f55</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc603f5ea31bc68a248e1d</flow_id>
        <hash>d9a5dc47457c7f2d3b70e8ea49467bdc0953a0b930d6718bffff04fc0f06ee01</hash>
        <iocs>
          <urls>
            <value>
              <url>http://www.slf4j.org/codes.html#unsuccessfulInit</url>
              <origin>APK_DECODING</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>slf4j.org</url>
              <origin>APK_DECODING</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>heagoo@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <btc_wallets>
            <value>
              <btc_wallet>1111111111111111111111111111</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>3333333333333333333333333</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
          </btc_wallets>
        </iocs>
        <name>13e724bbfab8fe03f142b6b14dcfa51b</name>
        <report_id>d183f77a-74e1-4b7c-aed2-71521d9b73fc</report_id>
        <tags>
          <value>apk</value>
          <value>expand</value>
          <value>lolbin</value>
          <value>signed</value>
          <value>crypto</value>
          <value>evasive</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>8e6a982734e1ea26a7a283c8f6058fdd314b20eb015454f47a92ab7642ab50e1</id>
    <title>Analysis Report for 8e6a982734e1ea26a7a283c8f6058fdd314b20eb015454f47a92ab7642ab50e1</title>
    <updated>2026-04-13T03:17:08Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6040f9522792fdaf7f47</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc60285ea31bc68a248ddd</flow_id>
        <hash>8e6a982734e1ea26a7a283c8f6058fdd314b20eb015454f47a92ab7642ab50e1</hash>
        <iocs>
          <emails>
            <value>
              <email>android@android.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>android@android.com0</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
        </iocs>
        <name>13cef511db154e61dfcadb2420a7d5d7</name>
        <report_id>490d4566-5eb0-48c4-bbc7-4d18316a00dd</report_id>
        <tags>
          <value>apk</value>
          <value>signed</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>1ed64cd807c885bff74aa6857db630b386af32646437b1bac17ee0c5025ebdcf</id>
    <title>Analysis Report for 1ed64cd807c885bff74aa6857db630b386af32646437b1bac17ee0c5025ebdcf</title>
    <updated>2026-04-13T03:17:02Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc604780678438b878ac1c</_id>
        <file_type>application/x-msdownload; format=pe64</file_type>
        <flow_id>69dc602b5ea31bc68a248de1</flow_id>
        <hash>1ed64cd807c885bff74aa6857db630b386af32646437b1bac17ee0c5025ebdcf</hash>
        <iocs>
          <files>
            <value>
              <SHA-256>00b29ff34ee42519133cfb568c3f0e391b684d08fa4f5fe2d36e9fe681ebe45b</SHA-256>
              <SHA-1>27e97561694948f3c1b27951c05d3a95f00a606f</SHA-1>
              <MD5>1054ed087d007f2bb98d619acb8ae438</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>010df0fa3623e28413e7431280185c7b00b1f75de80de7137df5b471f62b137b</SHA-256>
              <SHA-1>a1aefc0774649bfe505b1bd10efbf48436fb49f4</SHA-1>
              <MD5>eaf7aef91f1a2ad589da17cc7f21d629</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>0809ac4240c653a62a5704034ef732234ed442a2d53327835023bc51d3988752</SHA-256>
              <SHA-1>721bb35244fba7e1df0ce02bc419706ae5ac8d42</SHA-1>
              <MD5>024eb2d598bcc7899dd39e26fd418bc7</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>10ef92a58b0484f44a98d5dee44819d296f9f013cb32884927b8ed4ac0e7d76b</SHA-256>
              <SHA-1>d00a7d082983937f27323bb5094a661e8e56fd20</SHA-1>
              <MD5>35bd75704ad46369b998abfa9be71466</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>3ab0eca87d7e368f779322dcf0e487a80a706dea02817b23390083767f90a924</SHA-256>
              <SHA-1>47a40040ff001332b8e2c5d99aea34a5859a6dc9</SHA-1>
              <MD5>c04cc800ff8ffc492cc498fe8c6c848e</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>48c8e4b79ee3b59ba8166cfe4fbbf1591910d6b15ab030c71ad1219cac5e3b43</SHA-256>
              <SHA-1>0e7e06912d4c4de1e8419648c6e34f34a3d5cf83</SHA-1>
              <MD5>ca30592eb8c08ac8de33dc7549da89c0</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>5837cd580d7f5a2902f61d7a69a1535c5d810465879c53f0f24a16a878d36836</SHA-256>
              <SHA-1>44bf2a4469f56f35a75e08a978b45283b5c53d4d</SHA-1>
              <MD5>dc04f22f1d78500d1ee4eb9656adfa48</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>5d8bf50c975b98798aed11a543870acb1e90dce77abb03f5337cc065c5d06eb9</SHA-256>
              <SHA-1>7852ac1cc9603a934130695b732c60a07ff1845d</SHA-1>
              <MD5>653a2432988ba5771ef3cdcf95338fe5</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/png</file_type>
            </value>
            <value>
              <SHA-256>78661ca33d71c16cbe3aaff82478613e918e397e08b4fd507e89922e153d22c3</SHA-256>
              <SHA-1>55f1d6548340c32f3e79178d77df8998f780ec37</SHA-1>
              <MD5>bf2d68e1320dee1ab0373a52eac5cb35</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>8909397c204c3fd2c84de7eaa28a59d1cafbc271dfc5fc8af91419b3632ba66c</SHA-256>
              <SHA-1>7afc41d916ac34d2f76532f03f7e618380d1fbb6</SHA-1>
              <MD5>b50fb8c7b4d862f2e4dfea337ddd7d1e</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>993a4e0d9664d4f61f8d1eaea2f892ac218b5f43d74f0c3ece889c6834609409</SHA-256>
              <SHA-1>0f088e1083ec51d3a4193ac4c0b8cd953c6bef4a</SHA-1>
              <MD5>566aa96926dd05910b12f93b2d9ca67a</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>9ad987f628af72d04367db93b51cdd5950a2ea882a92747eef558be65080680d</SHA-256>
              <SHA-1>cfd1db20d460a31875c9e31ed71dfa2dd54fb277</SHA-1>
              <MD5>a6c0b520dbe54dd2dfe5e89fc9f337d9</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>a88ad863e202624fbad3d3f9055f947af97f9a040345fe71988d2c3ceba02e92</SHA-256>
              <SHA-1>3a7ab18ed4c4776db7d3bb8ade07dde5d3062fbd</SHA-1>
              <MD5>f9bd2ce1e03f5cdb45b586bac2220e66</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>bd0e78c202bf3149c9e42efd6f4f0def593adc8237ec3cddce21362f14a4645d</SHA-256>
              <SHA-1>0735a0a6cedea58aed88227b745f5da813e38e46</SHA-1>
              <MD5>6bb3243c0b783dc2d5f9f5e8a649de33</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>c2d549c6620379243df20571002aad8989c8fe5044861959a01d6d89bf22f791</SHA-256>
              <SHA-1>d854a363df6a0ab230664577f9c8c5b28612d443</SHA-1>
              <MD5>eb0c1f6ca4a40c9c59558ce738591d14</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>d715905490068e6c28a3e8d506d42f8b60006db3deb617ac0a7597bc33a1aceb</SHA-256>
              <SHA-1>666e684e8e880daa46e4a3d87408a31a0ceb7327</SHA-1>
              <MD5>bfb452eb7f22be355045e06f8c521e40</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>e5bfbb12b24715bb808628c701b3446df821734a5bc052d98d26648199f78fe8</SHA-256>
              <SHA-1>c7ac84934d04d0d6da8d9e4d37b1a2579f4a4537</SHA-1>
              <MD5>68fedf17f933f078adf49afd6875caf2</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>ee30cab734cefd95e8cd4a8db6da0b2403ca6c7e418f67768eff5ef91645f230</SHA-256>
              <SHA-1>0790c89b19676a5f3e86a79f64f32e8ecfff81d0</SHA-1>
              <MD5>0e98495d7cebc672998221b5d548994f</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>f3bdd4c0da12fe323348375010f1eb50a3d1abbd02e112c66082a16cd7abf32d</SHA-256>
              <SHA-1>540f5b100cf776b196021bf3bad44e1bad31ef3d</SHA-1>
              <MD5>d9323f3dc4c2dd3714a3c03bff47a117</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
          </files>
        </iocs>
        <name>HMC_2.3.exe</name>
        <report_id>78fb9983-2be5-4fab-ba2e-39d4b252201c</report_id>
        <tags>
          <value>peexe</value>
          <value>evasive</value>
          <value>packed</value>
          <value>anti-vm</value>
          <value>overlay</value>
          <value>golang</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>b93bdec0dee11cf29cbeb8d111ca031e628d4f0b23d478f4b5248842ebc859ee</id>
    <title>Analysis Report for b93bdec0dee11cf29cbeb8d111ca031e628d4f0b23d478f4b5248842ebc859ee</title>
    <updated>2026-04-13T03:16:59Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6052f9522792fdaf7f4d</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc601e799d5bf325fa5cba</flow_id>
        <hash>b93bdec0dee11cf29cbeb8d111ca031e628d4f0b23d478f4b5248842ebc859ee</hash>
        <iocs>
          <urls>
            <value>
              <url>https://instagram.com/hosseinabaspanahoriginal</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://patch.chelpus.com/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.luckypatchers.com/download/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>instagram.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>luckypatchers.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>patch.chelpus.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot-core-oj.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@core.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@framework.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@services.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>nSaNX@forpda.ru</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>pkg.apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>alyaksandr.koshal@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>lp.chelpus@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>APK_DECODING</origin>
            </value>
          </ips>
        </iocs>
        <name>13969c1b3d83708725c045b5d85c410a</name>
        <report_id>19257196-fd15-4a9e-a136-1f3a97658c91</report_id>
        <tags>
          <value>apk</value>
          <value>invalid-signature</value>
          <value>fingerprint</value>
          <value>persistence</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>240d5d1d1b9920211674eae4277fc8ad862fe7c573f6b7c9ff34f4a328cf76d8</id>
    <title>Analysis Report for 240d5d1d1b9920211674eae4277fc8ad862fe7c573f6b7c9ff34f4a328cf76d8</title>
    <updated>2026-04-13T03:16:06Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc601ef9522792fdaf7f41</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5fe53a506932d7c073c5</flow_id>
        <hash>240d5d1d1b9920211674eae4277fc8ad862fe7c573f6b7c9ff34f4a328cf76d8</hash>
        <iocs>
          <urls>
            <value>
              <url>https://instagram.com/hosseinabaspanahoriginal</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://patch.chelpus.com/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.luckypatchers.com/download/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>instagram.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>luckypatchers.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>patch.chelpus.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>alyaksandr.koshal@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>lp.chelpus@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot-core-oj.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@core.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@framework.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@services.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>nSaNX@forpda.ru</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>pkg.apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>APK_DECODING</origin>
            </value>
          </ips>
        </iocs>
        <name>12c0f6658140ebeb336d3b4e050bc3ee</name>
        <report_id>e7a1bfb2-1416-4046-b528-8013597fe40d</report_id>
        <tags>
          <value>apk</value>
          <value>invalid-signature</value>
          <value>fingerprint</value>
          <value>persistence</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>d6b88d0c2daf700ce1a3f8f66ec683832efdfed2bedba6a11bfbb32db9f19d8d</id>
    <title>Analysis Report for d6b88d0c2daf700ce1a3f8f66ec683832efdfed2bedba6a11bfbb32db9f19d8d</title>
    <updated>2026-04-13T03:15:43Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5fe680678438b878ac09</_id>
        <file_type>text/plain</file_type>
        <flow_id>69dc5fdc5ea31bc68a248ccb</flow_id>
        <hash>d6b88d0c2daf700ce1a3f8f66ec683832efdfed2bedba6a11bfbb32db9f19d8d</hash>
        <iocs/>
        <name>liblist.gam</name>
        <report_id>050667ef-8f07-44e4-9a85-356e55bc402d</report_id>
        <tags>
          <value>txt</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>80cdc99133d0ecd4f8090862d9c4e7efb9aaedc7284a8d67ba24f96cfad4eb89</id>
    <title>Analysis Report for 80cdc99133d0ecd4f8090862d9c4e7efb9aaedc7284a8d67ba24f96cfad4eb89</title>
    <updated>2026-04-13T03:15:41Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc6012f9522792fdaf7f3e</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5fcd9124ebc0875083ec</flow_id>
        <hash>80cdc99133d0ecd4f8090862d9c4e7efb9aaedc7284a8d67ba24f96cfad4eb89</hash>
        <iocs>
          <urls>
            <value>
              <url>https://github.com/journeyapps/zxing-android-embedded</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://journeyapps.com/</url>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://127.0.0.1</url>
              <origin>APK_DECODING</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/app-store/apps/</url>
              <origin>APK_DECODING</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/community/modules/</url>
              <origin>APK_DECODING</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/community/posts/</url>
              <origin>APK_DECODING</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/community/posts/user/</url>
              <origin>APK_DECODING</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/community/posts?page=</url>
              <origin>APK_DECODING</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/community/users/</url>
              <origin>APK_DECODING</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/community/users/search?q=</url>
              <origin>APK_DECODING</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/modules/</url>
              <origin>APK_DECODING</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/notifications</url>
              <origin>APK_DECODING</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/notifications/read/</url>
              <origin>APK_DECODING</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/teams/</url>
              <origin>APK_DECODING</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/user/devices/</url>
              <origin>APK_DECODING</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>https://api.shiaho.sbs/api/v1/users/</url>
              <origin>APK_DECODING</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>api.shiaho.sbs</url>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <url>github.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>journeyapps.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>APK_DECODING</origin>
            </value>
          </ips>
        </iocs>
        <name>1277177e27707db6710f59fae594855b</name>
        <report_id>5a83c0e1-5696-478b-80a9-3076f3f178e1</report_id>
        <tags>
          <value>apk</value>
          <value>android</value>
          <value>fingerprint</value>
          <value>persistence</value>
          <value>anti-debug</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>79f93436f57f43032597d0cc89ac5ce2f9812458a363ad4c08d553d34f6679c3</id>
    <title>Analysis Report for 79f93436f57f43032597d0cc89ac5ce2f9812458a363ad4c08d553d34f6679c3</title>
    <updated>2026-04-13T03:15:22Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5ff6f9522792fdaf7f36</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5fbd5ea31bc68a248c77</flow_id>
        <hash>79f93436f57f43032597d0cc89ac5ce2f9812458a363ad4c08d553d34f6679c3</hash>
        <iocs>
          <urls>
            <value>
              <url>http://xmlpull.org/v1/doc/properties.html#xmldecl-version</url>
              <origin>APK_DECODING</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://schemas.xmlsoap.org/soap/encoding</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://schemas.xmlsoap.org/soap/envelope</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://www.garmin.com/xmlschemas/TrackPointExtension/v1</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.google.com/AdMob</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.topografix.com/GPX/1/1</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.topografix.com/GPX/1/1/gpx.xsd</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.w3.org/2001/XMLSchema-instance</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://github.com/felldo/JEmoji?tab=readme-ov-file#-jemoji-language-module</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://github.com/gotev/android-upload-service</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://github.com/scubajeff/lespas#readme</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>garmin.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>github.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>google.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>schemas.xmlsoap.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>topografix.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>w3.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>xmlpull.org</url>
              <origin>APK_DECODING</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>INPUT_FILE</origin>
            </value>
          </ips>
          <uuids>
            <value>
              <uuid>00001101-0000-1000-8000-00805F9B34FB</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
          <btc_wallets>
            <value>
              <btc_wallet>ZgwNAcx3nSStfzAGTBiVTfQyU</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>mZx42RuuJJ98pNDjH9TczNPcL</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>pVqQQ5cuXYD5cMeQUX5aFo5MM</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
          </btc_wallets>
        </iocs>
        <name>123e5ac46f63414561e42fc40f1416bd</name>
        <report_id>dcb6fe56-365a-4610-b3f2-90655e3568f6</report_id>
        <tags>
          <value>apk</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
          <value>adware</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>ad4e53b50568a7357c66fdd65eea533cd43912a14d7d5d121186cf9836cb500a</id>
    <title>Analysis Report for ad4e53b50568a7357c66fdd65eea533cd43912a14d7d5d121186cf9836cb500a</title>
    <updated>2026-04-13T03:14:49Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5fc5f9522792fdaf7f2c</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5f9d9124ebc0875083cf</flow_id>
        <hash>ad4e53b50568a7357c66fdd65eea533cd43912a14d7d5d121186cf9836cb500a</hash>
        <iocs/>
        <name>1208d9a566c9be6d9f72cd90bf712a38</name>
        <report_id>e83023de-4f88-4c4b-b5c9-a8f06c2eea69</report_id>
        <tags>
          <value>apk</value>
          <value>signed</value>
          <value>anti-debug</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>fingerprint</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>d84e898e90149aeb1e04520c7560ecf9fd7997035f168b8be3524624dbfd9ace</id>
    <title>Analysis Report for d84e898e90149aeb1e04520c7560ecf9fd7997035f168b8be3524624dbfd9ace</title>
    <updated>2026-04-13T03:14:22Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5f983040601e24ad5d3b</_id>
        <file_type>application/x-msdownload; format=pe64</file_type>
        <flow_id>69dc5f8d799d5bf325fa5b93</flow_id>
        <hash>d84e898e90149aeb1e04520c7560ecf9fd7997035f168b8be3524624dbfd9ace</hash>
        <iocs>
          <urls>
            <value>
              <url>https://raw.githubusercontent.com/a2x/cs2-dumper/main/output/client.dll.json</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://raw.githubusercontent.com/a2x/cs2-dumper/main/output/offsets.json</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>raw.githubusercontent.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>185.199.111.133</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>185.199.111.133</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df</SHA-256>
              <SHA-1>4260284ce14278c397aaf6f389c1609b0ab0ce51</SHA-1>
              <MD5>1e4a89b11eae0fcf8bb5fdd5ec3b6f61</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>89960e9b7f30db14bb157e4da441d92a0b1c2fa92eb021222e6257f089d4daaf</SHA-256>
              <SHA-1>6812500a14225862acec6a5962541aa08414b5ff</SHA-1>
              <MD5>c4d56472e6a171dcdab2d352c596daa9</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>application/json</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
          </files>
          <btc_wallets>
            <value>
              <btc_wallet>135cbde4361c69c8619793ee92b5b31a</btc_wallet>
              <origin>EXTERNAL_PARSER</origin>
            </value>
          </btc_wallets>
        </iocs>
        <name>CS2-Glow.exe</name>
        <report_id>6aae96c3-51c9-4200-b03e-827289ecb5b1</report_id>
        <tags>
          <value>peexe</value>
          <value>json</value>
          <value>microsoft_visual_cc</value>
          <value>anti-debug</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>175aeecfd01c1c76e8b755db8938d0e42cb0382f86637b863b5200aed635653a</id>
    <title>Analysis Report for 175aeecfd01c1c76e8b755db8938d0e42cb0382f86637b863b5200aed635653a</title>
    <updated>2026-04-13T03:14:22Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5fa280678438b878abfd</_id>
        <file_type>application/x-msdownload</file_type>
        <flow_id>69dc5f8bcf2dcc2ba2622092</flow_id>
        <hash>175aeecfd01c1c76e8b755db8938d0e42cb0382f86637b863b5200aed635653a</hash>
        <iocs>
          <urls>
            <value>
              <url>http://crl.globalsign.com/ca/gstsacasha384g4.crl0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://crl.globalsign.com/codesigningrootr45.crl0V</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://crl.globalsign.com/gsgccr45codesignca2020.crl0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://crl.globalsign.com/root-r3.crl0G</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://crl.globalsign.com/root-r6.crl0G</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://ocsp.globalsign.com/ca/gstsacasha384g40C</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://ocsp.globalsign.com/codesigningrootr450F</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://ocsp.globalsign.com/gsgccr45codesignca20200V</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://ocsp.globalsign.com/rootr30;</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://ocsp2.globalsign.com/rootr606</url>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07</url>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <url>http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.crl0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://schemas.microsoft.com/SMI/2005/WindowsSettings</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://schemas.microsoft.com/SMI/2016/WindowsSettings</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://secure.globalsign.com/cacert/codesigningrootr45.crt0A</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://secure.globalsign.com/cacert/gsgccr45codesignca2020.crt0=</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://secure.globalsign.com/cacert/gstsacasha384g4.crt0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://secure.globalsign.com/cacert/root-r3.crt06</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.globalsign.com/repository/0</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>crl.globalsign.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>globalsign.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>ocsp.globalsign.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>ocsp2.globalsign.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>pki-crl.symauth.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>schemas.microsoft.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>secure.globalsign.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>infra@dlsite.com0</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>104.18.20.226</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>146.75.122.133</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>104.18.21.226</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>1.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>6.0.0.0</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>216.168.246.31</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>13.107.226.45</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>104.18.21.226</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>104.18.20.226</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>146.75.122.133</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>216.168.246.31</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>13.107.226.45</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>0065456ec00dd4cf2ac2772f09123385fc8a583c98b43e7bb59d9e57f1735563</SHA-256>
              <SHA-1>fe12ed25934c4a131af59ed8a23bbc484848d0fa</SHA-1>
              <MD5>f61b941715c498b58497e910c1269ffe</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>0dfd7ffde0249961313ed382c9e82af766e2ae9b03bd8e4d26760e636a449727</SHA-256>
              <SHA-1>844354daadb4e61387335dccf9c4bc586ffd8db5</SHA-1>
              <MD5>d418d4ee80256247cee7ad94e595ca3e</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>25790530a0476650921f9dda9f7ee0782a8615ddab4bcfa0e51544a90bcce65a</SHA-256>
              <SHA-1>7cec3f82cd6a87ae479e99dfeb66a96588b618a8</SHA-1>
              <MD5>20594e69f77ab7f839c2da2927b50fab</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>3caae932bd8cb729edbe71bb5103cc4ca8c16d4fb1705531d50eba110e00d215</SHA-256>
              <SHA-1>94bd4787e30d338b194bf48e7588106cfe81e9c7</SHA-1>
              <MD5>776bfa2c43fc4575cd58715068f8db91</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>4a170da78cc33d3d277698c0d46b9bdc36a9c26cdbd9dfc109d01a4a23a14882</SHA-256>
              <SHA-1>c4a851602d03b60bca05a4056b473a43d782b976</SHA-1>
              <MD5>f696cbb13de7020fb6a1eb320d051e01</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>5935ca242703822cfd670071c3221cd6ee78db384b9a5234e58b661cd0e08ed1</SHA-256>
              <SHA-1>b15fb5c1410b179040ed34232b77f86ef6377d85</SHA-1>
              <MD5>4013868327c4b3f276e5440a027f280b</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>5c92a41adaf3265071482fd1a182ae8702c168636a7d9ff51798ee3a1dfc8500</SHA-256>
              <SHA-1>d046e23f2ee2b93ad96be8e1dc9120ecf3915091</SHA-1>
              <MD5>f7731730720cfe035cf030b40d0e2eb6</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>60129ce8bb35da4664cdae97cd4bb436ca350f90a380ee00dd514141c0aa10d6</SHA-256>
              <SHA-1>6daae4c8500a090e5d543b40eb88c72c46dab07d</SHA-1>
              <MD5>aee766cf5abe68a6431ee1e90b1a5a5a</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>66116b6f945ac5544a899c958cc265b3d27c0e5f4bf91d108039f7e67c82279e</SHA-256>
              <SHA-1>9de68155583b349ef25641cd4700a35acaa414f8</SHA-1>
              <MD5>7b97004eb2299f219486f9b9875f3651</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>76f214fadb795d659938ee1daaf9f9877163d6b62c01c8ce1e177c2a99636046</SHA-256>
              <SHA-1>424f3a376e234739344444b7bc40926036bcc42b</SHA-1>
              <MD5>f0d1f13777b7ffce6c48223ba9b5b2e1</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>79e3df2b6e9d6886114f940307ef0ba8f012280e80f989cc06870113d3c173db</SHA-256>
              <SHA-1>17f3c88b25f6803a6a87725c0b54422f50e78c4e</SHA-1>
              <MD5>e3796922260883c682600532b17bf43c</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>872ab3d074c6be95da881519f6db54c5c8a05dd606e05fb13e81e87a19be969d</SHA-256>
              <SHA-1>46e0669f55f012bd10e68ac5fdd0346d1e23a4a9</SHA-1>
              <MD5>0b535503222abeb663513054737bf177</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>8e090a6538716f33ecf98a3f3a101f244792a0b5e302fcb6d244176756c4e0a4</SHA-256>
              <SHA-1>da024971c450f9cf0061f40fac64f71de9d2c1e9</SHA-1>
              <MD5>ed34d7fd082412ba4f3d75b1e58882d4</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>92505d9b180ec5bf62d4e507c2e1f2f1d183018d39aae470100edb79d1ae32ee</SHA-256>
              <SHA-1>b75853187986c31b54b655a6eda354154e44fb97</SHA-1>
              <MD5>f9fa343bc024d9a1735b42e3ff1982e8</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>a529e62697d42909809d4cc2d615f02a428b0fa50a35dbbd3844be1ce4e6ad1a</SHA-256>
              <SHA-1>4eeb33a0ee8872fce22822c6b7a5b63cbc677a80</SHA-1>
              <MD5>2917cfb754d6ad39975e0542df8e2367</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>cd36bf3131e84e3828b8a28427952512991481435fe1ac0636dc8add6a83e421</SHA-256>
              <SHA-1>e74cf010ed55a6158f09dc9d7f312c13d07d1dd1</SHA-1>
              <MD5>5be3b31751ed2405d5064d017f76b600</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>e3ccd7a6be777a50b8aae463d0e04b2e34893ba62278f08d2b86d920d5ef37f1</SHA-256>
              <SHA-1>f4143b7c91cdd5e0f4b370dbad286e6dc5502819</SHA-1>
              <MD5>d9cc351c0fbbbd91924144d1cb90aa75</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>ed57f1af81eeddbbc8cab7f4098f2b601041341596142882e727bb985be851f2</SHA-256>
              <SHA-1>a54aa4adedce5cf1656f69041192f1e9a53a76ed</SHA-1>
              <MD5>246c1fa6b0574ad00b3dfd3705182100</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>ee5ab40a67a77e017fb5d36866f944a1f42bc23849d06424c36e843e5d64c22f</SHA-256>
              <SHA-1>fc235afc2042ac8f91274f311e217818ec65f99d</SHA-1>
              <MD5>e485dd6e4895028e87d3d48cba300d58</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128</SHA-256>
              <SHA-1>8c015d80b8a23f780bdd215dc842b0f5551f63bd</SHA-1>
              <MD5>5bfa51f3a417b98e7443eca90fc94703</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>application/octet-stream</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
          </files>
          <uuids>
            <value>
              <uuid>1f676c76-80e1-4239-95bb-83d0f6d0da78</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>35138b9a-5d96-4fbd-8e2d-a2440225f93a</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
        </iocs>
        <name>SexWithFoxSister.exe.bak</name>
        <report_id>faf8b5aa-f072-4751-816a-9edbc9d68c9e</report_id>
        <tags>
          <value>peexe</value>
          <value>data</value>
          <value>packed</value>
          <value>masquerade</value>
          <value>enigma</value>
          <value>microsoft_visual_cc</value>
          <value>obfuscated</value>
          <value>signed</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>6c75382afbd983d59de59db58005a56c7a802be52910d2f5add16b5a9a810048</id>
    <title>Analysis Report for 6c75382afbd983d59de59db58005a56c7a802be52910d2f5add16b5a9a810048</title>
    <updated>2026-04-13T03:13:48Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5f7780678438b878abf1</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc5f6b799d5bf325fa5b57</flow_id>
        <hash>6c75382afbd983d59de59db58005a56c7a802be52910d2f5add16b5a9a810048</hash>
        <iocs>
          <urls>
            <value>
              <url>http://schemas.microsoft.com/SMI/2</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>schemas.microsoft.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>150.171.109.100</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>150.171.109.100</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>23202710be8c5fc9672495b0b62bebcf29a087cc7e07236f6bb155efb6e499ad</SHA-256>
              <SHA-1>a60ebbbcae868abd27fc96e22701fae48940e53c</SHA-1>
              <MD5>16ec11406456535d1de48d96513667e8</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>3b904ab04cb29f4f2cf083c2b133a494ad05e6ef5c6a0243c31b51fc25e6941f</SHA-256>
              <SHA-1>0767eeafe33c83161aec47ea2c28a30ba954fdc9</SHA-1>
              <MD5>fd29301b5d8935606626f78b52b99694</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>text/xml</file_type>
            </value>
          </files>
          <uuids>
            <value>
              <uuid>1f676c76-80e1-4239-95bb-83d0f6d0da78</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>35138b9a-5d96-4fbd-8e2d-a2440225f93a</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>e2011457-1546-43c5-a5fe-008deee3d3f0</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
          <registry>
            <value>
              <registry>Software\</registry>
              <origin>DOTNET_DECOMPILATION</origin>
            </value>
          </registry>
        </iocs>
        <name>cscript597.exe</name>
        <report_id>4d60137c-0747-4de0-8f2f-a1580bfb61d8</report_id>
        <tags>
          <value>peexe</value>
          <value>dotnet_pe</value>
          <value>asyncrat</value>
          <value>reg</value>
          <value>fareit</value>
          <value>razy</value>
          <value>samas</value>
          <value>anti-vm</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>reconnaissance</value>
          <value>lolbin</value>
          <value>schtasks</value>
          <value>obfuscated</value>
          <value>vbnet</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>4558f847a489bcbbe43ad16837a7edfc583a890f83c477927ab174452c4cc6d4</id>
    <title>Analysis Report for 4558f847a489bcbbe43ad16837a7edfc583a890f83c477927ab174452c4cc6d4</title>
    <updated>2026-04-13T03:13:21Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5f5a80678438b878abe8</_id>
        <file_type>application/x-doom</file_type>
        <flow_id>69dc5f4fc33dc5a985d7963d</flow_id>
        <hash>4558f847a489bcbbe43ad16837a7edfc583a890f83c477927ab174452c4cc6d4</hash>
        <iocs>
          <emails>
            <value>
              <email>Aou@5557775..3.4447771p1</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>IHIIKLLWLHB-@H.LJLL</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>J2@TB.U.B4</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <btc_wallets>
            <value>
              <btc_wallet>2D322222333322333323223332</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>3222223333332222DD333332</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>333633599863G33336666663366</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>333EEC3EE3CC2322A3CC3CC333ECC3E2</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>33E6666636633565555554445</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>3G3366363668666666636886366G</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>633666666666666633333333C2</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>6366333E33333G33G33C233EC2EEC2</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>853373768776G333322GEF23C</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>CC33CCCE3G333EG3EE3333E3CCCC</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
          </btc_wallets>
        </iocs>
        <name>H2LCRETE.wad</name>
        <report_id>fea1b719-74f0-4e0a-a7fa-02cbb2038236</report_id>
        <tags>
          <value>anti-vm</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>3826c6177aa668eba668c34f8fb7cd212aef6f056abdcae3cddb71521eb9f3d2</id>
    <title>Analysis Report for 3826c6177aa668eba668c34f8fb7cd212aef6f056abdcae3cddb71521eb9f3d2</title>
    <updated>2026-04-13T03:13:06Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5f7380678438b878abef</_id>
        <file_type>application/x-msdownload; format=pe32</file_type>
        <flow_id>69dc5f415ea31bc68a248b27</flow_id>
        <hash>3826c6177aa668eba668c34f8fb7cd212aef6f056abdcae3cddb71521eb9f3d2</hash>
        <iocs>
          <urls>
            <value>
              <url>http://dejavu.sourceforge.net</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://dejavu.sourceforge.net/wiki/index.php/License</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://scripts.sil.org/OFL</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.google.com/get/noto/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.monotype.com/studioThis</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>dejavu.sourceforge.net</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>google.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>monotype.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>scripts.sil.org</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>P@pV0.SqDZ</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>142.251.14.138</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>104.18.12.149</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>1.18.31.24</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>4.2.2.34</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>42.32.86.58</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>5.5.22.5</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>172.66.149.239</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>104.19.173.57</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>104.18.12.149</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>142.251.14.138</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>104.19.173.57</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>172.66.149.239</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>12c55fbd39b9b536fee65b26506ce6e0a48ca5df6e739c4db57b1643ea90af75</SHA-256>
              <SHA-1>4cddc8f0d81efdc7428c616fb6aed36abca37f13</SHA-1>
              <MD5>c4ccedf0980640c0f3d11f56f0073dea</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>1b5c9a51ee338da84fee135043344be9afb253eebc1fdbbdebb5323f8fea3a5f</SHA-256>
              <SHA-1>1e3f0b53a26647d7ca87dbee9d7de5d26697657e</SHA-1>
              <MD5>0ccf1d9107f6f127ecb048c9a39295ea</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>20dd4a134377a4920a9bd10036317ea1fd9cf93d60523e454d4b1c99bf7c7d36</SHA-256>
              <SHA-1>dcd05a41e0cd534986fe42b6ed1ef91ff2e17b3c</SHA-1>
              <MD5>e39e534f9843bf785a9e11fce2b2b232</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>2ee6cdacac0d6855662c4b2ecb851132013f19222a0cc02a427588e155fc69ef</SHA-256>
              <SHA-1>ee462338cf2fb05d400044c076720b69cbe95e0a</SHA-1>
              <MD5>9dfbc7de2d3e6ef8359342d1176c86f9</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>496ca35b39ee3b409a0c6a2ac8eb5f0c5db63a2aa2146eb2241c9b983e1ac041</SHA-256>
              <SHA-1>f7a1573b285dc810a21750409868f8791ad2a503</SHA-1>
              <MD5>16dd0ff20e4912c0f45ac27b3492230f</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>6d823686b9ffabe4e24c3f0accccfa21d1b1c0766b963c3d1126531b78197ddd</SHA-256>
              <SHA-1>6f444739494a5ceeb4b8042cb7c90a632a434639</SHA-1>
              <MD5>110a1b6f41aeea56abdcab8ff7b14716</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>751efa130d41eba20799ab0ae4c513aa048ddf79a8989340e87a844dc5bffe59</SHA-256>
              <SHA-1>37a805740cd9ad0a822d6c3aa5727afd4cf139d1</SHA-1>
              <MD5>2bb094936a627afe8cefb60d1ac10fea</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>b84c99b0fd11bc87eac663556b4478e5691c1f30cf233693e27d5da59b156da5</SHA-256>
              <SHA-1>8cdc1b16002202cddad9973bda9cd5d6d86bf812</SHA-1>
              <MD5>f7c9ed4f1ff19f01afdde9d61b904632</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>e74517213c0d1ce653b194c5218beee6df5ee9ab78efc09d20ac384231914faa</SHA-256>
              <SHA-1>78338a19fb093db755ba03d7df83035102408c8b</SHA-1>
              <MD5>e6a7f7688784d8f3dc7880981e62d77a</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>ed860d6743c711d3f20a1b52c8c10db1165558f73cef72a75a567262d6e2d339</SHA-256>
              <SHA-1>793378dd0440a9edfb3a954c443b51012a31be2a</SHA-1>
              <MD5>8476a385b337e78bb9808176d9c2e3fb</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>edf64853877b02a6920893dce17bdad1af4d93d051e6e3da8d9d61c2eaab57e5</SHA-256>
              <SHA-1>d3667b2184c3e86ade755b9b24349f4e23714bba</SHA-1>
              <MD5>8653b6e872e9f29519b683255b49a799</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>f3b1cc6c328339aa612c511b487ddacb6e390257441e000478b92e40ebec5ba3</SHA-256>
              <SHA-1>9d528d46b18a05cca972f4c33750abbfe0c5d9ed</SHA-1>
              <MD5>62afea2538cfa85cad70e55de054eb9f</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/png</file_type>
            </value>
            <value>
              <SHA-256>fa887971528d8118a13be2d31b5d1394eec5c790a1be20d873f06884c29b6d39</SHA-256>
              <SHA-1>099a760c1fd433bb477b5ac443ff30129c6411de</SHA-1>
              <MD5>b2da3b2f3991c1456d6e73a22f8a4317</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>842e5dd16ba72b25be09064c05fd08f4bf1f7e92632953f34b8c1d50f01cce7d</SHA-256>
              <SHA-1>3454376e695b87b2de8af05f58f59bb7aaf1b0a7</SHA-1>
              <MD5>078fecb4b630c45d16a20c28f7963956</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <SHA-256>c070f388cf94deec56df64de5eab16d77f537506ec8495721c949da27a7d7a3f</SHA-256>
              <SHA-1>4af5d4175f7a91865ac60f640c9df381a5642fa4</SHA-1>
              <MD5>da9c3221bf8695459c4c40066e1422cb</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <SHA-256>5152fb6a8f623b768dae94174c3a3df727984bb6bf004f5ef111144940d7eb83</SHA-256>
              <SHA-1>d3868d67e40c9bef9961032ff7c31dad24b690b9</SHA-1>
              <MD5>63a619b30aa395122736c0f2dd9cb116</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <SHA-256>05540dfb4cf879b1ee627a5a2555eea15761618ad0af1db430e82914ccabcfc7</SHA-256>
              <SHA-1>82e8a6be66ef9ff1c935fff7dbe88e3e9e9e20e7</SHA-1>
              <MD5>d59a882fc23e2955e7a802711f0055b6</MD5>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/html</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
          </files>
        </iocs>
        <name>hardentools.exe</name>
        <report_id>abc7388d-5ea2-4533-b589-558b36be89ac</report_id>
        <tags>
          <value>peexe</value>
          <value>html</value>
          <value>golang</value>
          <value>mingw</value>
          <value>signed</value>
          <value>adaptive-context</value>
          <value>anti-debug</value>
          <value>crypto</value>
          <value>packed</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>f6ba5ac4a7a90d8efb20b780f3f292539d13ac5cbcf7d94a15e86beec030e57e</id>
    <title>Analysis Report for f6ba5ac4a7a90d8efb20b780f3f292539d13ac5cbcf7d94a15e86beec030e57e</title>
    <updated>2026-04-13T03:13:00Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5f60f9522792fdaf7f19</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5f2d9124ebc087508375</flow_id>
        <hash>f6ba5ac4a7a90d8efb20b780f3f292539d13ac5cbcf7d94a15e86beec030e57e</hash>
        <iocs>
          <urls>
            <value>
              <url>https://github.com/REAndroid/ARSCLib</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>github.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
        </iocs>
        <name>10cfa9cc7270694b0a4e2b49f2a5ec3d</name>
        <report_id>8e7f50ac-6073-488b-8d3f-0bd4d616c3fd</report_id>
        <tags>
          <value>apk</value>
          <value>btmob</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>dc1f62066d5e3ea0fdfca9acad1c099588b3a4da152b728febd59bd24e334819</id>
    <title>Analysis Report for dc1f62066d5e3ea0fdfca9acad1c099588b3a4da152b728febd59bd24e334819</title>
    <updated>2026-04-13T03:12:06Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5f30f9522792fdaf7f0e</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5ef8799d5bf325fa5aa3</flow_id>
        <hash>dc1f62066d5e3ea0fdfca9acad1c099588b3a4da152b728febd59bd24e334819</hash>
        <iocs>
          <urls>
            <value>
              <url>https://patch.chelpus.com/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.luckypatchers.com/download/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>luckypatchers.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>patch.chelpus.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>alyaksandr.koshal@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>lp.chelpus@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
        </iocs>
        <name>1008c16c6d1a691ea2605fe8d4257835</name>
        <report_id>ab637519-5c45-4b5e-b089-4f1cf7a0ce80</report_id>
        <tags>
          <value>apk</value>
          <value>fingerprint</value>
          <value>persistence</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>30a7a59181785c354f5e6cf671fa90d7c1c80e7070694d5bd09d8f0a695cd832</id>
    <title>Analysis Report for 30a7a59181785c354f5e6cf671fa90d7c1c80e7070694d5bd09d8f0a695cd832</title>
    <updated>2026-04-13T03:12:03Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5f1df9522792fdaf7f09</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5ef35ea31bc68a248a2c</flow_id>
        <hash>30a7a59181785c354f5e6cf671fa90d7c1c80e7070694d5bd09d8f0a695cd832</hash>
        <iocs>
          <urls>
            <value>
              <url>http://schemas.android.com/apk/res/android</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://mobimaster3g-default-rtdb.asia-southeast1.firebasedatabase.app</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>mobimaster3g-default-rtdb.asia-southeast1.firebasedatabase.app</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>schemas.android.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
        </iocs>
        <name>0ffee6a70670923465fdde09db4fbcd2</name>
        <report_id>e2e8ab05-6c60-44be-a6c4-51f58e72c1aa</report_id>
        <tags>
          <value>apk</value>
          <value>invalid-signature</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
          <value>dexprotector</value>
          <value>obfuscated</value>
          <value>packed</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>add610fdf46684fd77df7b173cbd4d9de562774db13fd39b5ad22aa66778c723</id>
    <title>Analysis Report for add610fdf46684fd77df7b173cbd4d9de562774db13fd39b5ad22aa66778c723</title>
    <updated>2026-04-13T03:11:38Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5f4f80678438b878abe4</_id>
        <file_type>application/x-dosexec</file_type>
        <flow_id>69dc5ee9d920e19044f92437</flow_id>
        <hash>add610fdf46684fd77df7b173cbd4d9de562774db13fd39b5ad22aa66778c723</hash>
        <iocs>
          <ips>
            <value>
              <ip>32.89.0.100</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>75.0.48.6</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>32.89.0.100</ip>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <ip>75.0.48.6</ip>
              <origin>EXTERNAL_PARSER</origin>
            </value>
          </ips>
          <files>
            <value>
              <SHA-256>0f56784396aa43a8c76c566919ef587a9c53f184037a3f896b727b10b2236a9a</SHA-256>
              <SHA-1>63ee493c7a87206c22ba6f12d9a9b3fd0ecdc1d2</SHA-1>
              <MD5>b2b81709a16addd5e174affe3a893b44</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>14fba0d4aef90172645d421b927cba8d8eb3ee51769a29eb47b118dd9202edd8</SHA-256>
              <SHA-1>5f55cb30e1f384fac634472c33ecf0cb6378a97e</SHA-1>
              <MD5>02100f62337eadbcef8cf01294c58dfe</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>1f06c608a95de133cbd97c457eec6b5aeb27826c54348733b28fa76c6d2b0150</SHA-256>
              <SHA-1>f082883f17eea7f7e227e87b8937f2fd2be7e8f0</SHA-1>
              <MD5>07a49bf1f03ad19ed3cc6ff480fc4968</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>34e51fefc76a7a39f3227adc866f97d738a62772b7d2487a6a37692593fd0443</SHA-256>
              <SHA-1>c8719f0260a678eece004543d6ceb41d15ff1112</SHA-1>
              <MD5>55162da16594811aac6390bc987d2f71</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>40f6916b78ce91e89f740a14cdc77ab0e69292daefb8e06abe4b67637ccc30c5</SHA-256>
              <SHA-1>4d8d9c94ac5da5fced2ec8a64e10e714a2515c30</SHA-1>
              <MD5>ef6299c68cccc1d20eccb8de2b14d2f4</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>4444776c6ce4c381a9b5c53ba8281711d026f03a2beeb984f97f134e6798b460</SHA-256>
              <SHA-1>b3b191c4dcd80e1bb4b1abe95b5902ea67428f82</SHA-1>
              <MD5>b654b80a7b1c3e7e722b4fc4107c3037</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>4d986f429905b1291c166dd6eda1f23e166668c4eb414ceafb79b88412607f37</SHA-256>
              <SHA-1>ed8e9b6cfcbec4a6404fd9a483ec88eeaea8374d</SHA-1>
              <MD5>8da168c08fb1e32f8e7c4fb8eb1abdbf</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>5daa005129f6706482a1ce299959e546bc0525594a44f2e4c14f99bf5dde9ac3</SHA-256>
              <SHA-1>a0b699bda3e8e095fce455016052ebb5643c0002</SHA-1>
              <MD5>3cac7940e03363a4fb2004f8cdc66574</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>609cf0e1c5d2f8c59ce55228574bd35efef29d9ea018a50a9bc73703d4170006</SHA-256>
              <SHA-1>edd0e22c5e81e93b7fd062f0694ee163af0032cf</SHA-1>
              <MD5>e3d3493a8aadecb9cec77d61dd54db11</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>806a64a1d9f2e632a195944d7f96e2512bec8f1066a59bf5fff78520c49c243d</SHA-256>
              <SHA-1>a2145ddd625081f5525100de7427760c35ea3f45</SHA-1>
              <MD5>0b74ccc1d17d243078857331a3145821</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>b413a82261d83f06a92cf704f7330df02e1b586bd541037d05abcd4f28e30cca</SHA-256>
              <SHA-1>d7448703d2450b441fc7d372322dcd2b2015cb5a</SHA-1>
              <MD5>b26ddba5953b6b26b1bb4e2c85c4b324</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>bc62607bd95403a57eef2b7b8cf03d85dbb35c0534c509cefe44d3e6bdbb80a0</SHA-256>
              <SHA-1>f0a3da795831b3c5d6b632707dd4707cca049467</SHA-1>
              <MD5>de06811fcceea1be4c8f7562c7d099e0</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>f4aab9894debc9e0b0266708ec9a49a44e6c26568c89f8e0df7e1e263b889e1e</SHA-256>
              <SHA-1>b355fe3553eb49b0174213ce85e0168bb52fe659</SHA-1>
              <MD5>8d9bb42f8c9c62aac47691011a189e39</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>fc7b839789dd8802667fe2cb452e8c925fc670415433f5c854f6f41cecd418a3</SHA-256>
              <SHA-1>b03ec7e3eda52a21eb3e7af32bf5aeba53de0040</SHA-1>
              <MD5>2885ea632d3b3ea6b3c6d10687e19823</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
          </files>
          <btc_wallets>
            <value>
              <btc_wallet>347f86eda46ff569143f6d1fad9d2d24</btc_wallet>
              <origin>EXTERNAL_PARSER</origin>
            </value>
          </btc_wallets>
        </iocs>
        <name>_add610fdf46684fd77df7b173cbd4d9de562774db13fd39b5ad22aa66778c723.exe</name>
        <report_id>71feaabd-a48a-47ac-93f6-ccaf80fc4306</report_id>
        <tags>
          <value>peexe</value>
          <value>amadey</value>
          <value>crypt</value>
          <value>krypt</value>
          <value>lockbit</value>
          <value>azorult</value>
          <value>genheur</value>
          <value>glupteba</value>
          <value>horse</value>
          <value>unsafe</value>
          <value>fingerprint</value>
          <value>microsoft_visual_cc</value>
          <value>anti-debug</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>41dbcd9ea1de472fd5ef23d404067e7584f7cdd724540c3da692c1b403e9245f</id>
    <title>Analysis Report for 41dbcd9ea1de472fd5ef23d404067e7584f7cdd724540c3da692c1b403e9245f</title>
    <updated>2026-04-13T03:10:50Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5ee3f9522792fdaf7efc</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5eab799d5bf325fa5a08</flow_id>
        <hash>41dbcd9ea1de472fd5ef23d404067e7584f7cdd724540c3da692c1b403e9245f</hash>
        <iocs>
          <urls>
            <value>
              <url>https://patch.chelpus.com/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.luckypatchers.com/download/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>luckypatchers.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>patch.chelpus.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@core.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@framework.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@services.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>nSaNX@forpda.ru</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>pkg.apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>alyaksandr.koshal@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>lp.chelpus@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>APK_DECODING</origin>
            </value>
          </ips>
        </iocs>
        <name>0f3aa60bd70bb9cbfbef6778d3d765ff</name>
        <report_id>62949514-a941-41cd-a4fc-93221bdbaf76</report_id>
        <tags>
          <value>apk</value>
          <value>fingerprint</value>
          <value>persistence</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>337c1f18bdaee999a3f6200bf8b67b0e92c069775edcb73e68004e07bdd03564</id>
    <title>Analysis Report for 337c1f18bdaee999a3f6200bf8b67b0e92c069775edcb73e68004e07bdd03564</title>
    <updated>2026-04-13T03:10:38Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5edef9522792fdaf7efb</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5ea29124ebc0875082da</flow_id>
        <hash>337c1f18bdaee999a3f6200bf8b67b0e92c069775edcb73e68004e07bdd03564</hash>
        <iocs>
          <urls>
            <value>
              <url>https://tv-library.firebaseio.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>tv-library.firebaseio.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>APK_DECODING</origin>
            </value>
          </ips>
        </iocs>
        <name>0f32f13f96bac07fff69ad95c73c49cc</name>
        <report_id>1e96df35-f3ac-478d-9c95-1c96e396804f</report_id>
        <tags>
          <value>apk</value>
          <value>android</value>
          <value>signed</value>
          <value>persistence</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>96e95d05e13365bf6e0ebb1529320b59c5c311e381905b821eca915fb598c904</id>
    <title>Analysis Report for 96e95d05e13365bf6e0ebb1529320b59c5c311e381905b821eca915fb598c904</title>
    <updated>2026-04-13T03:10:29Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5ed6f9522792fdaf7ef8</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5e975ea31bc68a248922</flow_id>
        <hash>96e95d05e13365bf6e0ebb1529320b59c5c311e381905b821eca915fb598c904</hash>
        <iocs>
          <urls>
            <value>
              <url>https://dualspaceprox.firebaseio.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>dualspaceprox.firebaseio.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <uuids>
            <value>
              <uuid>258EAFA5-E914-47DA-95CA-C5AB0DC85B11</uuid>
              <origin>APK_DECODING</origin>
            </value>
          </uuids>
        </iocs>
        <name>0f13cfa8ce1d36e1631c4797a109d9ec</name>
        <report_id>b5bc29d2-2f81-4cce-83b9-0ffde8bf7531</report_id>
        <tags>
          <value>apk</value>
          <value>fingerprint</value>
          <value>persistence</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
          <value>adware</value>
          <value>finger</value>
          <value>lolbin</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>a485287440bf7222bd2452e171970aaea42eb2eb2242ddb4c7ce1722100360e3</id>
    <title>Analysis Report for a485287440bf7222bd2452e171970aaea42eb2eb2242ddb4c7ce1722100360e3</title>
    <updated>2026-04-13T03:10:17Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5eb580678438b878abc7</_id>
        <file_type>application/java-archive</file_type>
        <flow_id>69dc5e965ea31bc68a24891f</flow_id>
        <hash>a485287440bf7222bd2452e171970aaea42eb2eb2242ddb4c7ce1722100360e3</hash>
        <iocs>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <ip>49.1.1.5</ip>
              <origin>JAVA_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <uuids>
            <value>
              <uuid>00000000-0000-0000-C000-000000000046</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>00000010-0000-0000-C000-000000000046</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>0000002F-0000-0000-C000-000000000046</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>00000102-0000-0000-C000-000000000046</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>00020400-0000-0000-C000-000000000046</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>00020404-0000-0000-C000-000000000046</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>00020905-0000-0000-C000-000000000046</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>000214E6-0000-0000-C000-000000000046</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>000214F2-0000-0000-C000-000000000046</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>0139D44E-6AFE-49F2-8690-3DAFCAE6FFB8</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>054fae61-4dd8-4787-80b6-090220c4b700</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>0762D272-C50A-4BB0-A382-697DCD729B80</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>0AC0837C-BBF8-452A-850D-79D08E667CA7</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>0f214138-b1d3-4a90-bba9-27cbc0c5389a</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>15CA69B3-30EE-49C1-ACE1-6B5EC372AFB5</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>1777F761-68AD-4D8A-87BD-30B759FA33DD</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>18989B1D-99B5-455B-841C-AB7C74E4DDFC</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>190337d1-b8ca-4121-a639-6d472d16972a</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>1AC14E77-02E7-4E5D-B744-2EB1AE5198B7</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>1a6fdba2-f42d-4358-a798-b74d745926c5</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>1b3ea5dc-b587-4786-b4ef-bd1dc332aeae</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>2112ab0a-c86a-4ffe-a368-0de96e47012e</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>2400183A-6185-49FB-A2D8-4A392A602BA3</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>258EAFA5-E914-47DA-95CA-C5AB0DC85B11</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>289a9a43-be44-4057-a41b-587a76d7e7f9</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>2A00375E-224C-49DE-B8D1-440DF7EF3DDC</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>2B0F765D-C0E9-4171-908E-08A611B84FF6</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>2C36C0AA-5812-4b87-bfd0-4cd0dfb19b39</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>2DF8D04C-5BFA-101B-BDE5-00AA0044DE52</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>3214FAB5-9757-4298-BB61-92A9DEAA44FF</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>33E28130-4E1E-4676-835A-98395C3BC3BB</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>352481E8-33BE-4251-BA85-6007CAEDCF9D</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>374de290-123f-4565-9164-39c4925e467b</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>378DE44C-56EF-11D1-BC8C-00A0C91405DD</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>3EB685DB-65F9-4CF6-A03A-E3EF65729F3D</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>3d644c9b-1fb8-4f30-9b45-f670235f79c0</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>43668BF8-C14E-49B2-97C9-747784D784B7</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>44aca674-e8fc-11d0-a07c-00c04fb68820</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>4590f811-1d3a-11d0-891f-00aa004b2e24</uuid>
              <origin>JAVA_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <uuid>48daf80b-e6cf-4f4e-b800-0e69d84ee384</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>491e922f-5643-4af4-a7eb-4e7a138d8174</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>4BD8D571-6D19-48D3-BE97-422220080E43</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>4D1E55B2-F16F-11CF-88CB-001111000030</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>4D9F7874-4E0C-4904-967B-40B0D20C3E4B</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>4bfefb45-347d-4006-a5be-ac0cb0567192</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>4c5c32ff-bb9d-43b0-b5b4-2d72e54eaaa4</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>50A7E9B0-70EF-11D1-B75A-00A0C90564FE</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>52528a6b-b9e3-4add-b60d-588c2dba842d</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>52a4f021-7b75-48a9-9f6b-4b87a210bc8f</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>53F56307-B6BF-11D0-94F2-00A0C91EFB8B</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>53F5630D-B6BF-11D0-94F2-00A0C91EFB8B</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>56784854-c6cb-462b-8169-88e350acb882</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>5E6C858F-0E22-4760-9AFE-EA3317B67173</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>5cd7aee2-2219-4a67-b85d-6c9ce15660cb</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>5ce4a5e9-e4eb-479d-b89f-130c02886155</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>625B53C3-AB48-4EC1-BA1F-A1EF4146FC19</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>62AB5D82-FDC1-4DC3-A9DD-070D1D495D97</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>6365d5a7-0f0d-45e5-87f6-0da56b6a4f7d</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>674B6698-EE92-11D0-AD71-00C04FD8FDFF</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>69D2CF90-FC33-4FB7-9A0C-EBB0F0FCB43C</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>6F0CD92B-2E97-45D1-88FF-B0D186B8DEDD</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>6d809377-6af0-444b-8957-a3773f02200e</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>724EF170-A42D-4FEF-9F26-B60E846FBA4F</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>76FC4E2D-D6AD-4519-A663-37BD56068185</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>7b0db17d-9cd2-4a93-9733-46cc89022e7c</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>7b396e54-9ec5-4300-be0a-2482ebae1a26</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>7d1d3a04-debb-4115-95cf-2f29da2920da</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>82A5EA35-D9CD-47C5-9629-E15D2F714E6E</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>82A74AEB-AEB4-465C-A014-D097EE346D63</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>859EAD94-2E85-48AD-A71A-0969CB56A6CD</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>86E0D1E0-8089-11D0-9CE4-08003E301F73</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>884b96c3-56ef-11d1-bc8c-00a0c91405dd</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>8983036C-27C0-404B-8F08-102D10DCFD74</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>8AD10C31-2ADB-4296-A8F7-E4701232C972</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>905e63b6-c1bf-494e-b29c-65b732d3d21a</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>9274BD8D-CFD1-41C3-B35E-B13F55A758F4</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>98ec0e18-2098-4d44-8644-66979315a281</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>9E52AB10-F80D-49DF-ACB8-4330F5687855</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>9e3995ab-1f9c-4f13-b827-48b24b6c7174</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>A4115719-D62E-491D-AA7C-E74B8BE3B067</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>A520A1A4-1780-4FF6-BD18-167343C5AF16</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>A5DCBF10-6530-11D2-901F-00C04FB951ED</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>A63293E8-664E-48DB-A079-DF759E0509F7</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>A77F5D77-2E2B-44C3-A6A2-ABA601054A51</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>AE50C081-EBD2-438A-8655-8A092E34987A</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>B196B284-BAB4-101A-B69C-00AA00341D07</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>B196B286-BAB4-101A-B69C-00AA00341D07</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>B250C668-F57D-4EE1-A63C-290EE7D1AA1F</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>B4BFCC3A-DB2C-424C-B029-7FE99A87C641</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>B6EBFB86-6907-413C-9AF7-4FC2ABF07CC5</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>B7534046-3ECB-4C18-BE4E-64CD4CB7D6AC</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>B94237E7-57AC-4347-9151-B08C6C32D1F7</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>B97D20BB-F46A-4C97-BA10-5E3608430854</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>C1BAE2D0-10DF-4334-BEDD-7AA20B227A9D</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>C4900540-2379-4C75-844B-64E6FAF8716B</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>C4AA340D-F20F-4863-AFEF-F87EF2E6BA25</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>C5ABBF53-E17F-4121-8900-86626FC2C973</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>C870044B-F49E-4126-A9C3-B52A1FF411E8</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>D0384E7D-BAC3-4797-8F14-CBA229B392B5</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>D20BEEC4-5CA8-4905-AE3B-BF251EA09B53</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>D65231B0-B2F1-4857-A4CE-A8E7C6EA7D27</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>D9DC8A3B-B784-432E-A781-5A1130A75963</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>DE92C1C7-837F-4F69-A3BB-86E631204A23</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>DE974D24-D9C6-4D3E-BF91-F4455120B917</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>DFDF76A2-C82A-4D63-906A-5644AC457385</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>E555AB60-153B-4D17-9F04-A5FE99FC15EC</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>ED4824AF-DCE4-45A8-81E2-FC7965083634</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>F1B32785-6FBA-4FCF-9D55-7B8E7F157091</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>F38BF404-1D43-42F2-9305-67DE0B28FC23</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>F7F1ED05-9F6D-47A2-AAAE-29D317C6F066</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>FD228CB7-AE11-4AE3-864C-16F3910AB8FE</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>FDD39AD0-238F-46AF-ADB4-6C85480369C7</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>a302545d-deff-464b-abe8-61c8648d939b</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>a305ce99-f527-492b-8b1a-7e76fa98d6e4</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>a75d362e-50fc-4fb7-ac2c-a8beaa314493</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>a990ae9f-a03b-4e80-94bc-9912d7504104</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>bcb5256f-79f6-4cee-b725-dc34e402fd46</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>bcbd3057-ca5c-4622-b42d-bc56db0ae516</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>bfb9d5e0-c6a9-404c-b2b2-ae6db6af4968</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>cac52c1a-b53d-4edc-92d7-6b2e8ac19434</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>dc12a687-737f-11cf-884d-00aa004b2e24</uuid>
              <origin>JAVA_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <uuid>de61d971-5ebc-4f02-a3a9-6c82895e5c04</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>debf2536-e1a8-4c59-b6a2-414586476aea</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>df7266ac-9274-4867-8d55-3bd661de872d</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>ee32e446-31ca-4aba-814f-a5ebd2fd6d5e</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>f3ce0f7c-4901-4acc-8648-d5d44b04ef8f</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
          </uuids>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib\009</registry>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
          </registry>
        </iocs>
        <name>_a485287440bf7222bd2452e171970aaea42eb2eb2242ddb4c7ce1722100360e3.zip</name>
        <report_id>1cde58f2-83f2-49dc-bcde-e80d4440ab8d</report_id>
        <tags>
          <value>java</value>
          <value>anti-vm</value>
          <value>explorer</value>
          <value>lolbin</value>
          <value>anti-debug</value>
          <value>obfuscated</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>bc61f8c36d59ebd8d85a64ed935dc8e018cfbb414d0337c299f74530dba76be5</id>
    <title>Analysis Report for bc61f8c36d59ebd8d85a64ed935dc8e018cfbb414d0337c299f74530dba76be5</title>
    <updated>2026-04-13T03:09:56Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5eb4f9522792fdaf7ef0</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5e76c33dc5a985d795b6</flow_id>
        <hash>bc61f8c36d59ebd8d85a64ed935dc8e018cfbb414d0337c299f74530dba76be5</hash>
        <iocs>
          <emails>
            <value>
              <email>android@android.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>android@android.com0</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>events.min@3.3.0.js</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>events.min@3.3.0.jsPK</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>APK_DECODING</origin>
            </value>
          </ips>
        </iocs>
        <name>0ec60c66e76f4afbc1521d9d3ce05acf</name>
        <report_id>b887a332-8f72-4b3e-9948-dc7939a7d555</report_id>
        <tags>
          <value>apk</value>
          <value>android</value>
          <value>cerberus</value>
          <value>triada</value>
          <value>persistence</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>f873fc3a5a66e05458941ad3e96fab15cb34ee97cca0834527676eb5a6efdbd9</id>
    <title>Analysis Report for f873fc3a5a66e05458941ad3e96fab15cb34ee97cca0834527676eb5a6efdbd9</title>
    <updated>2026-04-13T03:09:32Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5e94f9522792fdaf7ee8</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5e5d9124ebc08750829e</flow_id>
        <hash>f873fc3a5a66e05458941ad3e96fab15cb34ee97cca0834527676eb5a6efdbd9</hash>
        <iocs>
          <urls>
            <value>
              <url>http://www.slf4j.org/codes.html#null_MDCA</url>
              <origin>APK_DECODING</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://xmlpull.org/v1/doc/properties.html#xmldecl-version</url>
              <origin>APK_DECODING</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://developer.android.com/guide/appendix/media-formats.html</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://schemas.xmlsoap.org/soap/encoding</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://schemas.xmlsoap.org/soap/envelope</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://twitter.com/oauth_clients/new</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://www.twitter.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://goo.gle/compose-feedback</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>slf4j.org</url>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <url>xmlpull.org</url>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <url>developer.android.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>goo.gle</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>schemas.xmlsoap.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>twitter.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </domains>
          <emails>
            <value>
              <email>apps@toot.fedilab.app</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>1.3.101.112</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>127.0.0.1</ip>
              <origin>INPUT_FILE</origin>
            </value>
          </ips>
        </iocs>
        <name>0e91c9b638b80926acbd8d1ed5d67bfd</name>
        <report_id>33c82418-3acf-41da-807f-45e88949ed02</report_id>
        <tags>
          <value>apk</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>ec94223fc939cc5985f4240504a6befd541dd9e0042b6a6a57ac8dfcd92e0eae</id>
    <title>Analysis Report for ec94223fc939cc5985f4240504a6befd541dd9e0042b6a6a57ac8dfcd92e0eae</title>
    <updated>2026-04-13T03:08:43Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5e5af9522792fdaf7edc</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5e2d5ea31bc68a24881f</flow_id>
        <hash>ec94223fc939cc5985f4240504a6befd541dd9e0042b6a6a57ac8dfcd92e0eae</hash>
        <iocs>
          <urls>
            <value>
              <url>https://play.google.com/store/apps/details?id=</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://touch-fd7ae.firebaseio.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>play.google.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>touch-fd7ae.firebaseio.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>blurbackgroundstudio@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
        </iocs>
        <name>0e23feed64c719542ca5f103904c37cc</name>
        <report_id>b7cb5a46-bb81-4841-94fa-86121e5ff667</report_id>
        <tags>
          <value>apk</value>
          <value>signed</value>
          <value>persistence</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>fingerprint</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>a485287440bf7222bd2452e171970aaea42eb2eb2242ddb4c7ce1722100360e3</id>
    <title>Analysis Report for a485287440bf7222bd2452e171970aaea42eb2eb2242ddb4c7ce1722100360e3</title>
    <updated>2026-04-13T03:08:34Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5e5f80678438b878abb8</_id>
        <file_type>application/java-archive</file_type>
        <flow_id>69dc5e305ea31bc68a248827</flow_id>
        <hash>a485287440bf7222bd2452e171970aaea42eb2eb2242ddb4c7ce1722100360e3</hash>
        <iocs>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <ip>49.1.1.5</ip>
              <origin>JAVA_DECOMPILATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <uuids>
            <value>
              <uuid>00000000-0000-0000-C000-000000000046</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>00000010-0000-0000-C000-000000000046</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>0000002F-0000-0000-C000-000000000046</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>00000102-0000-0000-C000-000000000046</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>00020400-0000-0000-C000-000000000046</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>00020404-0000-0000-C000-000000000046</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>00020905-0000-0000-C000-000000000046</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>000214E6-0000-0000-C000-000000000046</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>000214F2-0000-0000-C000-000000000046</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>0139D44E-6AFE-49F2-8690-3DAFCAE6FFB8</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>054fae61-4dd8-4787-80b6-090220c4b700</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>0762D272-C50A-4BB0-A382-697DCD729B80</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>0AC0837C-BBF8-452A-850D-79D08E667CA7</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>0f214138-b1d3-4a90-bba9-27cbc0c5389a</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>15CA69B3-30EE-49C1-ACE1-6B5EC372AFB5</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>1777F761-68AD-4D8A-87BD-30B759FA33DD</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>18989B1D-99B5-455B-841C-AB7C74E4DDFC</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>190337d1-b8ca-4121-a639-6d472d16972a</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>1AC14E77-02E7-4E5D-B744-2EB1AE5198B7</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>1a6fdba2-f42d-4358-a798-b74d745926c5</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>1b3ea5dc-b587-4786-b4ef-bd1dc332aeae</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>2112ab0a-c86a-4ffe-a368-0de96e47012e</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>2400183A-6185-49FB-A2D8-4A392A602BA3</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>258EAFA5-E914-47DA-95CA-C5AB0DC85B11</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>289a9a43-be44-4057-a41b-587a76d7e7f9</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>2A00375E-224C-49DE-B8D1-440DF7EF3DDC</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>2B0F765D-C0E9-4171-908E-08A611B84FF6</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>2C36C0AA-5812-4b87-bfd0-4cd0dfb19b39</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>2DF8D04C-5BFA-101B-BDE5-00AA0044DE52</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>3214FAB5-9757-4298-BB61-92A9DEAA44FF</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>33E28130-4E1E-4676-835A-98395C3BC3BB</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>352481E8-33BE-4251-BA85-6007CAEDCF9D</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>374de290-123f-4565-9164-39c4925e467b</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>378DE44C-56EF-11D1-BC8C-00A0C91405DD</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>3EB685DB-65F9-4CF6-A03A-E3EF65729F3D</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>3d644c9b-1fb8-4f30-9b45-f670235f79c0</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>43668BF8-C14E-49B2-97C9-747784D784B7</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>44aca674-e8fc-11d0-a07c-00c04fb68820</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>4590f811-1d3a-11d0-891f-00aa004b2e24</uuid>
              <origin>JAVA_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <uuid>48daf80b-e6cf-4f4e-b800-0e69d84ee384</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>491e922f-5643-4af4-a7eb-4e7a138d8174</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>4BD8D571-6D19-48D3-BE97-422220080E43</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>4D1E55B2-F16F-11CF-88CB-001111000030</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>4D9F7874-4E0C-4904-967B-40B0D20C3E4B</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>4bfefb45-347d-4006-a5be-ac0cb0567192</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>4c5c32ff-bb9d-43b0-b5b4-2d72e54eaaa4</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>50A7E9B0-70EF-11D1-B75A-00A0C90564FE</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>52528a6b-b9e3-4add-b60d-588c2dba842d</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>52a4f021-7b75-48a9-9f6b-4b87a210bc8f</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>53F56307-B6BF-11D0-94F2-00A0C91EFB8B</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>53F5630D-B6BF-11D0-94F2-00A0C91EFB8B</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>56784854-c6cb-462b-8169-88e350acb882</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>5E6C858F-0E22-4760-9AFE-EA3317B67173</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>5cd7aee2-2219-4a67-b85d-6c9ce15660cb</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>5ce4a5e9-e4eb-479d-b89f-130c02886155</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>625B53C3-AB48-4EC1-BA1F-A1EF4146FC19</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>62AB5D82-FDC1-4DC3-A9DD-070D1D495D97</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>6365d5a7-0f0d-45e5-87f6-0da56b6a4f7d</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>674B6698-EE92-11D0-AD71-00C04FD8FDFF</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>69D2CF90-FC33-4FB7-9A0C-EBB0F0FCB43C</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>6F0CD92B-2E97-45D1-88FF-B0D186B8DEDD</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>6d809377-6af0-444b-8957-a3773f02200e</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>724EF170-A42D-4FEF-9F26-B60E846FBA4F</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>76FC4E2D-D6AD-4519-A663-37BD56068185</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>7b0db17d-9cd2-4a93-9733-46cc89022e7c</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>7b396e54-9ec5-4300-be0a-2482ebae1a26</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>7d1d3a04-debb-4115-95cf-2f29da2920da</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>82A5EA35-D9CD-47C5-9629-E15D2F714E6E</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>82A74AEB-AEB4-465C-A014-D097EE346D63</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>859EAD94-2E85-48AD-A71A-0969CB56A6CD</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>86E0D1E0-8089-11D0-9CE4-08003E301F73</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>884b96c3-56ef-11d1-bc8c-00a0c91405dd</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>8983036C-27C0-404B-8F08-102D10DCFD74</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>8AD10C31-2ADB-4296-A8F7-E4701232C972</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>905e63b6-c1bf-494e-b29c-65b732d3d21a</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>9274BD8D-CFD1-41C3-B35E-B13F55A758F4</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>98ec0e18-2098-4d44-8644-66979315a281</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>9E52AB10-F80D-49DF-ACB8-4330F5687855</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>9e3995ab-1f9c-4f13-b827-48b24b6c7174</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>A4115719-D62E-491D-AA7C-E74B8BE3B067</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>A520A1A4-1780-4FF6-BD18-167343C5AF16</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>A5DCBF10-6530-11D2-901F-00C04FB951ED</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>A63293E8-664E-48DB-A079-DF759E0509F7</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>A77F5D77-2E2B-44C3-A6A2-ABA601054A51</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>AE50C081-EBD2-438A-8655-8A092E34987A</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>B196B284-BAB4-101A-B69C-00AA00341D07</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>B196B286-BAB4-101A-B69C-00AA00341D07</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>B250C668-F57D-4EE1-A63C-290EE7D1AA1F</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>B4BFCC3A-DB2C-424C-B029-7FE99A87C641</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>B6EBFB86-6907-413C-9AF7-4FC2ABF07CC5</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>B7534046-3ECB-4C18-BE4E-64CD4CB7D6AC</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>B94237E7-57AC-4347-9151-B08C6C32D1F7</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>B97D20BB-F46A-4C97-BA10-5E3608430854</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>C1BAE2D0-10DF-4334-BEDD-7AA20B227A9D</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>C4900540-2379-4C75-844B-64E6FAF8716B</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>C4AA340D-F20F-4863-AFEF-F87EF2E6BA25</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>C5ABBF53-E17F-4121-8900-86626FC2C973</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>C870044B-F49E-4126-A9C3-B52A1FF411E8</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>D0384E7D-BAC3-4797-8F14-CBA229B392B5</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>D20BEEC4-5CA8-4905-AE3B-BF251EA09B53</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>D65231B0-B2F1-4857-A4CE-A8E7C6EA7D27</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>D9DC8A3B-B784-432E-A781-5A1130A75963</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>DE92C1C7-837F-4F69-A3BB-86E631204A23</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>DE974D24-D9C6-4D3E-BF91-F4455120B917</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>DFDF76A2-C82A-4D63-906A-5644AC457385</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>E555AB60-153B-4D17-9F04-A5FE99FC15EC</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>ED4824AF-DCE4-45A8-81E2-FC7965083634</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>F1B32785-6FBA-4FCF-9D55-7B8E7F157091</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>F38BF404-1D43-42F2-9305-67DE0B28FC23</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>F7F1ED05-9F6D-47A2-AAAE-29D317C6F066</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>FD228CB7-AE11-4AE3-864C-16F3910AB8FE</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>FDD39AD0-238F-46AF-ADB4-6C85480369C7</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>a302545d-deff-464b-abe8-61c8648d939b</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>a305ce99-f527-492b-8b1a-7e76fa98d6e4</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>a75d362e-50fc-4fb7-ac2c-a8beaa314493</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>a990ae9f-a03b-4e80-94bc-9912d7504104</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>bcb5256f-79f6-4cee-b725-dc34e402fd46</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>bcbd3057-ca5c-4622-b42d-bc56db0ae516</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>bfb9d5e0-c6a9-404c-b2b2-ae6db6af4968</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>cac52c1a-b53d-4edc-92d7-6b2e8ac19434</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>dc12a687-737f-11cf-884d-00aa004b2e24</uuid>
              <origin>JAVA_DECOMPILATION</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <uuid>de61d971-5ebc-4f02-a3a9-6c82895e5c04</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>debf2536-e1a8-4c59-b6a2-414586476aea</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>df7266ac-9274-4867-8d55-3bd661de872d</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>ee32e446-31ca-4aba-814f-a5ebd2fd6d5e</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
            <value>
              <uuid>f3ce0f7c-4901-4acc-8648-d5d44b04ef8f</uuid>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
          </uuids>
          <registry>
            <value>
              <registry>SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib\009</registry>
              <origin>JAVA_DECOMPILATION</origin>
            </value>
          </registry>
        </iocs>
        <name>agent_new.jar</name>
        <report_id>f1c14c00-a278-4ad4-99f2-fae4f339d259</report_id>
        <tags>
          <value>java</value>
          <value>anti-vm</value>
          <value>explorer</value>
          <value>lolbin</value>
          <value>anti-debug</value>
          <value>obfuscated</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>80caecfc725178495eebb83743bd162fcfbad6f614b5c60a5f8b4364a11bf177</id>
    <title>Analysis Report for 80caecfc725178495eebb83743bd162fcfbad6f614b5c60a5f8b4364a11bf177</title>
    <updated>2026-04-13T03:08:28Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5e57f9522792fdaf7eda</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5e1d9124ebc08750825e</flow_id>
        <hash>80caecfc725178495eebb83743bd162fcfbad6f614b5c60a5f8b4364a11bf177</hash>
        <iocs>
          <urls>
            <value>
              <url>https://patch.chelpus.com/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.luckypatchers.com/download/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>luckypatchers.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>patch.chelpus.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot-core-oj.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@core.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@framework.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@services.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>nSaNX@forpda.ru</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>pkg.apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>U@R.wyJ1</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>alyaksandr.koshal@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>lp.chelpus@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>APK_DECODING</origin>
            </value>
          </ips>
        </iocs>
        <name>0dc76afd7fb954cca3899a9327c9ed6d</name>
        <report_id>a2f8df36-8e69-4a27-97d9-dd052a443611</report_id>
        <tags>
          <value>apk</value>
          <value>invalid-signature</value>
          <value>fingerprint</value>
          <value>persistence</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>724cd83458da72079134b2f44947222b86dd0288df07e01f639a3c1661ed0f18</id>
    <title>Analysis Report for 724cd83458da72079134b2f44947222b86dd0288df07e01f639a3c1661ed0f18</title>
    <updated>2026-04-13T03:08:24Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5e4af9522792fdaf7ed7</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5e19c33dc5a985d7955f</flow_id>
        <hash>724cd83458da72079134b2f44947222b86dd0288df07e01f639a3c1661ed0f18</hash>
        <iocs>
          <urls>
            <value>
              <url>https://instagram.com/hosseinabaspanahoriginal</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://patch.chelpus.com/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.luckypatchers.com/download/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>instagram.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>luckypatchers.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>patch.chelpus.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot-core-oj.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@core.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@framework.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@services.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>nSaNX@forpda.ru</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>pkg.apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>alyaksandr.koshal@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>lp.chelpus@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>APK_DECODING</origin>
            </value>
          </ips>
        </iocs>
        <name>0d8e5d97156382bde70d761198a1863e</name>
        <report_id>7f105eb1-ad21-4bf2-ae30-c8728a81d084</report_id>
        <tags>
          <value>apk</value>
          <value>invalid-signature</value>
          <value>fingerprint</value>
          <value>persistence</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>37619d7707acea2550f6dad6af51e3a75d0a3027512b6e15a41da23d3797bcd2</id>
    <title>Analysis Report for 37619d7707acea2550f6dad6af51e3a75d0a3027512b6e15a41da23d3797bcd2</title>
    <updated>2026-04-13T03:08:13Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5e39f9522792fdaf7ed0</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5e105ea31bc68a2487ec</flow_id>
        <hash>37619d7707acea2550f6dad6af51e3a75d0a3027512b6e15a41da23d3797bcd2</hash>
        <iocs>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>APK_DECODING</origin>
            </value>
          </ips>
        </iocs>
        <name>0d6c23a82052e25e0f1bc76f397bcffe</name>
        <report_id>fa8c6201-5c79-40dd-80d0-21171398f761</report_id>
        <tags>
          <value>apk</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>fingerprint</value>
        </tags>
        <verdict>NO_THREAT</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>26634972273b7cc07b718a80d3a6e82b08136e0e09837c5b533625bf8f33515a</id>
    <title>Analysis Report for 26634972273b7cc07b718a80d3a6e82b08136e0e09837c5b533625bf8f33515a</title>
    <updated>2026-04-13T03:08:00Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5e2bf9522792fdaf7ecc</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5e01799d5bf325fa58fd</flow_id>
        <hash>26634972273b7cc07b718a80d3a6e82b08136e0e09837c5b533625bf8f33515a</hash>
        <iocs>
          <urls>
            <value>
              <url>https://developer.android.com/reference/com/google/android/play/core/review/model/ReviewErrorCode.html#</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://firebase.google.com/support/guides/disable-analytics</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://goo.gl/J1sWQy</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://goo.gl/NAOOOI.</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://issuetracker.google.com/issues/241760537</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://play.google.com/store/apps/details?id=com.pzolee.wifiinfoPro</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://checkip.amazonaws.com</url>
              <origin>APK_DECODING</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://developer.android.com/reference/com/google/android/play/core/review/model/ReviewErrorCode.html#</url>
              <origin>APK_DECODING</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://firebase.google.com/docs/crashlytics/get-started?platform=android#add-plugin</url>
              <origin>APK_DECODING</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://issuetracker.google.com/issues/new?component=907884&amp;template=1466542</url>
              <origin>APK_DECODING</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>developer.android.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>firebase.google.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>goo.gl</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>issuetracker.google.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>play.google.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>checkip.amazonaws.com</url>
              <origin>APK_DECODING</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>developer.android.com</url>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <url>firebase.google.com</url>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <url>issuetracker.google.com</url>
              <origin>APK_DECODING</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>android@android.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>android@android.com0</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>192.168.0.1</ip>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <ip>192.168.1.1</ip>
              <origin>INPUT_FILE</origin>
              <verdict>SUSPICIOUS</verdict>
            </value>
            <value>
              <ip>239.255.255.250</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>255.255.255.0</ip>
              <origin>INPUT_FILE</origin>
            </value>
          </ips>
          <uuids>
            <value>
              <uuid>12345778-1234-abcd-ef00-0123456789ab</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>12345778-1234-abcd-ef00-0123456789ac</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>4b324fc8-1670-01d3-1278-5a47bf6ee188</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>4fc742e0-4a10-11cf-8273-00aa004ae673</uuid>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <uuid>8a885d04-1ceb-11c9-9fe8-08002b104860</uuid>
              <origin>INPUT_FILE</origin>
            </value>
          </uuids>
          <btc_wallets>
            <value>
              <btc_wallet>U9qPmuKpdcW35pGvo3VkPmuKpdPZfnW</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <btc_wallet>jUdLvLCLbk9zBJEoJ2pydQvX3ybjv</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
          </btc_wallets>
        </iocs>
        <name>0d2631397d37194a99ec404d36d0942a</name>
        <report_id>72674695-3761-466e-a918-9efc6ebfb4d0</report_id>
        <tags>
          <value>apk</value>
          <value>anti-debug</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
          <value>fingerprint</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>5510361e0fb23f76c0b977140554ad29abb7d2a2212a843e2b8ff34c42a43b2f</id>
    <title>Analysis Report for 5510361e0fb23f76c0b977140554ad29abb7d2a2212a843e2b8ff34c42a43b2f</title>
    <updated>2026-04-13T03:06:57Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5dedf9522792fdaf7ec0</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5dc45ea31bc68a248735</flow_id>
        <hash>5510361e0fb23f76c0b977140554ad29abb7d2a2212a843e2b8ff34c42a43b2f</hash>
        <iocs>
          <urls>
            <value>
              <url>https://instagram.com/hosseinabaspanahoriginal</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://patch.chelpus.com/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.luckypatchers.com/download/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>instagram.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>luckypatchers.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>patch.chelpus.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot-core-oj.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@core.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@framework.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@services.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>nSaNX@forpda.ru</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>pkg.apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>alyaksandr.koshal@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>lp.chelpus@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>APK_DECODING</origin>
            </value>
          </ips>
        </iocs>
        <name>0c5d4c5a7efe8936f84018c02f414dff</name>
        <report_id>92f84f7f-c8b6-44ed-ab74-67988b6b9218</report_id>
        <tags>
          <value>apk</value>
          <value>invalid-signature</value>
          <value>fingerprint</value>
          <value>persistence</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>b4a61838f9cbf2b3817a10a88881e4f3b9e2cda0c11a0e9906c75aec1e3e619b</id>
    <title>Analysis Report for b4a61838f9cbf2b3817a10a88881e4f3b9e2cda0c11a0e9906c75aec1e3e619b</title>
    <updated>2026-04-13T03:06:51Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5df0f9522792fdaf7ec1</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5dbc799d5bf325fa5881</flow_id>
        <hash>b4a61838f9cbf2b3817a10a88881e4f3b9e2cda0c11a0e9906c75aec1e3e619b</hash>
        <iocs>
          <urls>
            <value>
              <url>https://instagram.com/hosseinabaspanahoriginal</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://patch.chelpus.com/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.luckypatchers.com/download/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>instagram.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>luckypatchers.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>patch.chelpus.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>alyaksandr.koshal@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>lp.chelpus@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot-core-oj.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@core.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@framework.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@services.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>nSaNX@forpda.ru</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>pkg.apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>APK_DECODING</origin>
            </value>
          </ips>
        </iocs>
        <name>0c4d8c9a344cb294113a9c578dbf095e</name>
        <report_id>2fee25c7-f362-4936-a953-d47648a55135</report_id>
        <tags>
          <value>apk</value>
          <value>invalid-signature</value>
          <value>fingerprint</value>
          <value>persistence</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>c1558f396e987cfcc600a48a40fa2710f5be4d5f0e6579ea1daeeb762516eb7f</id>
    <title>Analysis Report for c1558f396e987cfcc600a48a40fa2710f5be4d5f0e6579ea1daeeb762516eb7f</title>
    <updated>2026-04-13T03:06:14Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5dc3f9522792fdaf7eb6</_id>
        <file_type>application/java-archive</file_type>
        <flow_id>69dc5d98d920e19044f92246</flow_id>
        <hash>c1558f396e987cfcc600a48a40fa2710f5be4d5f0e6579ea1daeeb762516eb7f</hash>
        <iocs/>
        <name>DonutDupe.jar</name>
        <report_id>51eaf7c1-d7f1-4fd0-b617-8ce9a2d91be9</report_id>
        <tags>
          <value>java</value>
          <value>anti-debug</value>
          <value>obfuscated</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>d8f0f211f6a63377db5c1e13ed26d2a8f5f5113fa7025b06f85a8edead5140a3</id>
    <title>Analysis Report for d8f0f211f6a63377db5c1e13ed26d2a8f5f5113fa7025b06f85a8edead5140a3</title>
    <updated>2026-04-13T03:05:55Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5da980678438b878ab97</_id>
        <file_type>application/java-archive</file_type>
        <flow_id>69dc5d905ea31bc68a2486a0</flow_id>
        <hash>d8f0f211f6a63377db5c1e13ed26d2a8f5f5113fa7025b06f85a8edead5140a3</hash>
        <iocs/>
        <name>Krypton_Client-1.21.11.jar</name>
        <report_id>1ff223c1-b7e8-43df-86c3-324191778366</report_id>
        <tags>
          <value>java</value>
          <value>anti-debug</value>
          <value>obfuscated</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>6c0caa5358c8076f51801ad98a7bb1cd1388e20b55e24081c01a26806a931c8e</id>
    <title>Analysis Report for 6c0caa5358c8076f51801ad98a7bb1cd1388e20b55e24081c01a26806a931c8e</title>
    <updated>2026-04-13T03:05:43Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5dabf9522792fdaf7eb0</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5d77d920e19044f92214</flow_id>
        <hash>6c0caa5358c8076f51801ad98a7bb1cd1388e20b55e24081c01a26806a931c8e</hash>
        <iocs>
          <urls>
            <value>
              <url>https://instagram.com/hosseinabaspanahoriginal</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://patch.chelpus.com/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.luckypatchers.com/download/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>instagram.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>luckypatchers.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>patch.chelpus.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>alyaksandr.koshal@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>lp.chelpus@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot-core-oj.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@core.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@framework.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@services.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>nSaNX@forpda.ru</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>pkg.apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>APK_DECODING</origin>
            </value>
          </ips>
        </iocs>
        <name>0b0a10ed1e00009d573a608e6bdb428b</name>
        <report_id>293e32a2-d2d2-47e7-ac7c-4991919850dc</report_id>
        <tags>
          <value>apk</value>
          <value>invalid-signature</value>
          <value>fingerprint</value>
          <value>persistence</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>ae159723776456735197c5650068fae75f41f992464315b0b90d84280cfa04dd</id>
    <title>Analysis Report for ae159723776456735197c5650068fae75f41f992464315b0b90d84280cfa04dd</title>
    <updated>2026-04-13T03:05:26Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5d9df9522792fdaf7eab</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5d68d920e19044f92200</flow_id>
        <hash>ae159723776456735197c5650068fae75f41f992464315b0b90d84280cfa04dd</hash>
        <iocs>
          <urls>
            <value>
              <url>https://instagram.com/hosseinabaspanahoriginal</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://patch.chelpus.com/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.luckypatchers.com/download/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>instagram.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>luckypatchers.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>patch.chelpus.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot-core-oj.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@core.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@framework.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@services.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>nSaNX@forpda.ru</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>pkg.apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>alyaksandr.koshal@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>lp.chelpus@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>APK_DECODING</origin>
            </value>
          </ips>
        </iocs>
        <name>0acc5024ee9e2add85b9d8afa9705b30</name>
        <report_id>00e12770-78c2-4e4f-802f-284970097206</report_id>
        <tags>
          <value>apk</value>
          <value>invalid-signature</value>
          <value>fingerprint</value>
          <value>persistence</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>e72a141b4ea3e2fbc0ec14c034da659200a37aab2b9421e57bd9cd9bed05bc5e</id>
    <title>Analysis Report for e72a141b4ea3e2fbc0ec14c034da659200a37aab2b9421e57bd9cd9bed05bc5e</title>
    <updated>2026-04-13T03:05:02Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5d86f9522792fdaf7ea5</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5d509124ebc0875081a5</flow_id>
        <hash>e72a141b4ea3e2fbc0ec14c034da659200a37aab2b9421e57bd9cd9bed05bc5e</hash>
        <iocs>
          <urls>
            <value>
              <url>https://github.com/Eselter/AA-Phenotype-Patcher</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://github.com/endyrubbin/AAStream</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://github.com/martoreto/aauto-sdk</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://github.com/slashmax/AAMirror</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://inceptive.ru</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://paypal.me/annexhack</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>github.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>inceptive.ru</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>paypal.me</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
        </iocs>
        <name>0a88db976cfea3582eecabbb920a8b23</name>
        <report_id>51b0a7eb-2649-4b60-9963-fae502bf84eb</report_id>
        <tags>
          <value>apk</value>
          <value>invalid-signature</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
          <value>finger</value>
          <value>lolbin</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>4ccc868de6606fe72e6d9188a825274eced547847a01a0b1019103e5bc7ff82a</id>
    <title>Analysis Report for 4ccc868de6606fe72e6d9188a825274eced547847a01a0b1019103e5bc7ff82a</title>
    <updated>2026-04-13T03:04:25Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5d62f9522792fdaf7e9d</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5d295ea31bc68a24859c</flow_id>
        <hash>4ccc868de6606fe72e6d9188a825274eced547847a01a0b1019103e5bc7ff82a</hash>
        <iocs>
          <urls>
            <value>
              <url>https://github.com/Eselter/AA-Phenotype-Patcher</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://github.com/endyrubbin/AAStream</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://github.com/martoreto/aauto-sdk</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://github.com/slashmax/AAMirror</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://inceptive.ru</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://paypal.me/annexhack</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>github.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>inceptive.ru</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>paypal.me</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
        </iocs>
        <name>09e457a18c3a7bcc2e5879a39ab427f9</name>
        <report_id>94059284-b632-4577-8327-cd183df19745</report_id>
        <tags>
          <value>apk</value>
          <value>invalid-signature</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
          <value>finger</value>
          <value>lolbin</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>800e0d723f8da496af0e26c64fc9b0ed5e0311a2e7bb2fb3ab29a32dd8f5f2bf</id>
    <title>Analysis Report for 800e0d723f8da496af0e26c64fc9b0ed5e0311a2e7bb2fb3ab29a32dd8f5f2bf</title>
    <updated>2026-04-13T03:04:19Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5d4ff9522792fdaf7e98</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5d23d920e19044f9219b</flow_id>
        <hash>800e0d723f8da496af0e26c64fc9b0ed5e0311a2e7bb2fb3ab29a32dd8f5f2bf</hash>
        <iocs/>
        <name>09c323ac48fd249ef471a088f7b1beba</name>
        <report_id>b180393e-f47d-49b4-b521-632be4438aaa</report_id>
        <tags>
          <value>apk</value>
          <value>android</value>
          <value>signed</value>
          <value>persistence</value>
          <value>evasive</value>
          <value>fingerprint</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>c4139d27139e507ab2ece6381dbacc974c25aa803efd479a8f0a9d827e2fd4f8</id>
    <title>Analysis Report for c4139d27139e507ab2ece6381dbacc974c25aa803efd479a8f0a9d827e2fd4f8</title>
    <updated>2026-04-13T03:04:09Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5d3780678438b878ab80</_id>
        <file_type>application/x-dosexec</file_type>
        <flow_id>69dc5d265ea31bc68a248568</flow_id>
        <hash>c4139d27139e507ab2ece6381dbacc974c25aa803efd479a8f0a9d827e2fd4f8</hash>
        <iocs>
          <files>
            <value>
              <SHA-256>143334013d79e455765cee7e2a6e11c60fcc46d2fa01326732df97be2f683ec0</SHA-256>
              <SHA-1>5dd8de4f52a2e5a712d35ef401893f472c6e7a61</SHA-1>
              <MD5>77af85ba12ccd9793b3fb98b8b9ad4b8</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>18ac9916d9fba750a481805817520b40ace4da5d32ebc37d5e7ac892728d1d0b</SHA-256>
              <SHA-1>7e2bc450c77e40d466cb43af6bdea66ee9b2f978</SHA-1>
              <MD5>f8cbb860928ca13d8d1272d73a113baf</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>18d0b07c1a53c8da669106ad1ddc69bfdc532d086f2677ee19256d38bfaf1169</SHA-256>
              <SHA-1>afb987847a95cf8e4d84e6752f03451eca5fe6c0</SHA-1>
              <MD5>0b9b2a847f2a57a401caf53e1c7cd540</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>1d072f42c1d7230f99265525e7c82580215eaafaf18f28d5a0646d9f84757e1f</SHA-256>
              <SHA-1>bd9abaa12430c0ce2368b7da9ab979abab961058</SHA-1>
              <MD5>22aae7bd700558201d4dc411dd3b6f88</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>1dbf3162a80ec55d7654a748179ff4bf97b4f3981b6e20ab36863d79df679836</SHA-256>
              <SHA-1>f11c5597c75d78124cb821adce5b81974e505287</SHA-1>
              <MD5>7d78eae00b09d9b5c8df57ac2bf37fcd</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>2c70f88dd2ba3bbd9a5c27461c8dccc70b3d1ef0dbf7e31ed35f6b283e68da87</SHA-256>
              <SHA-1>a0aaa766274c0ed5e6889f0807efcfcd808008e0</SHA-1>
              <MD5>13a9f172b3764723530fd1cc02c67877</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>32ba4fc1b696e2044b25a4bfcad798db011957f6b67a17e75b935cbe669c0b9f</SHA-256>
              <SHA-1>45b75d48d742a642ea9e8208d80d7f121966b69e</SHA-1>
              <MD5>a07174eead1c335dc7799f32ee952fb0</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>447a466a0ce0bb9f6a1d34ba087227289922be31fd6f9bfd0670311de630f258</SHA-256>
              <SHA-1>72633c6b63b2ec6f55d21af27dda51bdf9ef1e9c</SHA-1>
              <MD5>16009bbc1ebd5ce9f9137aea0399659b</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/png</file_type>
            </value>
            <value>
              <SHA-256>48fcbe16dd5906dd983a59dc23f2f00d99d858432ba5a11300675cdbb2de4e32</SHA-256>
              <SHA-1>34493a1cb67369e2d4820b93829825283fa2e9f2</SHA-1>
              <MD5>cd3b22b8077599e30edd6a711fde61c4</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df</SHA-256>
              <SHA-1>4260284ce14278c397aaf6f389c1609b0ab0ce51</SHA-1>
              <MD5>1e4a89b11eae0fcf8bb5fdd5ec3b6f61</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>4d2d199e33a47edcea0986a4721247b5c5e8e9a369e2dc24df66c130b767bdcf</SHA-256>
              <SHA-1>0a206f11f000095d006ea5624ccd6005b6de0327</SHA-1>
              <MD5>6bfbe758aa2730306f5189b304b0a6cf</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>6cdd17b70178b51c11b75fe12b7ed463b9efc28b24f80725e08a67d8a686b97c</SHA-256>
              <SHA-1>cdb79deccf715c7e26fd8c7b93037c592fb7fefb</SHA-1>
              <MD5>455ced3491bc0f39c6cbff1685905913</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>7e2e43e73d2f2d89527748885766fcd0ca1fbb3865d6c3ee16a5a185691d8683</SHA-256>
              <SHA-1>dd3610738b614bdd2834405a0254ae33b51c0d16</SHA-1>
              <MD5>e6408a54799ed6555dc734ba94145e73</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>88d14cc6638af8a0836f6d868dfab60df92907a2d7becaefbbd7e007acb75610</SHA-256>
              <SHA-1>04f73efb0801b18f6984b14cd057fb56519cd31b</SHA-1>
              <MD5>d8090aba7197fbf9c7e2631c750965a8</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>cdc5da1e59650565446d932835591acd05c4d3efb13991d4fc6b7b04c371eaf6</SHA-256>
              <SHA-1>6e4d9a347b9abe47578a1d9b86cf18cbf8399f09</SHA-1>
              <MD5>3f8c865939ddffa642c3c2686d59bccd</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/vnd.microsoft.icon</file_type>
            </value>
            <value>
              <SHA-256>da48705ce31ce2b7ea637c0575ae4db64a202f7a29814c18d6c5ed2b60a28ef5</SHA-256>
              <SHA-1>02d53d1ab3b862117a0bceb42dc5f9d3add0cfaf</SHA-1>
              <MD5>802ccdcfb34f625eab62a4b63ca93ac4</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
            <value>
              <SHA-256>dada8aafb5eff7c712e8505e381b822b0727876c0861e0baa460527ff932c3b4</SHA-256>
              <SHA-1>e402e96fd07e1423c5fc6b7cd01a427d2c4171bf</SHA-1>
              <MD5>58e045272ed98cb6d12f192bf0664e4c</MD5>
              <origin>INPUT_FILE</origin>
              <file_type>image/dib</file_type>
            </value>
          </files>
          <registry>
            <value>
              <registry>SOFTWARE\Borland\Delphi\RTL</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Borland\Delphi\Locales</registry>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <registry>Software\Borland\Locales</registry>
              <origin>INPUT_FILE</origin>
            </value>
          </registry>
        </iocs>
        <name>2026-04-12_010ac14fda5db21c7d6bf5d9b2013534_amadey_darkgate_elex_gcleaner_luca-stealer_njrat_smoke-loader.exe</name>
        <report_id>a9cb0b9b-1a9b-4a83-a741-c2089c85be2a</report_id>
        <tags>
          <value>peexe</value>
          <value>virus</value>
          <value>unsafe</value>
          <value>packed</value>
          <value>anti-debug</value>
          <value>fingerprint</value>
          <value>borland_c</value>
          <value>installer-heuristic</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>9474dbe64d0e850672853b4f7bc8e4c4f0cfbf4a9b3f370c21fafbcef32bca31</id>
    <title>Analysis Report for 9474dbe64d0e850672853b4f7bc8e4c4f0cfbf4a9b3f370c21fafbcef32bca31</title>
    <updated>2026-04-13T03:03:28Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5d27f9522792fdaf7e8f</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5cf1d920e19044f9213c</flow_id>
        <hash>9474dbe64d0e850672853b4f7bc8e4c4f0cfbf4a9b3f370c21fafbcef32bca31</hash>
        <iocs>
          <urls>
            <value>
              <url>https://instagram.com/hosseinabaspanahoriginal</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://patch.chelpus.com/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.luckypatchers.com/download/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>instagram.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>luckypatchers.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>patch.chelpus.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot-core-oj.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@core.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@framework.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@services.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>nSaNX@forpda.ru</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>pkg.apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>alyaksandr.koshal@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>lp.chelpus@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>APK_DECODING</origin>
            </value>
          </ips>
        </iocs>
        <name>08f74ab5be10df6861f7cebabc11dc4d</name>
        <report_id>a743a869-c649-460a-8724-985947f9d54f</report_id>
        <tags>
          <value>apk</value>
          <value>invalid-signature</value>
          <value>fingerprint</value>
          <value>persistence</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>8dc97ec4b52c7e66d850aa12b42c257c2d6977dd22d1ef819ffabccc0ad5eae5</id>
    <title>Analysis Report for 8dc97ec4b52c7e66d850aa12b42c257c2d6977dd22d1ef819ffabccc0ad5eae5</title>
    <updated>2026-04-13T03:02:46Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5cf1f9522792fdaf7e82</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5cc85ea31bc68a248441</flow_id>
        <hash>8dc97ec4b52c7e66d850aa12b42c257c2d6977dd22d1ef819ffabccc0ad5eae5</hash>
        <iocs/>
        <name>08a56b0171b34321c5de916ab2f5905a</name>
        <report_id>08ee91bc-b330-4a02-84ee-82f7023e1225</report_id>
        <tags>
          <value>apk</value>
          <value>android</value>
          <value>bankbot</value>
          <value>anti-debug</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>fingerprint</value>
          <value>persistence</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>d96920527fd0d5285c38f787d1a6541c740cd95fb0b257f2f7c4ddcf6faa778f</id>
    <title>Analysis Report for d96920527fd0d5285c38f787d1a6541c740cd95fb0b257f2f7c4ddcf6faa778f</title>
    <updated>2026-04-13T03:02:37Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5cf4f9522792fdaf7e84</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5cbc5ea31bc68a248416</flow_id>
        <hash>d96920527fd0d5285c38f787d1a6541c740cd95fb0b257f2f7c4ddcf6faa778f</hash>
        <iocs>
          <urls>
            <value>
              <url>https://instagram.com/hosseinabaspanahoriginal</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://patch.chelpus.com/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://www.luckypatchers.com/download/</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>instagram.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>luckypatchers.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>patch.chelpus.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>arm@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot-core-oj.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.art</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@boot.oat</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@core.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@framework.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>framework@services.jar</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>nSaNX@forpda.ru</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>pkg.apk@classes.dex</email>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <email>alyaksandr.koshal@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>lp.chelpus@gmail.com</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>127.0.0.1</ip>
              <origin>APK_DECODING</origin>
            </value>
          </ips>
        </iocs>
        <name>08890432afe6cf5ef67cf5321e244c09</name>
        <report_id>368e409c-1c9e-4445-9242-cc21bc1e49cd</report_id>
        <tags>
          <value>apk</value>
          <value>invalid-signature</value>
          <value>fingerprint</value>
          <value>persistence</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
          <value>expand</value>
          <value>lolbin</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>cf47d4ab026f31f189da83974d68e83fef9d1316f74a253c1c699ac9a2597d69</id>
    <title>Analysis Report for cf47d4ab026f31f189da83974d68e83fef9d1316f74a253c1c699ac9a2597d69</title>
    <updated>2026-04-13T03:02:21Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5ce5f9522792fdaf7e7d</_id>
        <file_type>application/vnd.android.package-archive</file_type>
        <flow_id>69dc5cae799d5bf325fa5629</flow_id>
        <hash>cf47d4ab026f31f189da83974d68e83fef9d1316f74a253c1c699ac9a2597d69</hash>
        <iocs>
          <urls>
            <value>
              <url>http://www.google.com/AdMob</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://en.wikipedia.org/wiki/Tesla_(unit).</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>https://github.com/felldo/JEmoji?tab=readme-ov-file#-jemoji-language-module</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://logback.qos.ch/codes.html#null_CS</url>
              <origin>APK_DECODING</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.slf4j.org/codes.html#null_MDCA</url>
              <origin>APK_DECODING</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://www.slf4j.org/codes.html#unsuccessfulInit</url>
              <origin>APK_DECODING</origin>
              <verdict>NO_THREAT</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>logback.qos.ch</url>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <url>slf4j.org</url>
              <origin>APK_DECODING</origin>
            </value>
            <value>
              <url>en.wikipedia.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>github.com</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>google.com</url>
              <origin>INPUT_FILE</origin>
            </value>
          </domains>
          <emails>
            <value>
              <email>apps@toot.fedilab.app</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>1.3.101.112</ip>
              <origin>INPUT_FILE</origin>
            </value>
          </ips>
          <btc_wallets>
            <value>
              <btc_wallet>mZx42RuuJJ98pNDjH9TczNPcL</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
          </btc_wallets>
        </iocs>
        <name>08324fcbe3cf77d99483d34f31ffcab9</name>
        <report_id>ca452518-d8ff-49f9-941f-fb43fb2a5b93</report_id>
        <tags>
          <value>apk</value>
          <value>android</value>
          <value>fingerprint</value>
          <value>base64</value>
          <value>crypto</value>
          <value>evasive</value>
          <value>signed</value>
          <value>adware</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>305e8c3c9e6d8a42c0ee270f40b07eea1698a17b1ca4a7de2380fe3c1c8ce211</id>
    <title>Analysis Report for 305e8c3c9e6d8a42c0ee270f40b07eea1698a17b1ca4a7de2380fe3c1c8ce211</title>
    <updated>2026-04-13T03:00:57Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5caa80678438b878ab65</_id>
        <file_type>text/html</file_type>
        <flow_id>69dc5c66799d5bf325fa553c</flow_id>
        <hash>305e8c3c9e6d8a42c0ee270f40b07eea1698a17b1ca4a7de2380fe3c1c8ce211</hash>
        <iocs>
          <urls>
            <value>
              <url>#</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>#content</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>#main</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>blob:null/835f508d-0e75-498f-8936-8ee961169d8e</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>file:///tmp/tmphhzoucxa.html</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/creame-whatsapp-me/public/css/joinchat-btn.min.css?ver=6.1.2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/creame-whatsapp-me/public/js/joinchat.min.js?ver=6.1.2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/css/conditionals/apple-webkit.min.css?ver=4.0.1</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/css/conditionals/e-swiper.min.css?ver=4.0.1</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/css/frontend.min.css?ver=4.0.1</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/css/widget-icon-list.min.css?ver=4.0.1</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/css/widget-social-icons.min.css?ver=4.0.1</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/js/frontend-modules.min.js?ver=4.0.1</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/js/frontend.min.js?ver=4.0.1</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/js/section-frontend-handlers.d85ab872da118940910d.bundle.min.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/js/shared-frontend-handlers.03caa53373b56d3bab67.bundle.min.js</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/js/webpack.runtime.min.js?ver=4.0.1</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/animations/styles/e-animation-float.min.css?ver=4.0.1</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/eicons/css/elementor-icons.min.css?ver=5.48.0</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/font-awesome/css/all.min.css?ver=6.6.0</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/font-awesome/css/brands.min.css?ver=5.15.3</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/font-awesome/css/fontawesome.min.css?ver=5.15.3</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/font-awesome/css/solid.min.css?ver=5.15.3</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/font-awesome/css/v4-shims.min.css?ver=6.6.0</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/font-awesome/js/v4-shims.min.js?ver=6.6.0</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/swiper/v8/css/swiper.min.css?ver=8.4.5</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/swiper/v8/swiper.min.js?ver=8.4.5</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/essential-addons-for-elementor-lite/assets/front-end/css/view/general.min.css?ver=6.6.0</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/essential-addons-for-elementor-lite/assets/front-end/js/view/general.min.js?ver=6.6.0</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/ocean-extra/assets/css/widgets.css?ver=5f9e54280c43d6bd65269e9ae0e3fb12</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/ocean-extra/includes/widgets/js/flickr.min.js?ver=5f9e54280c43d6bd65269e9ae0e3fb12</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/pojo-accessibility/modules/legacy/assets/css/style.min.css?ver=1.0.0</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/pojo-accessibility/modules/legacy/assets/js/app.min.js?ver=1.0.0</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/aprimoraweb-child/style.css?ver=5f9e54280c43d6bd65269e9ae0e3fb12</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/css/style.min.css?ver=1.0</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/css/third/simple-line-icons.min.css?ver=2.4.0</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/fonts/fontawesome/css/all.min.css?ver=6.7.2</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/js/drop-down-mobile-menu.min.js?ver=1.0</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/js/equal-height-elements.min.js?ver=1.0</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/js/header-replace-search.min.js?ver=1.0</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/js/ow-lightbox.min.js?ver=1.0</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/js/ow-slider.min.js?ver=1.0</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/js/scroll-effect.min.js?ver=1.0</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/js/scroll-top.min.js?ver=1.0</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/js/select.min.js?ver=1.0</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/js/theme.min.js?ver=1.0</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/js/vendors/flickity.pkgd.min.js?ver=1.0</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/js/vendors/magnific-popup.min.js?ver=1.0</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-includes/css/dist/block-library/style.min.css?ver=5f9e54280c43d6bd65269e9ae0e3fb12</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-includes/js/comment-reply.min.js?ver=5f9e54280c43d6bd65269e9ae0e3fb12</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-includes/js/imagesloaded.min.js?ver=5.0.0</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-includes/js/jquery/jquery.min.js?ver=3.7.1</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-includes/js/jquery/ui/core.min.js?ver=1.13.3</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-includes/js/wp-emoji-release.min.js?ver=5f9e54280c43d6bd65269e9ae0e3fb12</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://bsc-testnet.drpc.org/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://instagram.com/violaequeirozadvogados</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://open.spotify.com/show/4GtuoLspnvVaFeELth2bZv?si=NwII8QinS8SflzEyHNqIlA</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://t.me/violaequeirozadvogados</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://twitter.com/ViolaeQueiroz?s=09</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/#</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/2025/07/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/ans-determina-que-amil-reassuma-carteira-transferida-para-a-aps/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/areas-de-atuacao/autismo</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/areas-de-atuacao/direito-medico-e-da-saude</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/artigos/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/categoria/artigos/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/categoria/decisoes-favoraveis/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/categoria/seus-direitos/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/cirurgia-antiglaucomatosa-via-angular/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/contato/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/decisoes-favoraveis/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/especialidades/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/imprensa/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/os-planos-de-saude-tem-obrigacoes-especificas-para-pacientes-com-cancer/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/quem-somos/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/spinraza-nusinersena/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2020/02/cropped-Viola-Queiroz-Logo-1024x551.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2021/06/Imagem7.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2022/04/AMIL-300x300.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2024/12/Quem-tem-cancer-pode-contratar-plano-de-saude_Freepik-1-_1_-e1733919328754-300x164.webp</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/elementor/google-fonts/css/roboto.css?ver=1742313793</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/elementor/google-fonts/css/robotoslab.css?ver=1742313798</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/elementor/thumbs/Viola-Queiroz-Logo-omdszo896vo3ksarvzgplypoe2bxn79o67kginhvb0.png</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://vm.tiktok.com/ZMJTX8c1Q/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/ame?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/ametipo1?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/amiotrofiaespinhal?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/arreflexia?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/atrofia?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/atrofiamuscularespinhal?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/hipotonia?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/medulaespinhal?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/miofasciculacao?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/neur%C3%B4nio?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/nusinersena?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/paciente?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/paralisia?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/planodesa%C3%BAde?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/spiranza?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/troncocerebral?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/violaequeirozadvogados/</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://www.googletagmanager.com/gtag/js?id=G-S67DRTC4CF</url>
              <origin>URL_RENDER</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>https://youtube.com/channel/UCfZkF2MJcSBFesw9i6ztXsQ</url>
              <origin>URL_RENDER</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>javascript:void(0);</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>mailto:contato@violaequeirozadvogados.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/spinraza-nusinersena/</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/spinraza-nusinersena/&amp;</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://mc-main.mini</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://schema.org/BreadcrumbList</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>http://site-header.center</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://site-header.top</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-comments-post.php</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/creame-whatsapp-me/gutenberg/build/style-index.css</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/creame-whatsapp-me/public/css/joinchat-btn.min.css?ver=6.1.2'</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/creame-whatsapp-me/public/js/joinchat.min.js?ver=6.1.2</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/css/conditionals/apple-webkit.min.css?ver=4.0.1'</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/css/conditionals/e-swiper.min.css?ver=4.0.1'</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/css/frontend.min.css?ver=4.0.1'</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/css/widget-icon-list.min.css?ver=4.0.1'</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/css/widget-social-icons.min.css?ver=4.0.1'</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/js/frontend-modules.min.js?ver=4.0.1</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/js/frontend.min.js?ver=4.0.1</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/js/webpack.runtime.min.js?ver=4.0.1</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/animations/styles/e-animation-float.min.css?ver=4.0.1'</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/eicons/css/elementor-icons.min.css?ver=5.48.0'</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/font-awesome/css/all.min.css?ver=6.6.0'</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/font-awesome/css/brands.min.css?ver=5.15.3'</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/font-awesome/css/fontawesome.min.css?ver=5.15.3'</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/font-awesome/css/solid.min.css?ver=5.15.3'</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/font-awesome/css/v4-shims.min.css?ver=6.6.0'</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/font-awesome/js/v4-shims.min.js?ver=6.6.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/swiper/v8/css/swiper.min.css?ver=8.4.5'</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/swiper/v8/swiper.min.js?ver=8.4.5</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/essential-addons-for-elementor-lite/assets/front-end/css/view/general.min.css?ver=6.6.0'</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/essential-addons-for-elementor-lite/assets/front-end/img/image-masking/svg-shapes</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/essential-addons-for-elementor-lite/assets/front-end/js/view/general.min.js?ver=6.6.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/ocean-extra/assets/css/widgets.css?ver=5f9e54280c43d6bd65269e9ae0e3fb12'</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/ocean-extra/includes/widgets/js/flickr.min.js?ver=5f9e54280c43d6bd65269e9ae0e3fb12</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/pojo-accessibility/modules/legacy/assets/css/style.min.css?ver=1.0.0'</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/pojo-accessibility/modules/legacy/assets/js/app.min.js?ver=1.0.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/aprimoraweb-child/style.css?ver=5f9e54280c43d6bd65269e9ae0e3fb12'</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/css/style.min.css?ver=1.0'</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/css/third/simple-line-icons.min.css?ver=2.4.0'</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/fonts/fontawesome/css/all.min.css?ver=6.7.2'</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/js/drop-down-mobile-menu.min.js?ver=1.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/js/equal-height-elements.min.js?ver=1.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/js/header-replace-search.min.js?ver=1.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/js/ow-lightbox.min.js?ver=1.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/js/ow-slider.min.js?ver=1.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/js/scroll-effect.min.js?ver=1.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/js/scroll-top.min.js?ver=1.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/js/select.min.js?ver=1.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/js/theme.min.js?ver=1.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/js/vendors/flickity.pkgd.min.js?ver=1.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/js/vendors/magnific-popup.min.js?ver=1.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-includes/css/dist/block-library/style.min.css?ver=5f9e54280c43d6bd65269e9ae0e3fb12'</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-includes/js/comment-reply.min.js?ver=5f9e54280c43d6bd65269e9ae0e3fb12</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-includes/js/imagesloaded.min.js?ver=5.0.0</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-includes/js/jquery/jquery.min.js?ver=3.7.1</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-includes/js/jquery/ui/core.min.js?ver=1.13.3</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-includes/js/wp-emoji-loader.min.js</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-includes/js/wp-emoji-release.min.js?ver=5f9e54280c43d6bd65269e9ae0e3fb12</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/xmlrpc.php</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://gmpg.org/xfn/11</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://instagram.com/violaequeirozadvogados</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://open.spotify.com/show/4GtuoLspnvVaFeELth2bZv?si=NwII8QinS8SflzEyHNqIlA</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>https://s.w.org/images/core/emoji/17.0.2/72x72</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://s.w.org/images/core/emoji/17.0.2/svg</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://schema.org/Article</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>https://schema.org/ListItem</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>https://schema.org/SiteNavigationElement</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>https://schema.org/WPFooter</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>https://schema.org/WPHeader</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>https://schema.org/WPSideBar</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>https://twitter.com/ViolaeQueiroz?s=09</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/2025/07</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/?p=2162'</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/ans-determina-que-amil-reassuma-carteira-transferida-para-a-aps</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/areas-de-atuacao/autismo</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/areas-de-atuacao/direito-medico-e-da-saude</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/artigos</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/categoria/artigos</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/categoria/decisoes-favoraveis</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/categoria/seus-direitos</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/cirurgia-antiglaucomatosa-via-angular</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/comments/feed</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/contato</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/decisoes-favoraveis</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/especialidades</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/feed</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/imprensa</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/os-planos-de-saude-tem-obrigacoes-especificas-para-pacientes-com-cancer</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/quem-somos</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/spinraza-nusinersena</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/spinraza-nusinersena/feed</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-admin/admin-ajax.php</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2020/02/cropped-Viola-Queiroz-Favicon-1-180x180.png</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2020/02/cropped-Viola-Queiroz-Favicon-1-192x192.png</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2020/02/cropped-Viola-Queiroz-Favicon-1-270x270.png</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2020/02/cropped-Viola-Queiroz-Favicon-1-32x32.png</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2020/02/cropped-Viola-Queiroz-Logo-1024x551.png</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2020/02/cropped-Viola-Queiroz-Logo-1536x827.png</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2020/02/cropped-Viola-Queiroz-Logo-300x161.png</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2020/02/cropped-Viola-Queiroz-Logo-768x413.png</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2020/02/cropped-Viola-Queiroz-Logo.png</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2021/06/Imagem7-150x150.png</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2021/06/Imagem7-300x300.png</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2021/06/Imagem7-768x768.png</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2021/06/Imagem7.png</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2022/04/AMIL-1024x1024.png</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2022/04/AMIL-150x150.png</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2022/04/AMIL-300x300.png</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2022/04/AMIL-768x768.png</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2022/04/AMIL.png</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2024/12/Quem-tem-cancer-pode-contratar-plano-de-saude_Freepik-1-_1_-e1733919328754-1024x559.webp</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2024/12/Quem-tem-cancer-pode-contratar-plano-de-saude_Freepik-1-_1_-e1733919328754-1536x838.webp</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2024/12/Quem-tem-cancer-pode-contratar-plano-de-saude_Freepik-1-_1_-e1733919328754-300x164.webp</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2024/12/Quem-tem-cancer-pode-contratar-plano-de-saude_Freepik-1-_1_-e1733919328754-768x419.webp</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2024/12/Quem-tem-cancer-pode-contratar-plano-de-saude_Freepik-1-_1_-e1733919328754.webp</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/elementor/google-fonts/css/roboto.css?ver=1742313793'</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/elementor/google-fonts/css/robotoslab.css?ver=1742313798'</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/elementor/thumbs/Viola-Queiroz-Logo-omdszo896vo3ksarvzgplypoe2bxn79o67kginhvb0.png</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-json</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-json/oembed/1.0/embed</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-json/oembed/1.0/embed?#038;format=xm</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-json/wp/v2/posts/2162</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/xmlrpc.php?rsd</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://vm.tiktok.com/ZMJTX8c1Q</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/ame?__eep__=6&amp;amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;amp;__tn__=*NK-R</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/ametipo1?__eep__=6&amp;amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;amp;__tn__=*NK-R</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/amiotrofiaespinhal?__eep__=6&amp;amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;amp;__tn__=*NK-R</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/arreflexia?__eep__=6&amp;amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;amp;__tn__=*NK-R</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/atrofia?__eep__=6&amp;amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS76</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/atrofiamuscularespinhal?__eep__=6&amp;amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;amp;__tn__=*NK-R</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/hipotonia?__eep__=6&amp;amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;amp;__tn__=*NK-R</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/medulaespinhal?__eep__=6&amp;amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;amp;__tn__=*NK-R</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/miofasciculacao?__eep__=6&amp;amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgS</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/neur%C3%B4nio?__eep__=6&amp;amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;amp;__tn__=*NK-R</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/nusinersena?__eep__=6&amp;amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;amp;__tn__=*NK-R</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/paciente?__eep__=6&amp;amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;amp;__tn__=*NK-R</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/paralisia?__eep__=6&amp;amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;amp;__tn__=*NK-R</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/planodesa%C3%BAde?__eep__=6&amp;amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;amp;__tn__=*NK-R</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/spiranza?__eep__=6&amp;amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnliz</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/troncocerebral?__eep__=6&amp;amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;amp;__tn__=*NK-R</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://www.facebook.com/violaequeirozadvogados</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>https://www.googletagmanager.com/gtag/js?id=G-S67DRTC4CF</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>https://youtube.com/channel/UCfZkF2MJcSBFesw9i6ztXsQ</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/spinraza-nusinersena/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/spinraza-nusinersena/&amp;format=xml</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/creame-whatsapp-me/public/css/joinchat-btn.min.css?ver=6.1.2</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/css/conditionals/apple-webkit.min.css?ver=4.0.1</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/css/conditionals/e-swiper.min.css?ver=4.0.1</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/css/frontend.min.css?ver=4.0.1</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/css/widget-icon-list.min.css?ver=4.0.1</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/css/widget-social-icons.min.css?ver=4.0.1</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/animations/styles/e-animation-float.min.css?ver=4.0.1</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/eicons/css/elementor-icons.min.css?ver=5.48.0</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/font-awesome/css/all.min.css?ver=6.6.0</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/font-awesome/css/brands.min.css?ver=5.15.3</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/font-awesome/css/fontawesome.min.css?ver=5.15.3</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/font-awesome/css/solid.min.css?ver=5.15.3</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/font-awesome/css/v4-shims.min.css?ver=6.6.0</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/swiper/v8/css/swiper.min.css?ver=8.4.5</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/essential-addons-for-elementor-lite/assets/front-end/css/view/general.min.css?ver=6.6.0</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/ocean-extra/assets/css/widgets.css?ver=5f9e54280c43d6bd65269e9ae0e3fb12</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/pojo-accessibility/modules/legacy/assets/css/style.min.css?ver=1.0.0</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/aprimoraweb-child/style.css?ver=5f9e54280c43d6bd65269e9ae0e3fb12</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/css/style.min.css?ver=1.0</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/css/third/simple-line-icons.min.css?ver=2.4.0</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/fonts/fontawesome/css/all.min.css?ver=6.7.2</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-includes/css/dist/block-library/style.min.css?ver=5f9e54280c43d6bd65269e9ae0e3fb12</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/xmlrpc.php</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://gmpg.org/xfn/11</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://instagram.com/violaequeirozadvogados</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://open.spotify.com/show/4GtuoLspnvVaFeELth2bZv?si=NwII8QinS8SflzEyHNqIlA</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://t.me/violaequeirozadvogados</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://twitter.com/ViolaeQueiroz?s=09</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/#</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/2025/07/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/?p=2162</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/ans-determina-que-amil-reassuma-carteira-transferida-para-a-aps/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/areas-de-atuacao/autismo</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/areas-de-atuacao/direito-medico-e-da-saude</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/artigos/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/categoria/artigos/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/categoria/decisoes-favoraveis/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/categoria/seus-direitos/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/cirurgia-antiglaucomatosa-via-angular/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/comments/feed/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/contato/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/decisoes-favoraveis/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/especialidades/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/feed/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/imprensa/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/os-planos-de-saude-tem-obrigacoes-especificas-para-pacientes-com-cancer/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/quem-somos/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/spinraza-nusinersena/feed/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2020/02/cropped-Viola-Queiroz-Favicon-1-180x180.png</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2020/02/cropped-Viola-Queiroz-Favicon-1-192x192.png</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/2020/02/cropped-Viola-Queiroz-Favicon-1-32x32.png</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/elementor/google-fonts/css/roboto.css?ver=1742313793</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-content/uploads/elementor/google-fonts/css/robotoslab.css?ver=1742313798</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-json/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-json/oembed/1.0/embed</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/wp-json/wp/v2/posts/2162</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://violaequeirozadvogados.com.br/xmlrpc.php?rsd</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://vm.tiktok.com/ZMJTX8c1Q/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/ame?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/ametipo1?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/amiotrofiaespinhal?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/arreflexia?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/atrofia?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/atrofiamuscularespinhal?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/hipotonia?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/medulaespinhal?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/miofasciculacao?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/neur%C3%B4nio?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/nusinersena?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/paciente?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/paralisia?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/planodesa%C3%BAde?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/spiranza?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/hashtag/troncocerebral?__eep__=6&amp;__cft__%5b0%5d=AZXHig5NJOq-s_r_XwF7X3aIIOA991iJpPfR1DEL85alPZA5GaZIdz8rREoMM50aRsn92oQbTAnXjG3SKgSnPp2ZzNvS765doPqkgmrhx5XPsLX7brpMtCWqLKNVTRC5oAw-w4aiNnlizee1uI35P_Jhwt_KeHW09tZBj-GZ-Kbz_eTVPjFK-S6LhoYmGVrkGmJrzizWAI5s4Ez8dz5pD1TeeW-wstZottjgyqLw7xyNeKSkIu9qzRBkYu9i4Wxs75i8LVfy9A5sZsdLfx0x9ojJ&amp;__tn__=*NK-R</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://www.facebook.com/violaequeirozadvogados/</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>https://youtube.com/channel/UCfZkF2MJcSBFesw9i6ztXsQ</url>
              <origin>EXTERNAL_PARSER</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>mailto:contato@violaequeirozadvogados.com.br</url>
              <origin>EXTERNAL_PARSER</origin>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/creame-whatsapp-me/public/css/joinchat-btn.min.css?ver=6.1.2</url>
              <origin>MSHTA_EMULATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/css/frontend.min.css?ver=4.0.1</url>
              <origin>MSHTA_EMULATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/font-awesome/css/brands.min.css?ver=5.15.3</url>
              <origin>MSHTA_EMULATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/font-awesome/css/fontawesome.min.css?ver=5.15.3</url>
              <origin>MSHTA_EMULATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/elementor/assets/lib/font-awesome/css/solid.min.css?ver=5.15.3</url>
              <origin>MSHTA_EMULATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/essential-addons-for-elementor-lite/assets/front-end/css/view/general.min.css?ver=6.6.0</url>
              <origin>MSHTA_EMULATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/ocean-extra/assets/css/widgets.css?ver=5f9e54280c43d6bd65269e9ae0e3fb12</url>
              <origin>MSHTA_EMULATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/plugins/pojo-accessibility/modules/legacy/assets/css/style.min.css?ver=1.0.0</url>
              <origin>MSHTA_EMULATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/aprimoraweb-child/style.css?ver=5f9e54280c43d6bd65269e9ae0e3fb12</url>
              <origin>MSHTA_EMULATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/css/style.min.css?ver=1.0</url>
              <origin>MSHTA_EMULATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/css/third/simple-line-icons.min.css?ver=2.4.0</url>
              <origin>MSHTA_EMULATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-content/themes/oceanwp/assets/fonts/fontawesome/css/all.min.css?ver=6.7.2</url>
              <origin>MSHTA_EMULATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-includes/css/dist/block-library/style.min.css?ver=5f9e54280c43d6bd65269e9ae0e3fb12</url>
              <origin>MSHTA_EMULATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1</url>
              <origin>MSHTA_EMULATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>http://violaequeirozadvogados.com.br/wp-includes/js/jquery/jquery.min.js?ver=3.7.1</url>
              <origin>MSHTA_EMULATION</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </urls>
          <domains>
            <value>
              <url>bsc-testnet.drpc.org</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>instagram.com</url>
              <origin>URL_RENDER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>open.spotify.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>t.me</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>twitter.com</url>
              <origin>URL_RENDER</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>violaequeirozadvogados.com.br</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>vm.tiktok.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.facebook.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>www.googletagmanager.com</url>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <url>youtube.com</url>
              <origin>URL_RENDER</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>violaequeirozadvogados.com.br</url>
              <origin>MSHTA_EMULATION</origin>
            </value>
            <value>
              <url>facebook.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <url>gmpg.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>googletagmanager.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>instagram.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>mc-main.mini</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>open.spotify.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>s.w.org</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>schema.org</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
            <value>
              <url>site-header.center</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>site-header.top</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>twitter.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>violaequeirozadvogados.com.br</url>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <url>vm.tiktok.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <url>youtube.com</url>
              <origin>INPUT_FILE</origin>
              <verdict>whitelisted</verdict>
            </value>
          </domains>
          <emails>
            <value>
              <email>contato@violaequeirozadvogados.com.br</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <ips>
            <value>
              <ip>192.0.77.48</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>186.202.153.48</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>157.240.30.35</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>184.24.77.44</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>66.155.40.24</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>146.75.123.42</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>57.144.244.34</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>172.66.0.227</ip>
              <origin>DOMAIN_RESOLVE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>104.18.11.59</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>142.251.13.97</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>186.202.153.48</ip>
              <origin>URL_RENDER</origin>
            </value>
            <value>
              <ip>violaequeirozadvogados.com.br</ip>
              <origin>MSHTA_EMULATION</origin>
            </value>
            <value>
              <ip>facebook.com</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>gmpg.org</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>instagram.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>open.spotify.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>s.w.org</ip>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <ip>twitter.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <ip>vm.tiktok.com</ip>
              <origin>INPUT_FILE</origin>
              <verdict>UNKNOWN</verdict>
            </value>
          </ips>
          <files>
            <value>
              <MD5>9517c04f8c5f7790057bbdb4ceed543d</MD5>
              <SHA-1>d6f309f30dd40e60a1cecc18abcea8032879d992</SHA-1>
              <SHA-256>838de3ac81f855c0a95a15f9d351d1e4d81aafc05948ea615154f57b5e5fa04f</SHA-256>
              <origin>URL_RENDER</origin>
              <file_type>image/png</file_type>
            </value>
            <value>
              <MD5>99a7f0c0b3ada4197236f24d8e354ae8</MD5>
              <SHA-1>70866666dc1b629bae6d42808f0d1ed523b8ff0e</SHA-1>
              <SHA-256>2368a166d123367222da6d1cf11651c27abf59c3e9330e23a9c9e5983900292a</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/css</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <MD5>144e43c3b3d8ea5b278c062c202c92f2</MD5>
              <SHA-1>3c037057a419245849747b4762d09d88cab66fc1</SHA-1>
              <SHA-256>9cd63b8cea25045c14623c538d26752518a58c0c682795ce6ad3078976c65a37</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/css</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <MD5>9eb2d3c87feb6bb2ffa63b70532b1477</MD5>
              <SHA-1>38f226335a05ab0e30497bc7419eb5e243a9e26c</SHA-1>
              <SHA-256>37bab6cd583982e8eff58501a99d7c5c4d63664c1ca34f9e3b7cf526c5b73ae2</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/css</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <MD5>f4af7e5ec05ebb0f08d43e2384266abc</MD5>
              <SHA-1>a1869e155e92fa178b9c3ae6dff787df57f195c6</SHA-1>
              <SHA-256>fafc4160788beca657ec3e3041976281fb6d54a0e82bb4d22a433f7c6bb8b1d6</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/css</file_type>
              <verdict>NO_THREAT</verdict>
            </value>
            <value>
              <MD5>4fb5f7fc5e41f736ec0527b162519d52</MD5>
              <SHA-1>33697641c940c68153509fa7c9d7d0c3c760ce2d</SHA-1>
              <SHA-256>0a5d398672e25dc7f020f69df92a985481b248a60e301fee232d0c8afd648dc5</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/css</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <MD5>eb3ab8fc10690b66f1aafaa9d5ba2c6b</MD5>
              <SHA-1>d39dc8895e712edc667e33bf713dfc8094f75c19</SHA-1>
              <SHA-256>dd65628f1ae991876017711b2cadbdf2ef1807f165cce0216f97f74cf2a2fbfa</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/css</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <MD5>84e9faf79071506b26972607fba4a77b</MD5>
              <SHA-1>ed2f91660e67dd1f5abe015bebede7605e8989cf</SHA-1>
              <SHA-256>96102022182a1acb5f4755104dd3f246c5826140767d6da628271ba0e2b0068e</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/css</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <MD5>b86f794de8018274942f4f7a60a70d87</MD5>
              <SHA-1>c621ffd48eb9f6183f3318df36e44959210408b3</SHA-1>
              <SHA-256>ee52185d6a681a5d5b8a21ff5321901ce83e4ded11213a2e169d8be1e0417aab</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/css</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <MD5>79485a4fc6c6a2293a6aebac34504b7d</MD5>
              <SHA-1>7b885cfdfe1c12c00ef12d5637a0c2935bfd80de</SHA-1>
              <SHA-256>599fbcabe7d3c59db478b25e288742a81de37d68da9bd1b4650ae2462c615467</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/css</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
            <value>
              <MD5>517dda83e7784560e130032a025c6b6c</MD5>
              <SHA-1>2a8ee365d634954d6c8e4ed617fd47837142656e</SHA-1>
              <SHA-256>b5cd126d4534d79e24a6416cc5710434450c6076497fe1af4e9040f860ab71ac</SHA-256>
              <origin>DOWNLOADED_FILE</origin>
              <file_type>text/css</file_type>
              <verdict>UNKNOWN</verdict>
            </value>
          </files>
        </iocs>
        <name>305e8c3c9e6d8a42c0ee270f40b07eea1698a17b1ca4a7de2380fe3c1c8ce211</name>
        <report_id>f825749a-964a-47c9-8787-aa8c01b2b17a</report_id>
        <tags>
          <value>html</value>
          <value>txt</value>
          <value>threat</value>
          <value>unknown</value>
        </tags>
        <verdict>SUSPICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>0f70430623f2666c7abeca6a0895428eae69262f981cf8881edf31e2d4dd2a6a</id>
    <title>Analysis Report for 0f70430623f2666c7abeca6a0895428eae69262f981cf8881edf31e2d4dd2a6a</title>
    <updated>2026-04-13T03:00:49Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5ced80678438b878ab72</_id>
        <file_type>application/x-dosexec</file_type>
        <flow_id>69dc5c5c5ea31bc68a2482a5</flow_id>
        <hash>0f70430623f2666c7abeca6a0895428eae69262f981cf8881edf31e2d4dd2a6a</hash>
        <iocs>
          <emails>
            <value>
              <email>_te7@7.Mmi</email>
              <origin>INPUT_FILE</origin>
            </value>
            <value>
              <email>v@z.kD0D</email>
              <origin>INPUT_FILE</origin>
            </value>
          </emails>
          <files>
            <value>
              <SHA-256>06b3d8cc34ab9ac33d9412f9c9f8b3b01548d70f8d7041405ca1da5bf903394a</SHA-256>
              <SHA-1>91924662f955be9ec308097a50a42d80e7117938</SHA-1>
              <MD5>a94e314dc216137e5cc675fabd2dec74</MD5>
              <origin>PYTHON_UNPACKING</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>0ddb245284f2cebf4d18d5756d2a9900f1cc8a0698c1d072df629474059fbbf6</SHA-256>
              <SHA-1>92ab8fbe64850dd4693800533aff2a58bcd85ac2</SHA-1>
              <MD5>e8d8e254641a43a05b49d3bb4db64e44</MD5>
              <origin>PYTHON_UNPACKING</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>13160d8e413f8a06f47aec8b20edc6ea5d63b63190f77ae9a1ec1bed7195da79</SHA-256>
              <SHA-1>264a1f51d8f3ac1aeaf37369038f97f24c48b52c</SHA-1>
              <MD5>7ef51f60309aa7899efdfed89aa1ad6f</MD5>
              <origin>PYTHON_UNPACKING</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>13e4d9a734a453a3613e11b6a518430099ad7e3d874ea407d1f9625b7f60268a</SHA-256>
              <SHA-1>893954a45c75fb45fe8048a804990ca33f7c072d</SHA-1>
              <MD5>756c95d4d9b7820b00a3099faf3f4f51</MD5>
              <origin>PYTHON_UNPACKING</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>141c00ccf8f8c1bba337ba81bd90988e16a20f365c5e3994f459ec74eb202cbb</SHA-256>
              <SHA-1>7b5ef739518aea1369e5be631451ec1dd4f3fbad</SHA-1>
              <MD5>1aeeab77c0bb2cac4b58907de2015699</MD5>
              <origin>PYTHON_UNPACKING</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>168e2e04a2a5a53572dd9ef57b92f9966ed96fdd33493b1ac17511d95b198863</SHA-256>
              <SHA-1>d9a1aa38ad04a23bd9eb1f19871109518749c3ee</SHA-1>
              <MD5>b04485e427adb89dd232de8b79102d2d</MD5>
              <origin>PYTHON_UNPACKING</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>2163fb040302482993f9513116c53b9088a16e96d1d478d766d36609ae1fc0f6</SHA-256>
              <SHA-1>3de532d83e13c72b0bbf35c426ced19cf531d56d</SHA-1>
              <MD5>a7abdf248bc0e9d677bac4bf6cac118e</MD5>
              <origin>PYTHON_UNPACKING</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>27b9545f5a510e71195951485d3c6a8b112917546fe5e8e46579b8ff6ce2acb0</SHA-256>
              <SHA-1>7c21b7147b391b7195583ab695717e38fe971e3e</SHA-1>
              <MD5>aea6a82bfa35b61d86e8b6a5806f31d6</MD5>
              <origin>PYTHON_UNPACKING</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>2e558c26495a4a1cf3b23e665686aeed08e9971c0b17c7968a32dacdc0711615</SHA-256>
              <SHA-1>f438b82f60980a4bf303ee068783a496087e01e5</SHA-1>
              <MD5>c44300511552b26f22614187c6e1a1c0</MD5>
              <origin>PYTHON_UNPACKING</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>33d44c372b3c08b08c767c13407896b917caecbc1a62df3c22553b9312ac97dd</SHA-256>
              <SHA-1>af259eb14aa6182573ccd9f7bfb6bf8f595dbc23</SHA-1>
              <MD5>f4df2d8b64b1562c16bcfbcb67a18566</MD5>
              <origin>PYTHON_UNPACKING</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>3ec8f687f7ba21decff512f1dbbd5d4287ffcb60ed83fe7b60c6eac6183d1ff8</SHA-256>
              <SHA-1>1af2375364ab6f0909e1ac6e0cbb921ea4996fd8</SHA-1>
              <MD5>5231b413e1c768e2c12f524dce597085</MD5>
              <origin>PYTHON_UNPACKING</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>40cbc62751344a01912412f195797d4abfb102da70d4cd1bbce46946c4f92a61</SHA-256>
              <SHA-1>d4b68ad0a7311d281a341438fe2b866fa0a9c235</SHA-1>
              <MD5>9bd40aedf7b5ba32386749ef04fec7ca</MD5>
              <origin>PYTHON_UNPACKING</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>4ec4eb6ffb5b9e286897f9ea870561de463421f8312af1e976c045ad6b3f3751</SHA-256>
              <SHA-1>0939abb0169cd1991d417a17a58d6f351bf36541</SHA-1>
              <MD5>a8cdac432c401c4d9e910ee94fe00adc</MD5>
              <origin>PYTHON_UNPACKING</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>4fa19d22e3ed9a86a52d375e65f7c1ef7b7bf05a93541a82e8253b5cb7254b39</SHA-256>
              <SHA-1>977e678d62b2146b54e2ab53eeebfbc620adf7e4</SHA-1>
              <MD5>fa7453b0bb22b04f3b44aba36e617c26</MD5>
              <origin>PYTHON_UNPACKING</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>523223717f27f96bcd0254928af41ad06c7cd5b44b86ec90a7716445f2495e2d</SHA-256>
              <SHA-1>4911436e9ae9cf70db8c98e2bbac26e6ccda94f2</SHA-1>
              <MD5>b7c6101803ee49ab246ec207f282a8fa</MD5>
              <origin>PYTHON_UNPACKING</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>72d5179cfa1e3383cac48c91ebc886842f92d15014af57f9f1b4544217fc81f7</SHA-256>
              <SHA-1>0f92c3860348ee92b0e8ace9d4f7deca48427eaf</SHA-1>
              <MD5>72ef65fe8f68973844ca12c550086c99</MD5>
              <origin>PYTHON_UNPACKING</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>8b4c8b5ae537ebad906b2ff2e1578d30e328f51e6917c85cdfc3f27e266cdfa4</SHA-256>
              <SHA-1>70f8d2ff292ada13e0b92eab0b094f1143fb0f8b</SHA-1>
              <MD5>fcc7a54ba636ea6bc66940b93904a2ce</MD5>
              <origin>PYTHON_UNPACKING</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>981d8c24cb563a05861da6523f2f6a4f001f46211d808c4870b857a81134d465</SHA-256>
              <SHA-1>3b085d3610e3567eaee7309964e0b6b0b7a5c887</SHA-1>
              <MD5>0cf7a397fe3cedb5226db34ad46d5c1a</MD5>
              <origin>PYTHON_UNPACKING</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>a8be2335b3d093489b65ab5643b991cdff7a267736fa744a6751c14b31733c9c</SHA-256>
              <SHA-1>b5e194b2b269b155d4f106faeb1a32da11d967e2</SHA-1>
              <MD5>cf7fd0c92cf60cd445bc81c5dd03d9cb</MD5>
              <origin>PYTHON_UNPACKING</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>b034fa86fda7ec312142756f5013bf5cdb0ad2dcf8549820259cd3691074d699</SHA-256>
              <SHA-1>2480147070795b2b0b1f5320413090d0a043da80</SHA-1>
              <MD5>8a3b0418d4b1531450853f09115bbd7a</MD5>
              <origin>PYTHON_UNPACKING</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>c2b3e036828591a6250e9e89b2984d8fe02b65b8a3b32be3247201720fb47c92</SHA-256>
              <SHA-1>f300e138cf6d0c8297e9cfcbd77018ef0f0e3d0e</SHA-1>
              <MD5>4a2fb1b8a56c6087bcf400c0f0e1c16c</MD5>
              <origin>PYTHON_UNPACKING</origin>
              <file_type>application/octet-stream</file_type>
            </value>
            <value>
              <SHA-256>c3b5dc78374dfbf3addcdc5532560ad20f4fe74c026f030b4a7e25c6a13d6489</SHA-256>
              <SHA-1>52779b8d81c9469232e84509fdf84a5bf02db93e</SHA-1>
              <MD5>3a291fccdfa076a81de307f8eb2c91f6</MD5>
              <origin>PYTHON_UNPACKING</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>c68e2ba7f9e326daf1970ad85e16eae7ed92253c1420efc73639d06c087ad6ee</SHA-256>
              <SHA-1>d8dc8a59c2c0caf80caba1edbb7a0c418d1d6e89</SHA-1>
              <MD5>79b2b36e1a1227fcb5ae55f50dec2056</MD5>
              <origin>PYTHON_UNPACKING</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
            <value>
              <SHA-256>d2952e57023848a37fb0f21f0dfb38c9000f610ac2b00c2f128511dfd68bde04</SHA-256>
              <SHA-1>0b1608da9fef218386e825db575c65616826d9f4</SHA-1>
              <MD5>f7ad1eab748bc07570a57ec87787cf90</MD5>
              <origin>PYTHON_UNPACKING</origin>
              <file_type>application/xml</file_type>
            </value>
            <value>
              <SHA-256>d53dd87b61d0e01afb2c9e1d60cac5578c1a7b1891c245d716ffcac604d15bd5</SHA-256>
              <SHA-1>66967e5c4a319351ba972ad02c7020e0ef69f790</SHA-1>
              <MD5>43088c5d4fedf35d7232888b0b46012d</MD5>
              <origin>PYTHON_UNPACKING</origin>
              <file_type>application/x-msdownload</file_type>
            </value>
          </files>
          <btc_wallets>
            <value>
              <btc_wallet>33333333333333333333333333333333</btc_wallet>
              <origin>INPUT_FILE</origin>
            </value>
          </btc_wallets>
        </iocs>
        <name>Bot de pesca PRO.exe</name>
        <report_id>9cdf595f-e7d0-432e-a8a7-02a14e1b8e5e</report_id>
        <tags>
          <value>peexe</value>
          <value>python</value>
          <value>unsafe</value>
          <value>expired-cert</value>
          <value>expand</value>
          <value>lolbin</value>
          <value>microsoft_visual_cc</value>
          <value>nuitka</value>
          <value>packed</value>
          <value>anti-debug</value>
        </tags>
        <verdict>MALICIOUS</verdict>
      </details>
    </content>
  </entry>
  <entry>
    <id>a9565f8780e7b72103fcaaeded604792adf028f394905f51e708378c36b44e92</id>
    <title>Analysis Report for a9565f8780e7b72103fcaaeded604792adf028f394905f51e708378c36b44e92</title>
    <updated>2026-04-13T02:55:46Z</updated>
    <content type="application/xml">
      <details>
        <_id>69dc5b4a80678438b878ab25</_id>
        <file_type>application/java-archive</file_type>
        <flow_id>69dc5b305ea31bc68a247fdf</flow_id>
        <hash>a9565f8780e7b72103fcaaeded604792adf028f394905f51e708378c36b44e92</hash>
        <iocs/>
        <name>Example-1.21.11.jar</name>
        <report_id>b2e01119-02e4-4d86-9ce8-7de1f55cbf9c</report_id>
        <tags>
          <value>java</value>
          <value>anti-debug</value>
          <value>obfuscated</value>
        </tags>
        <verdict>LIKELY_MALICIOUS</verdict>
      </details>
    </content>
  </entry>
</feed>
