Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RFQ 20726 - T5 7841.exe

Overview

General Information

Sample name:RFQ 20726 - T5 7841.exe
Analysis ID:1467070
MD5:68bcd11da168bcd33c61adfe6cf8b2b3
SHA1:2c1233fb5a6e73a8cf5b97248f771ca92f3776dc
SHA256:4c38813ca8fc7a8a94acab611b0d5a8f64592e6c8e5df52e35b7182cdec8dab0
Tags:exe
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected Snake Keylogger
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • RFQ 20726 - T5 7841.exe (PID: 7832 cmdline: "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe" MD5: 68BCD11DA168BCD33C61ADFE6CF8B2B3)
    • powershell.exe (PID: 8004 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 8016 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 8088 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lmUupyodsah.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 8128 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7680 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 8152 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lmUupyodsah" /XML "C:\Users\user\AppData\Local\Temp\tmp38C0.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 8168 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RFQ 20726 - T5 7841.exe (PID: 7436 cmdline: "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe" MD5: 68BCD11DA168BCD33C61ADFE6CF8B2B3)
  • lmUupyodsah.exe (PID: 5168 cmdline: C:\Users\user\AppData\Roaming\lmUupyodsah.exe MD5: 68BCD11DA168BCD33C61ADFE6CF8B2B3)
    • schtasks.exe (PID: 1100 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lmUupyodsah" /XML "C:\Users\user\AppData\Local\Temp\tmp490C.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 8172 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • lmUupyodsah.exe (PID: 8152 cmdline: "C:\Users\user\AppData\Roaming\lmUupyodsah.exe" MD5: 68BCD11DA168BCD33C61ADFE6CF8B2B3)
    • lmUupyodsah.exe (PID: 8164 cmdline: "C:\Users\user\AppData\Roaming\lmUupyodsah.exe" MD5: 68BCD11DA168BCD33C61ADFE6CF8B2B3)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "info@therealdealboattours.com", "Password": "success$2022", "Host": "mail.therealdealboattours.com", "Port": "587"}
SourceRuleDescriptionAuthorStrings
0000000F.00000002.3812867070.000000000041B000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    0000000F.00000002.3812867070.000000000041B000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
    • 0x5e9:$x3: %FTPDV$
    • 0x6dd:$x4: $%TelegramDv$
    • 0x60d:$m2: Clipboard Logs ID
    • 0x82d:$m2: Screenshot Logs ID
    • 0x93d:$m2: keystroke Logs ID
    • 0xc17:$m3: SnakePW
    • 0x805:$m4: \SnakeKeylogger\
    00000009.00000002.3812859081.000000000040A000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
    • 0xc7bf:$a1: get_encryptedPassword
    • 0xcaab:$a2: get_encryptedUsername
    • 0xc5cb:$a3: get_timePasswordChanged
    • 0xc6c6:$a4: get_passwordField
    • 0xc7d5:$a5: set_encryptedPassword
    • 0xdde3:$a7: get_logins
    • 0xdd46:$a10: KeyLoggerEventArgs
    • 0xd9df:$a11: KeyLoggerEventArgsEventHandler
    00000009.00000002.3815453085.0000000002D14000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      0000000A.00000002.1430038668.000000000353C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Click to see the 25 entries
        SourceRuleDescriptionAuthorStrings
        9.2.RFQ 20726 - T5 7841.exe.400000.0.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          9.2.RFQ 20726 - T5 7841.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0x149bf:$a1: get_encryptedPassword
          • 0x14cab:$a2: get_encryptedUsername
          • 0x147cb:$a3: get_timePasswordChanged
          • 0x148c6:$a4: get_passwordField
          • 0x149d5:$a5: set_encryptedPassword
          • 0x15fe3:$a7: get_logins
          • 0x15f46:$a10: KeyLoggerEventArgs
          • 0x15bdf:$a11: KeyLoggerEventArgsEventHandler
          9.2.RFQ 20726 - T5 7841.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
          • 0x1555f:$s1: UnHook
          • 0x15566:$s2: SetHook
          • 0x1556e:$s3: CallNextHook
          • 0x1557b:$s4: _hook
          10.2.lmUupyodsah.exe.355cce8.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            10.2.lmUupyodsah.exe.355cce8.2.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
              Click to see the 50 entries

              System Summary

              barindex
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe", ParentImage: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe, ParentProcessId: 7832, ParentProcessName: RFQ 20726 - T5 7841.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe", ProcessId: 8004, ProcessName: powershell.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe", ParentImage: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe, ParentProcessId: 7832, ParentProcessName: RFQ 20726 - T5 7841.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe", ProcessId: 8004, ProcessName: powershell.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lmUupyodsah" /XML "C:\Users\user\AppData\Local\Temp\tmp490C.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lmUupyodsah" /XML "C:\Users\user\AppData\Local\Temp\tmp490C.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\lmUupyodsah.exe, ParentImage: C:\Users\user\AppData\Roaming\lmUupyodsah.exe, ParentProcessId: 5168, ParentProcessName: lmUupyodsah.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lmUupyodsah" /XML "C:\Users\user\AppData\Local\Temp\tmp490C.tmp", ProcessId: 1100, ProcessName: schtasks.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lmUupyodsah" /XML "C:\Users\user\AppData\Local\Temp\tmp38C0.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lmUupyodsah" /XML "C:\Users\user\AppData\Local\Temp\tmp38C0.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe", ParentImage: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe, ParentProcessId: 7832, ParentProcessName: RFQ 20726 - T5 7841.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lmUupyodsah" /XML "C:\Users\user\AppData\Local\Temp\tmp38C0.tmp", ProcessId: 8152, ProcessName: schtasks.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe", ParentImage: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe, ParentProcessId: 7832, ParentProcessName: RFQ 20726 - T5 7841.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe", ProcessId: 8004, ProcessName: powershell.exe

              Persistence and Installation Behavior

              barindex
              Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lmUupyodsah" /XML "C:\Users\user\AppData\Local\Temp\tmp38C0.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lmUupyodsah" /XML "C:\Users\user\AppData\Local\Temp\tmp38C0.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe", ParentImage: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe, ParentProcessId: 7832, ParentProcessName: RFQ 20726 - T5 7841.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lmUupyodsah" /XML "C:\Users\user\AppData\Local\Temp\tmp38C0.tmp", ProcessId: 8152, ProcessName: schtasks.exe
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: RFQ 20726 - T5 7841.exeAvira: detected
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeAvira: detection malicious, Label: HEUR/AGEN.1323711
              Source: 00000009.00000002.3815453085.0000000002B41000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "info@therealdealboattours.com", "Password": "success$2022", "Host": "mail.therealdealboattours.com", "Port": "587"}
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeReversingLabs: Detection: 34%
              Source: RFQ 20726 - T5 7841.exeReversingLabs: Detection: 34%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeJoe Sandbox ML: detected
              Source: RFQ 20726 - T5 7841.exeJoe Sandbox ML: detected

              Location Tracking

              barindex
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: RFQ 20726 - T5 7841.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.10:49707 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.10:49716 version: TLS 1.0
              Source: RFQ 20726 - T5 7841.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 4x nop then jmp 04497FDDh0_2_0449756D
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 4x nop then jmp 04497FDDh0_2_044977D8
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 4x nop then jmp 00EFE61Fh9_2_00EFE437
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 4x nop then jmp 00EFEFA9h9_2_00EFE437
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 4x nop then jmp 00EFFA39h9_2_00EFF77F
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h9_2_00EFD7F0
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 4x nop then jmp 068A88EDh9_2_068A85B0
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 4x nop then jmp 068A6119h9_2_068A5E70
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]9_2_068A3676
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 4x nop then jmp 068A72A2h9_2_068A6FF8
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 4x nop then jmp 068A69C9h9_2_068A6720
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 4x nop then jmp 068A0741h9_2_068A0498
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 4x nop then jmp 068A76F9h9_2_068A7450
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 4x nop then jmp 068A5869h9_2_068A55C0
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 4x nop then jmp 068A7FA9h9_2_068A7D00
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 4x nop then jmp 068A6571h9_2_068A62C8
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 4x nop then jmp 068A5CC1h9_2_068A5A18
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]9_2_068A3350
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]9_2_068A3360
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 4x nop then jmp 068A6E21h9_2_068A6B78
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 4x nop then jmp 068A7B51h9_2_068A78A8
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 4x nop then jmp 068A0B99h9_2_068A08F0
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 4x nop then jmp 068A02E9h9_2_068A0040
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 4x nop then jmp 068A53E9h9_2_068A5140
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 4x nop then jmp 068A8401h9_2_068A8158
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 02257226h10_2_022567B5
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 02257226h10_2_02256A20
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 011DE61Fh15_2_011DE431
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 011DEFA9h15_2_011DE431
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 011DFA39h15_2_011DF778
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h15_2_011DE005
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h15_2_011DD7F0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h15_2_011DDE23
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 057DD011h15_2_057DCD68
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 057D1011h15_2_057D0D60
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 057DCBB9h15_2_057DC910
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 057D15D8h15_2_057D1506
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 057D0BB1h15_2_057D0900
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 057D15D8h15_2_057D11C0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 057DD469h15_2_057DD1C0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 057D15D8h15_2_057D11B0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 057DC309h15_2_057DC060
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 057D02F1h15_2_057D0040
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 057DF2D1h15_2_057DF028
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 057DBEB1h15_2_057DBC08
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 057DFB81h15_2_057DF8D8
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 057DC761h15_2_057DC4B8
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 057D0751h15_2_057D04A0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 057DF729h15_2_057DF480
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 057DEA21h15_2_057DE778
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 057DB601h15_2_057DB358
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 057DE5C9h15_2_057DE320
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 057DB1A9h15_2_057DAF00
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 057DEE79h15_2_057DEBD0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 057DBA59h15_2_057DB7B0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 057DDD19h15_2_057DDA70
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 057DD8C1h15_2_057DD618
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 057DE171h15_2_057DDEC8
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 06A388EDh15_2_06A385B0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 06A36119h15_2_06A35E70
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]15_2_06A33676
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 06A372A2h15_2_06A36FF8
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 06A369C9h15_2_06A36720
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 06A30741h15_2_06A30498
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 06A376F9h15_2_06A37450
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 06A35869h15_2_06A355C0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 06A37FA9h15_2_06A37D00
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 06A36571h15_2_06A362C8
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 06A35CC1h15_2_06A35A18
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]15_2_06A33360
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 06A36E21h15_2_06A36B78
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]15_2_06A33350
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 06A37B51h15_2_06A378A8
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 06A30B99h15_2_06A308F0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 06A302E9h15_2_06A30040
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 06A353E9h15_2_06A35140
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 4x nop then jmp 06A38401h15_2_06A38158

              Networking

              barindex
              Source: Yara matchFile source: 10.2.lmUupyodsah.exe.355cce8.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.lmUupyodsah.exe.353c4c8.4.raw.unpack, type: UNPACKEDPE
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
              Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
              Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.10:49707 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.10:49716 version: TLS 1.0
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
              Source: RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CBC000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002D06000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CCA000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CF8000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002C0E000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F35000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002E7A000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F1A000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F27000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F63000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F0C000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
              Source: RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CBC000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CD8000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002D06000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CCA000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CF8000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002C0E000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002E67000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F43000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F35000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002EB8000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002E7A000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F1A000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F27000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F63000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F0C000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002DB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: RFQ 20726 - T5 7841.exe, 00000000.00000002.1385448550.00000000034DD000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000A.00000002.1430038668.000000000353C000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3812867070.000000000041B000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002E67000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F1A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgh
              Source: lmUupyodsah.exe, 0000000A.00000002.1424040888.00000000005B6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gorosoft.com/fwlin
              Source: RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002C27000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CBC000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002D06000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CCA000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CF8000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F35000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F1A000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F27000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F63000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002E92000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F0C000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
              Source: RFQ 20726 - T5 7841.exe, 00000000.00000002.1384845899.00000000025B1000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000A.00000002.1426105529.0000000002614000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002DB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CBC000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002D06000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CCA000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CF8000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002C0E000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F35000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002EB8000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002E7A000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F1A000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F27000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F63000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F0C000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
              Source: RFQ 20726 - T5 7841.exe, 00000000.00000002.1385448550.00000000034DD000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002C0E000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000A.00000002.1430038668.000000000353C000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3812867070.000000000041B000.00000040.00000400.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002E7A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
              Source: lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
              Source: RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CBC000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002D06000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CCA000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CF8000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F35000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002EB8000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F1A000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F27000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F63000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F0C000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$
              Source: lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F63000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.orgh
              Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
              Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
              Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
              Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
              Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
              Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
              Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723

              System Summary

              barindex
              Source: 9.2.RFQ 20726 - T5 7841.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 9.2.RFQ 20726 - T5 7841.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 10.2.lmUupyodsah.exe.355cce8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 10.2.lmUupyodsah.exe.355cce8.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 10.2.lmUupyodsah.exe.355cce8.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 10.2.lmUupyodsah.exe.355cce8.2.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 10.2.lmUupyodsah.exe.353c4c8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 10.2.lmUupyodsah.exe.353c4c8.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 10.2.lmUupyodsah.exe.353c4c8.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 10.2.lmUupyodsah.exe.353c4c8.4.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 10.2.lmUupyodsah.exe.355cce8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 10.2.lmUupyodsah.exe.355cce8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 10.2.lmUupyodsah.exe.355cce8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 10.2.lmUupyodsah.exe.355cce8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 10.2.lmUupyodsah.exe.353c4c8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 10.2.lmUupyodsah.exe.353c4c8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 10.2.lmUupyodsah.exe.353c4c8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 10.2.lmUupyodsah.exe.353c4c8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0000000F.00000002.3812867070.000000000041B000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000009.00000002.3812859081.000000000040A000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0000000A.00000002.1430038668.000000000353C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0000000A.00000002.1430038668.000000000353C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000000.00000002.1385448550.00000000034DD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000000.00000002.1385448550.00000000034DD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: RFQ 20726 - T5 7841.exe PID: 7832, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: RFQ 20726 - T5 7841.exe PID: 7832, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: RFQ 20726 - T5 7841.exe PID: 7436, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: lmUupyodsah.exe PID: 5168, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: lmUupyodsah.exe PID: 5168, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: lmUupyodsah.exe PID: 8164, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.RFQ 20726 - T5 7841.exe.6be0000.7.raw.unpack, -Module-.csLarge array initialization: _200D_200D_202B_206F_206A_206B_202B_200B_200D_206D_200C_206B_206A_200B_202E_200C_200E_202A_200E_206D_206F_202D_206F_206D_206C_200F_206A_202D_206C_202B_206A_206F_202A_206A_200E_200F_200B_200F_202E_202D_202E: array initializer size 3088
              Source: 0.2.RFQ 20726 - T5 7841.exe.249ce24.0.raw.unpack, -Module-.csLarge array initialization: _200D_200D_202B_206F_206A_206B_202B_200B_200D_206D_200C_206B_206A_200B_202E_200C_200E_202A_200E_206D_206F_202D_206F_206D_206C_200F_206A_202D_206C_202B_206A_206F_202A_206A_200E_200F_200B_200F_202E_202D_202E: array initializer size 3088
              Source: initial sampleStatic PE information: Filename: RFQ 20726 - T5 7841.exe
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_022CD2A40_2_022CD2A4
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_044934000_2_04493400
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_044997180_2_04499718
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_044917CF0_2_044917CF
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_044917E00_2_044917E0
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_0449A7B80_2_0449A7B8
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_044913980_2_04491398
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_044913A80_2_044913A8
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_04490F600_2_04490F60
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_04490F700_2_04490F70
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_04490B290_2_04490B29
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_04A0D9700_2_04A0D970
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_04A0D9610_2_04A0D961
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_073816400_2_07381640
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_0738A4500_2_0738A450
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_07382E480_2_07382E48
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_07389BF00_2_07389BF0
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_07385A200_2_07385A20
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_073837000_2_07383700
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_073896300_2_07389630
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_073896400_2_07389640
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_073836F00_2_073836F0
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_073815B30_2_073815B3
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_073815AB0_2_073815AB
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_0738A4400_2_0738A440
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_073842390_2_07384239
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_073822200_2_07382220
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_073842480_2_07384248
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_07381EF80_2_07381EF8
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_07380ED40_2_07380ED4
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_07382DA10_2_07382DA1
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_07385BB30_2_07385BB3
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_07389BE00_2_07389BE0
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_07385A100_2_07385A10
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_00EFC1AA9_2_00EFC1AA
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_00EFB4F39_2_00EFB4F3
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_00EFC4779_2_00EFC477
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_00EFE4379_2_00EFE437
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_00EFF77F9_2_00EFF77F
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_00EFC7579_2_00EFC757
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_00EF4AF29_2_00EF4AF2
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_00EFCA339_2_00EFCA33
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_00EFBBB89_2_00EFBBB8
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_00EFBEB09_2_00EFBEB0
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_00EF35739_2_00EF3573
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_00EFD7E09_2_00EFD7E0
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_00EFD7F09_2_00EFD7F0
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068AA6009_2_068AA600
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A9FB09_2_068A9FB0
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068ABF309_2_068ABF30
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068AAC489_2_068AAC48
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068AC5809_2_068AC580
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A85B09_2_068A85B0
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A0D489_2_068A0D48
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068AB2909_2_068AB290
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068AD2189_2_068AD218
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068ACBD09_2_068ACBD0
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A8BF99_2_068A8BF9
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068AB8E09_2_068AB8E0
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A36D89_2_068A36D8
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A5E609_2_068A5E60
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A5E709_2_068A5E70
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A9FA09_2_068A9FA0
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A6FF89_2_068A6FF8
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A6FF19_2_068A6FF1
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A67139_2_068A6713
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A67209_2_068A6720
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068ABF209_2_068ABF20
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A04889_2_068A0488
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A04989_2_068A0498
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A7CF09_2_068A7CF0
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A743F9_2_068A743F
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068AAC379_2_068AAC37
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A74509_2_068A7450
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A85AB9_2_068A85AB
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A55B39_2_068A55B3
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A55C09_2_068A55C0
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068AA5F09_2_068AA5F0
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A7D009_2_068A7D00
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A0D399_2_068A0D39
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068AC5709_2_068AC570
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068AB2819_2_068AB281
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A62BB9_2_068A62BB
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A62C89_2_068A62C8
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068AD20A9_2_068AD20A
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A5A089_2_068A5A08
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A5A189_2_068A5A18
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068ACBC09_2_068ACBC0
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A43D89_2_068A43D8
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A33509_2_068A3350
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A6B699_2_068A6B69
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A33609_2_068A3360
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A6B789_2_068A6B78
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A78989_2_068A7898
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A78A89_2_068A78A8
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068AB8D09_2_068AB8D0
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A08E19_2_068A08E1
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A08F09_2_068A08F0
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A00069_2_068A0006
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A28489_2_068A2848
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A00409_2_068A0040
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A28589_2_068A2858
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A51339_2_068A5133
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A81489_2_068A8148
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A51409_2_068A5140
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_068A81589_2_068A8158
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 10_2_02258AE810_2_02258AE8
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 10_2_02250B3810_2_02250B38
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 10_2_022513A810_2_022513A8
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 10_2_02259B8810_2_02259B88
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 10_2_02250F7010_2_02250F70
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 10_2_022517E010_2_022517E0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 10_2_022517CF10_2_022517CF
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 10_2_0225340010_2_02253400
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 10_2_022DD2A410_2_022DD2A4
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_011D610815_2_011D6108
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_011DC19015_2_011DC190
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_011DB32815_2_011DB328
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_011DE43115_2_011DE431
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_011DC47015_2_011DC470
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_011DC75315_2_011DC753
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_011DF77815_2_011DF778
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_011D985815_2_011D9858
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_011D688015_2_011D6880
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_011DBBB815_2_011DBBB8
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_011DCA3315_2_011DCA33
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_011D4AD915_2_011D4AD9
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_011DBEB015_2_011DBEB0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_011D357315_2_011D3573
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_011DB4F315_2_011DB4F3
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_011DD7F015_2_011DD7F0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_011DD7E015_2_011DD7E0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057D758815_2_057D7588
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057D7E7815_2_057D7E78
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057D328815_2_057D3288
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057D7D7E15_2_057D7D7E
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DCD6815_2_057DCD68
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057D0D6015_2_057D0D60
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DCD5815_2_057DCD58
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057D0D5015_2_057D0D50
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DC91015_2_057DC910
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057D090015_2_057D0900
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DC90215_2_057DC902
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057D6DF715_2_057D6DF7
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DD1C015_2_057DD1C0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DD1B015_2_057DD1B0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DF47115_2_057DF471
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DC06015_2_057DC060
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DC05015_2_057DC050
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057D004015_2_057D0040
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DF02815_2_057DF028
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DF01815_2_057DF018
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DBC0815_2_057DBC08
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057D000715_2_057D0007
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057D08F015_2_057D08F0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DF8D815_2_057DF8D8
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DF8C915_2_057DF8C9
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DC4B815_2_057DC4B8
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DC4A815_2_057DC4A8
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057D04A015_2_057D04A0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057D049115_2_057D0491
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DF48015_2_057DF480
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DE77815_2_057DE778
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DE76815_2_057DE768
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DB35815_2_057DB358
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DB34815_2_057DB348
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DE32015_2_057DE320
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DE31015_2_057DE310
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DAF0015_2_057DAF00
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DBBF815_2_057DBBF8
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DEBD015_2_057DEBD0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DEBC115_2_057DEBC1
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DB7B015_2_057DB7B0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057D77A815_2_057D77A8
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DB7A015_2_057DB7A0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057D327815_2_057D3278
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DDA7015_2_057DDA70
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DDA6115_2_057DDA61
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DD61815_2_057DD618
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DD60915_2_057DD609
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057D6E0015_2_057D6E00
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DAEEF15_2_057DAEEF
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DDEC815_2_057DDEC8
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057DDEB815_2_057DDEB8
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3A60015_2_06A3A600
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A39FB015_2_06A39FB0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3BF3015_2_06A3BF30
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3AC4815_2_06A3AC48
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A385B015_2_06A385B0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3C58015_2_06A3C580
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A30D4815_2_06A30D48
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3B29015_2_06A3B290
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3D21815_2_06A3D218
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A38B9B15_2_06A38B9B
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3CBD015_2_06A3CBD0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3B8E015_2_06A3B8E0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A336D815_2_06A336D8
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A35E6015_2_06A35E60
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A35E7015_2_06A35E70
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A39FA015_2_06A39FA0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A36FE815_2_06A36FE8
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A36FF815_2_06A36FF8
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3672015_2_06A36720
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3BF2015_2_06A3BF20
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3671215_2_06A36712
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3048815_2_06A30488
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3049815_2_06A30498
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A37CF015_2_06A37CF0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3AC3715_2_06A3AC37
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3743F15_2_06A3743F
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3745015_2_06A37450
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A385A315_2_06A385A3
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A355B215_2_06A355B2
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3A5F015_2_06A3A5F0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A355C015_2_06A355C0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A30D3915_2_06A30D39
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A37D0015_2_06A37D00
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3C57015_2_06A3C570
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A362BA15_2_06A362BA
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3B28115_2_06A3B281
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A362C815_2_06A362C8
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3D20B15_2_06A3D20B
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A35A0815_2_06A35A08
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A35A1815_2_06A35A18
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3CBC015_2_06A3CBC0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A343D815_2_06A343D8
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3336015_2_06A33360
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A36B6915_2_06A36B69
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A36B7815_2_06A36B78
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3335015_2_06A33350
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A378A815_2_06A378A8
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3789815_2_06A37898
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A308E115_2_06A308E1
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A308F015_2_06A308F0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3B8D015_2_06A3B8D0
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3000715_2_06A30007
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3004015_2_06A30040
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3284815_2_06A32848
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3285815_2_06A32858
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3513215_2_06A35132
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3514015_2_06A35140
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3814815_2_06A38148
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_06A3815815_2_06A38158
              Source: RFQ 20726 - T5 7841.exe, 00000000.00000002.1390606187.000000000CBA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs RFQ 20726 - T5 7841.exe
              Source: RFQ 20726 - T5 7841.exe, 00000000.00000002.1383350891.000000000072E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs RFQ 20726 - T5 7841.exe
              Source: RFQ 20726 - T5 7841.exe, 00000000.00000002.1385448550.00000000034DD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs RFQ 20726 - T5 7841.exe
              Source: RFQ 20726 - T5 7841.exe, 00000000.00000002.1390045797.0000000006BE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameRT.dll. vs RFQ 20726 - T5 7841.exe
              Source: RFQ 20726 - T5 7841.exe, 00000000.00000002.1384845899.0000000002471000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRT.dll. vs RFQ 20726 - T5 7841.exe
              Source: RFQ 20726 - T5 7841.exe, 00000000.00000002.1384845899.0000000002471000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs RFQ 20726 - T5 7841.exe
              Source: RFQ 20726 - T5 7841.exe, 00000000.00000000.1341817570.000000000015C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenametyce.exe> vs RFQ 20726 - T5 7841.exe
              Source: RFQ 20726 - T5 7841.exe, 00000009.00000002.3813217392.0000000000CF7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs RFQ 20726 - T5 7841.exe
              Source: RFQ 20726 - T5 7841.exeBinary or memory string: OriginalFilenametyce.exe> vs RFQ 20726 - T5 7841.exe
              Source: RFQ 20726 - T5 7841.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: 9.2.RFQ 20726 - T5 7841.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 9.2.RFQ 20726 - T5 7841.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 10.2.lmUupyodsah.exe.355cce8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 10.2.lmUupyodsah.exe.355cce8.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 10.2.lmUupyodsah.exe.355cce8.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 10.2.lmUupyodsah.exe.355cce8.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 10.2.lmUupyodsah.exe.353c4c8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 10.2.lmUupyodsah.exe.353c4c8.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 10.2.lmUupyodsah.exe.353c4c8.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 10.2.lmUupyodsah.exe.353c4c8.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 10.2.lmUupyodsah.exe.355cce8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 10.2.lmUupyodsah.exe.355cce8.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 10.2.lmUupyodsah.exe.355cce8.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 10.2.lmUupyodsah.exe.355cce8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 10.2.lmUupyodsah.exe.353c4c8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 10.2.lmUupyodsah.exe.353c4c8.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 10.2.lmUupyodsah.exe.353c4c8.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 10.2.lmUupyodsah.exe.353c4c8.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0000000F.00000002.3812867070.000000000041B000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000009.00000002.3812859081.000000000040A000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0000000A.00000002.1430038668.000000000353C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0000000A.00000002.1430038668.000000000353C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000000.00000002.1385448550.00000000034DD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000000.00000002.1385448550.00000000034DD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: RFQ 20726 - T5 7841.exe PID: 7832, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: RFQ 20726 - T5 7841.exe PID: 7832, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: RFQ 20726 - T5 7841.exe PID: 7436, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: lmUupyodsah.exe PID: 5168, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: lmUupyodsah.exe PID: 5168, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: lmUupyodsah.exe PID: 8164, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: RFQ 20726 - T5 7841.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: lmUupyodsah.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.raw.unpack, .csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.raw.unpack, .csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.raw.unpack, -z.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.raw.unpack, -z.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.raw.unpack, .csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.raw.unpack, .csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.raw.unpack, -z.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.raw.unpack, -z.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, GwMoOmaEcAjUJAbuNC.csSecurity API names: _0020.SetAccessControl
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, GwMoOmaEcAjUJAbuNC.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, GwMoOmaEcAjUJAbuNC.csSecurity API names: _0020.AddAccessRule
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, gP7AkrXxFSuN3qnHgX.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, GwMoOmaEcAjUJAbuNC.csSecurity API names: _0020.SetAccessControl
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, GwMoOmaEcAjUJAbuNC.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, GwMoOmaEcAjUJAbuNC.csSecurity API names: _0020.AddAccessRule
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, GwMoOmaEcAjUJAbuNC.csSecurity API names: _0020.SetAccessControl
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, GwMoOmaEcAjUJAbuNC.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, GwMoOmaEcAjUJAbuNC.csSecurity API names: _0020.AddAccessRule
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, gP7AkrXxFSuN3qnHgX.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, gP7AkrXxFSuN3qnHgX.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@21/15@2/2
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeFile created: C:\Users\user\AppData\Roaming\lmUupyodsah.exeJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8016:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8172:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8128:120:WilError_03
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeMutant created: \Sessions\1\BaseNamedObjects\WSPObdgIjlzHKxdWNxQ
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8168:120:WilError_03
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeFile created: C:\Users\user\AppData\Local\Temp\tmp38C0.tmpJump to behavior
              Source: RFQ 20726 - T5 7841.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: RFQ 20726 - T5 7841.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: RFQ 20726 - T5 7841.exe, 00000009.00000002.3818831876.0000000003BD3000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002DC6000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002D9E000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002D90000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002DD2000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.000000000303D000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002FEB000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000003031000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3819408166.0000000003E40000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: RFQ 20726 - T5 7841.exeReversingLabs: Detection: 34%
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeFile read: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe"
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lmUupyodsah.exe"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lmUupyodsah" /XML "C:\Users\user\AppData\Local\Temp\tmp38C0.tmp"
              Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess created: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\lmUupyodsah.exe C:\Users\user\AppData\Roaming\lmUupyodsah.exe
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lmUupyodsah" /XML "C:\Users\user\AppData\Local\Temp\tmp490C.tmp"
              Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess created: C:\Users\user\AppData\Roaming\lmUupyodsah.exe "C:\Users\user\AppData\Roaming\lmUupyodsah.exe"
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess created: C:\Users\user\AppData\Roaming\lmUupyodsah.exe "C:\Users\user\AppData\Roaming\lmUupyodsah.exe"
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe"Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lmUupyodsah.exe"Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lmUupyodsah" /XML "C:\Users\user\AppData\Local\Temp\tmp38C0.tmp"Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess created: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lmUupyodsah" /XML "C:\Users\user\AppData\Local\Temp\tmp490C.tmp"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess created: C:\Users\user\AppData\Roaming\lmUupyodsah.exe "C:\Users\user\AppData\Roaming\lmUupyodsah.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess created: C:\Users\user\AppData\Roaming\lmUupyodsah.exe "C:\Users\user\AppData\Roaming\lmUupyodsah.exe"Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: windows.storage.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: wldp.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: profapi.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: rasapi32.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: rasman.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: rtutils.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: mswsock.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: winhttp.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: ondemandconnroutehelper.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: iphlpapi.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: dhcpcsvc6.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: dhcpcsvc.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: dnsapi.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: winnsi.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: rasadhlp.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: fwpuclnt.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: secur32.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: schannel.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: mskeyprotect.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: ntasn1.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: ncrypt.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: ncryptsslp.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: msasn1.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: gpapi.dll
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeSection loaded: dpapi.dll
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: RFQ 20726 - T5 7841.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: RFQ 20726 - T5 7841.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: RFQ 20726 - T5 7841.exe, --.cs.Net Code: _0002 System.Reflection.Assembly.Load(byte[])
              Source: lmUupyodsah.exe.0.dr, --.cs.Net Code: _0002 System.Reflection.Assembly.Load(byte[])
              Source: 0.2.RFQ 20726 - T5 7841.exe.6be0000.7.raw.unpack, -Module-.cs.Net Code: _200D_200D_202B_206F_206A_206B_202B_200B_200D_206D_200C_206B_206A_200B_202E_200C_200E_202A_200E_206D_206F_202D_206F_206D_206C_200F_206A_202D_206C_202B_206A_206F_202A_206A_200E_200F_200B_200F_202E_202D_202E System.Reflection.Assembly.Load(byte[])
              Source: 0.2.RFQ 20726 - T5 7841.exe.6be0000.7.raw.unpack, PingPong.cs.Net Code: _206E_206D_206E_206E_202E_202E_200C_206A_202D_206E_200C_202B_200F_206E_200B_202E_200E_202A_202D_200E_200E_200E_200E_202B_200E_202C_200C_200B_202C_202D_200C_202A_200B_200C_206D_206B_202B_202A_202E_200C_202E System.Reflection.Assembly.Load(byte[])
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, GwMoOmaEcAjUJAbuNC.cs.Net Code: ciUk0qZshj System.Reflection.Assembly.Load(byte[])
              Source: 0.2.RFQ 20726 - T5 7841.exe.249ce24.0.raw.unpack, -Module-.cs.Net Code: _200D_200D_202B_206F_206A_206B_202B_200B_200D_206D_200C_206B_206A_200B_202E_200C_200E_202A_200E_206D_206F_202D_206F_206D_206C_200F_206A_202D_206C_202B_206A_206F_202A_206A_200E_200F_200B_200F_202E_202D_202E System.Reflection.Assembly.Load(byte[])
              Source: 0.2.RFQ 20726 - T5 7841.exe.249ce24.0.raw.unpack, PingPong.cs.Net Code: _206E_206D_206E_206E_202E_202E_200C_206A_202D_206E_200C_202B_200F_206E_200B_202E_200E_202A_202D_200E_200E_200E_200E_202B_200E_202C_200C_200B_202C_202D_200C_202A_200B_200C_206D_206B_202B_202A_202E_200C_202E System.Reflection.Assembly.Load(byte[])
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, GwMoOmaEcAjUJAbuNC.cs.Net Code: ciUk0qZshj System.Reflection.Assembly.Load(byte[])
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, GwMoOmaEcAjUJAbuNC.cs.Net Code: ciUk0qZshj System.Reflection.Assembly.Load(byte[])
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_022CE920 pushad ; retf 0_2_022CE929
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_04A00710 pushad ; iretd 0_2_04A00711
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 0_2_07384451 push 8BBCEB50h; ret 0_2_07384457
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeCode function: 9_2_00EF24B9 push 8BFFFFFFh; retf 9_2_00EF24BF
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057D2890 push eax; retf 15_2_057D2891
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057D2EFB pushad ; iretd 15_2_057D2F01
              Source: RFQ 20726 - T5 7841.exeStatic PE information: section name: .text entropy: 7.973599311397862
              Source: lmUupyodsah.exe.0.drStatic PE information: section name: .text entropy: 7.973599311397862
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, GwMoOmaEcAjUJAbuNC.csHigh entropy of concatenated method names: 'b6F8ueqUmQ', 'kC68UPQWgD', 'mfr8QEXmtL', 'PiA8BN0oPG', 'Xd88YD3My6', 'nGU8Z2ZYpH', 'GIm8igMe8j', 'I968a3Gs0i', 'Nwi8yHXmAW', 'cWf8R4mq8f'
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, e6mPADQ5D5d2yHkKta.csHigh entropy of concatenated method names: 'Dispose', 'deLTp63DLy', 'tDvAtgcjNq', 'Ki2995Bocs', 'cODTNKEyTP', 'ORdTzGNP3L', 'ProcessDialogKey', 'U8nASUAasK', 'gC5ATBZ82y', 'iqoAA3friM'
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, Jd3cDT2sGPS4TnglPA.csHigh entropy of concatenated method names: 'MbA1XE0JPb', 'x831vQNj09', 'V0b1JM1I9K', 'qTy1tSgR36', 'Ov71duDcVq', 'd0A1whoSCM', 'tct15eklbZ', 'VlC1lpG32x', 'n8a1niwbgV', 'lWh1FFItye'
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, qDKEyTKPFRdGNP3Lb8.csHigh entropy of concatenated method names: 'Gk9OUIXBfG', 'DcVOQnjKMI', 'M8fOBlnny0', 'P8WOYishSC', 'lX9OZ3njGX', 'ihWOiDgi4p', 'v4wOaskEJw', 'tBGOyuiXcu', 'N7cORn2Sll', 'bvyOhEjTyt'
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, pfriMcN2cQjPch9tWV.csHigh entropy of concatenated method names: 'm8seTJLZYY', 'Kd4e8vQMOw', 'wPeek5y0IS', 'aMXeUFInEh', 'bjBeQBisDq', 'xqxeYkoupk', 'FmAeZ01imX', 'hTjOVItANT', 'hVeOKsWKJ5', 'PZbOpNnN2F'
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, RGMENCvZaY4Q8jsSQ6.csHigh entropy of concatenated method names: 'nKeBLXlCpF', 'dtxBsIpPfW', 'Yp5BX9mOHB', 'nR6Bvg6sUU', 'Ho8BrwaOK2', 'poKB371jIh', 'jq6B7H7fKQ', 'WxiBOGx7cN', 'ivjBeS5tUa', 'TwtB48XHPO'
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, z5s1XltqS20S5ttrcA.csHigh entropy of concatenated method names: 'sHhc64tRuy8ZviYqw8U', 'Q5TILAtvPts4MXyXwWN', 'peSFU0trjSOxUokR1kD', 'DJHZODuTEi', 'Yp1Zed91Uj', 'mKuZ4G8LqX', 'Y5hTpRtCwtw3oYBnxl0', 'YtbW7vta529WDLn0smk'
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, gP7AkrXxFSuN3qnHgX.csHigh entropy of concatenated method names: 'iLPQCOZ3y1', 'mPvQEOVq6f', 'VW3QgQJNAy', 'hg1QHlsvQ5', 'xrfQb0P7Lc', 'xG5QfbtmhS', 'idpQVCUuY1', 'ebXQKyKOVf', 'XwmQpgdvnk', 'iNJQNuuiTN'
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, NUAasKpQC5BZ82yZqo.csHigh entropy of concatenated method names: 'OnyOJfMbXV', 'dq7OtOO6FO', 'VAAOPGXqip', 'opTOdgqW0f', 'kkWOCRqAgu', 'JZKOwDVAdA', 'Next', 'Next', 'Next', 'NextBytes'
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, CS3iXqT81RrmYms8ZCw.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'FN84Csq9GP', 'wnd4EYj2Mx', 'tIX4gJgfbr', 'bXh4H979fx', 'svw4bv5gh1', 'Uml4fcq7sq', 'VAI4VgVSin'
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, pAvWp4gptbVhFOMNfi.csHigh entropy of concatenated method names: 'ToString', 'hoM3FZqfp0', 'K6H3tLHVxj', 'BYE3PmUC2H', 'fDr3dvfIp9', 'WYQ3wdbrJv', 'cWH3GgWAhQ', 'OsI35Husrg', 'c3J3lZT6d6', 'aED3mrvUhU'
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, JQNPGUfBGTjDI6Qlis.csHigh entropy of concatenated method names: 'LkA7KRLUrk', 'fh57NM4f9h', 'FuwOSpMiHl', 'fgTOT6yrrh', 'lpp7FZJjwb', 'Ahr7xv31Ks', 'Yi972MA6sE', 'npH7C8NawB', 'b2s7ESvQBv', 'YvZ7gPed0Q'
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, WYpx7nzXrLfj9tTDbD.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'eEHe1DxH6g', 'KxserNdKuU', 'lBWe30lWcQ', 'KNse79gBdP', 'nMleO3ojbk', 'vbOee0wDI1', 'aide4XEWOD'
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, ziVPTakTyJlkuXZQJH.csHigh entropy of concatenated method names: 'tlBTiP7Akr', 'PFSTauN3qn', 'RZaTRY4Q8j', 'BSQTh68hlE', 'l4LTrSxJjU', 'Et3T33Za31', 'jQ4REr6FgoQYRu6qyb', 'cPPuNPoiTyAeRQrjvl', 'uv8TT6qp9H', 'S9hT8OOTkV'
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, Srixd7Aog8U8uRC7AT.csHigh entropy of concatenated method names: 'j7M0e4fpZ', 'uIeL1ES8g', 'pAisTZr74', 'IR8ca53f8', 'QTkvqtVjX', 'qjsWJ5nF8', 'yrjw5tI61KMPb2IpvQ', 'pmLucUVyMRikKedMsv', 'SrvO0vnC5', 'LTy4aIDRd'
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, lQO9uhmCbqagJb7GYa.csHigh entropy of concatenated method names: 'l4ZiMXuvk6', 'b8niqbW70K', 'mMBi0EFsiD', 'NtHiL4Vbi7', 'USKiIlyoGA', 'nuqisDDETs', 'qQ6icIQD85', 'kCsiXtb6J9', 'PXXivNeh1m', 'H0ZiWkNtUO'
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, eDBu31CqcU3PePfhMM.csHigh entropy of concatenated method names: 'hlsrnsJ9p6', 'XRErxxuwQo', 'siDrC5Yx8m', 'zJErEdqBZH', 'z74rty4ap5', 'R63rP4exKW', 'CFqrdYuyWc', 'JGhrwE1LAe', 'dNGrGdvewi', 'zsQr5G0XU0'
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, SUiHtDTSsI7nguggCE1.csHigh entropy of concatenated method names: 'vmQeMWbkCU', 'X19eqMCEUF', 'Fk4e0S7DTo', 'FfUeLrQKd0', 'C2ueIWomrU', 'nw7esvSSjV', 'q0lecMubLT', 'sYMeXttjjR', 'q0KevqdAxI', 'q63eWJ2FeT'
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, HhgaP85gxD8LSSDVuE.csHigh entropy of concatenated method names: 'xYciUHcBma', 'EI5iB3LuxD', 'oHpiZcrGer', 'iajZNWLcZJ', 'zAHZzWNkuk', 'LuMiSuttFv', 'gkaiT9dPZC', 'zEqiAg0h2k', 'o0ni8clKhd', 'DBiikelwqt'
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, FjUvt3J3Za31i3v2xU.csHigh entropy of concatenated method names: 'AiKZu9GGTk', 'SMfZQxhTCq', 'FuOZY10PEE', 'XkRZiG5mRM', 'OVwZaZUB2j', 'Q46Yb4Ik3j', 'zp7Yf8JxXU', 'hc6YVgscGc', 'febYKi7coG', 'iaiYptyPjl'
              Source: 0.2.RFQ 20726 - T5 7841.exe.4181870.5.raw.unpack, RhLMBMHXFPwEcRuasF.csHigh entropy of concatenated method names: 'oty7RcixNu', 'YmG7hlxjcL', 'ToString', 'c2h7UOFanf', 'fIK7QDV3Iv', 'YEM7BSO6Dp', 'wOe7YfyHCw', 'dse7Z9v6t6', 'Rk97ipVS1p', 'aSx7aeLUaT'
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, GwMoOmaEcAjUJAbuNC.csHigh entropy of concatenated method names: 'b6F8ueqUmQ', 'kC68UPQWgD', 'mfr8QEXmtL', 'PiA8BN0oPG', 'Xd88YD3My6', 'nGU8Z2ZYpH', 'GIm8igMe8j', 'I968a3Gs0i', 'Nwi8yHXmAW', 'cWf8R4mq8f'
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, e6mPADQ5D5d2yHkKta.csHigh entropy of concatenated method names: 'Dispose', 'deLTp63DLy', 'tDvAtgcjNq', 'Ki2995Bocs', 'cODTNKEyTP', 'ORdTzGNP3L', 'ProcessDialogKey', 'U8nASUAasK', 'gC5ATBZ82y', 'iqoAA3friM'
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, Jd3cDT2sGPS4TnglPA.csHigh entropy of concatenated method names: 'MbA1XE0JPb', 'x831vQNj09', 'V0b1JM1I9K', 'qTy1tSgR36', 'Ov71duDcVq', 'd0A1whoSCM', 'tct15eklbZ', 'VlC1lpG32x', 'n8a1niwbgV', 'lWh1FFItye'
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, qDKEyTKPFRdGNP3Lb8.csHigh entropy of concatenated method names: 'Gk9OUIXBfG', 'DcVOQnjKMI', 'M8fOBlnny0', 'P8WOYishSC', 'lX9OZ3njGX', 'ihWOiDgi4p', 'v4wOaskEJw', 'tBGOyuiXcu', 'N7cORn2Sll', 'bvyOhEjTyt'
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, pfriMcN2cQjPch9tWV.csHigh entropy of concatenated method names: 'm8seTJLZYY', 'Kd4e8vQMOw', 'wPeek5y0IS', 'aMXeUFInEh', 'bjBeQBisDq', 'xqxeYkoupk', 'FmAeZ01imX', 'hTjOVItANT', 'hVeOKsWKJ5', 'PZbOpNnN2F'
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, RGMENCvZaY4Q8jsSQ6.csHigh entropy of concatenated method names: 'nKeBLXlCpF', 'dtxBsIpPfW', 'Yp5BX9mOHB', 'nR6Bvg6sUU', 'Ho8BrwaOK2', 'poKB371jIh', 'jq6B7H7fKQ', 'WxiBOGx7cN', 'ivjBeS5tUa', 'TwtB48XHPO'
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, z5s1XltqS20S5ttrcA.csHigh entropy of concatenated method names: 'sHhc64tRuy8ZviYqw8U', 'Q5TILAtvPts4MXyXwWN', 'peSFU0trjSOxUokR1kD', 'DJHZODuTEi', 'Yp1Zed91Uj', 'mKuZ4G8LqX', 'Y5hTpRtCwtw3oYBnxl0', 'YtbW7vta529WDLn0smk'
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, gP7AkrXxFSuN3qnHgX.csHigh entropy of concatenated method names: 'iLPQCOZ3y1', 'mPvQEOVq6f', 'VW3QgQJNAy', 'hg1QHlsvQ5', 'xrfQb0P7Lc', 'xG5QfbtmhS', 'idpQVCUuY1', 'ebXQKyKOVf', 'XwmQpgdvnk', 'iNJQNuuiTN'
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, NUAasKpQC5BZ82yZqo.csHigh entropy of concatenated method names: 'OnyOJfMbXV', 'dq7OtOO6FO', 'VAAOPGXqip', 'opTOdgqW0f', 'kkWOCRqAgu', 'JZKOwDVAdA', 'Next', 'Next', 'Next', 'NextBytes'
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, CS3iXqT81RrmYms8ZCw.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'FN84Csq9GP', 'wnd4EYj2Mx', 'tIX4gJgfbr', 'bXh4H979fx', 'svw4bv5gh1', 'Uml4fcq7sq', 'VAI4VgVSin'
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, pAvWp4gptbVhFOMNfi.csHigh entropy of concatenated method names: 'ToString', 'hoM3FZqfp0', 'K6H3tLHVxj', 'BYE3PmUC2H', 'fDr3dvfIp9', 'WYQ3wdbrJv', 'cWH3GgWAhQ', 'OsI35Husrg', 'c3J3lZT6d6', 'aED3mrvUhU'
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, JQNPGUfBGTjDI6Qlis.csHigh entropy of concatenated method names: 'LkA7KRLUrk', 'fh57NM4f9h', 'FuwOSpMiHl', 'fgTOT6yrrh', 'lpp7FZJjwb', 'Ahr7xv31Ks', 'Yi972MA6sE', 'npH7C8NawB', 'b2s7ESvQBv', 'YvZ7gPed0Q'
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, WYpx7nzXrLfj9tTDbD.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'eEHe1DxH6g', 'KxserNdKuU', 'lBWe30lWcQ', 'KNse79gBdP', 'nMleO3ojbk', 'vbOee0wDI1', 'aide4XEWOD'
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, ziVPTakTyJlkuXZQJH.csHigh entropy of concatenated method names: 'tlBTiP7Akr', 'PFSTauN3qn', 'RZaTRY4Q8j', 'BSQTh68hlE', 'l4LTrSxJjU', 'Et3T33Za31', 'jQ4REr6FgoQYRu6qyb', 'cPPuNPoiTyAeRQrjvl', 'uv8TT6qp9H', 'S9hT8OOTkV'
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, Srixd7Aog8U8uRC7AT.csHigh entropy of concatenated method names: 'j7M0e4fpZ', 'uIeL1ES8g', 'pAisTZr74', 'IR8ca53f8', 'QTkvqtVjX', 'qjsWJ5nF8', 'yrjw5tI61KMPb2IpvQ', 'pmLucUVyMRikKedMsv', 'SrvO0vnC5', 'LTy4aIDRd'
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, lQO9uhmCbqagJb7GYa.csHigh entropy of concatenated method names: 'l4ZiMXuvk6', 'b8niqbW70K', 'mMBi0EFsiD', 'NtHiL4Vbi7', 'USKiIlyoGA', 'nuqisDDETs', 'qQ6icIQD85', 'kCsiXtb6J9', 'PXXivNeh1m', 'H0ZiWkNtUO'
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, eDBu31CqcU3PePfhMM.csHigh entropy of concatenated method names: 'hlsrnsJ9p6', 'XRErxxuwQo', 'siDrC5Yx8m', 'zJErEdqBZH', 'z74rty4ap5', 'R63rP4exKW', 'CFqrdYuyWc', 'JGhrwE1LAe', 'dNGrGdvewi', 'zsQr5G0XU0'
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, SUiHtDTSsI7nguggCE1.csHigh entropy of concatenated method names: 'vmQeMWbkCU', 'X19eqMCEUF', 'Fk4e0S7DTo', 'FfUeLrQKd0', 'C2ueIWomrU', 'nw7esvSSjV', 'q0lecMubLT', 'sYMeXttjjR', 'q0KevqdAxI', 'q63eWJ2FeT'
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, HhgaP85gxD8LSSDVuE.csHigh entropy of concatenated method names: 'xYciUHcBma', 'EI5iB3LuxD', 'oHpiZcrGer', 'iajZNWLcZJ', 'zAHZzWNkuk', 'LuMiSuttFv', 'gkaiT9dPZC', 'zEqiAg0h2k', 'o0ni8clKhd', 'DBiikelwqt'
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, FjUvt3J3Za31i3v2xU.csHigh entropy of concatenated method names: 'AiKZu9GGTk', 'SMfZQxhTCq', 'FuOZY10PEE', 'XkRZiG5mRM', 'OVwZaZUB2j', 'Q46Yb4Ik3j', 'zp7Yf8JxXU', 'hc6YVgscGc', 'febYKi7coG', 'iaiYptyPjl'
              Source: 0.2.RFQ 20726 - T5 7841.exe.40e2850.2.raw.unpack, RhLMBMHXFPwEcRuasF.csHigh entropy of concatenated method names: 'oty7RcixNu', 'YmG7hlxjcL', 'ToString', 'c2h7UOFanf', 'fIK7QDV3Iv', 'YEM7BSO6Dp', 'wOe7YfyHCw', 'dse7Z9v6t6', 'Rk97ipVS1p', 'aSx7aeLUaT'
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, GwMoOmaEcAjUJAbuNC.csHigh entropy of concatenated method names: 'b6F8ueqUmQ', 'kC68UPQWgD', 'mfr8QEXmtL', 'PiA8BN0oPG', 'Xd88YD3My6', 'nGU8Z2ZYpH', 'GIm8igMe8j', 'I968a3Gs0i', 'Nwi8yHXmAW', 'cWf8R4mq8f'
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, e6mPADQ5D5d2yHkKta.csHigh entropy of concatenated method names: 'Dispose', 'deLTp63DLy', 'tDvAtgcjNq', 'Ki2995Bocs', 'cODTNKEyTP', 'ORdTzGNP3L', 'ProcessDialogKey', 'U8nASUAasK', 'gC5ATBZ82y', 'iqoAA3friM'
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, Jd3cDT2sGPS4TnglPA.csHigh entropy of concatenated method names: 'MbA1XE0JPb', 'x831vQNj09', 'V0b1JM1I9K', 'qTy1tSgR36', 'Ov71duDcVq', 'd0A1whoSCM', 'tct15eklbZ', 'VlC1lpG32x', 'n8a1niwbgV', 'lWh1FFItye'
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, qDKEyTKPFRdGNP3Lb8.csHigh entropy of concatenated method names: 'Gk9OUIXBfG', 'DcVOQnjKMI', 'M8fOBlnny0', 'P8WOYishSC', 'lX9OZ3njGX', 'ihWOiDgi4p', 'v4wOaskEJw', 'tBGOyuiXcu', 'N7cORn2Sll', 'bvyOhEjTyt'
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, pfriMcN2cQjPch9tWV.csHigh entropy of concatenated method names: 'm8seTJLZYY', 'Kd4e8vQMOw', 'wPeek5y0IS', 'aMXeUFInEh', 'bjBeQBisDq', 'xqxeYkoupk', 'FmAeZ01imX', 'hTjOVItANT', 'hVeOKsWKJ5', 'PZbOpNnN2F'
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, RGMENCvZaY4Q8jsSQ6.csHigh entropy of concatenated method names: 'nKeBLXlCpF', 'dtxBsIpPfW', 'Yp5BX9mOHB', 'nR6Bvg6sUU', 'Ho8BrwaOK2', 'poKB371jIh', 'jq6B7H7fKQ', 'WxiBOGx7cN', 'ivjBeS5tUa', 'TwtB48XHPO'
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, z5s1XltqS20S5ttrcA.csHigh entropy of concatenated method names: 'sHhc64tRuy8ZviYqw8U', 'Q5TILAtvPts4MXyXwWN', 'peSFU0trjSOxUokR1kD', 'DJHZODuTEi', 'Yp1Zed91Uj', 'mKuZ4G8LqX', 'Y5hTpRtCwtw3oYBnxl0', 'YtbW7vta529WDLn0smk'
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, gP7AkrXxFSuN3qnHgX.csHigh entropy of concatenated method names: 'iLPQCOZ3y1', 'mPvQEOVq6f', 'VW3QgQJNAy', 'hg1QHlsvQ5', 'xrfQb0P7Lc', 'xG5QfbtmhS', 'idpQVCUuY1', 'ebXQKyKOVf', 'XwmQpgdvnk', 'iNJQNuuiTN'
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, NUAasKpQC5BZ82yZqo.csHigh entropy of concatenated method names: 'OnyOJfMbXV', 'dq7OtOO6FO', 'VAAOPGXqip', 'opTOdgqW0f', 'kkWOCRqAgu', 'JZKOwDVAdA', 'Next', 'Next', 'Next', 'NextBytes'
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, CS3iXqT81RrmYms8ZCw.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'FN84Csq9GP', 'wnd4EYj2Mx', 'tIX4gJgfbr', 'bXh4H979fx', 'svw4bv5gh1', 'Uml4fcq7sq', 'VAI4VgVSin'
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, pAvWp4gptbVhFOMNfi.csHigh entropy of concatenated method names: 'ToString', 'hoM3FZqfp0', 'K6H3tLHVxj', 'BYE3PmUC2H', 'fDr3dvfIp9', 'WYQ3wdbrJv', 'cWH3GgWAhQ', 'OsI35Husrg', 'c3J3lZT6d6', 'aED3mrvUhU'
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, JQNPGUfBGTjDI6Qlis.csHigh entropy of concatenated method names: 'LkA7KRLUrk', 'fh57NM4f9h', 'FuwOSpMiHl', 'fgTOT6yrrh', 'lpp7FZJjwb', 'Ahr7xv31Ks', 'Yi972MA6sE', 'npH7C8NawB', 'b2s7ESvQBv', 'YvZ7gPed0Q'
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, WYpx7nzXrLfj9tTDbD.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'eEHe1DxH6g', 'KxserNdKuU', 'lBWe30lWcQ', 'KNse79gBdP', 'nMleO3ojbk', 'vbOee0wDI1', 'aide4XEWOD'
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, ziVPTakTyJlkuXZQJH.csHigh entropy of concatenated method names: 'tlBTiP7Akr', 'PFSTauN3qn', 'RZaTRY4Q8j', 'BSQTh68hlE', 'l4LTrSxJjU', 'Et3T33Za31', 'jQ4REr6FgoQYRu6qyb', 'cPPuNPoiTyAeRQrjvl', 'uv8TT6qp9H', 'S9hT8OOTkV'
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, Srixd7Aog8U8uRC7AT.csHigh entropy of concatenated method names: 'j7M0e4fpZ', 'uIeL1ES8g', 'pAisTZr74', 'IR8ca53f8', 'QTkvqtVjX', 'qjsWJ5nF8', 'yrjw5tI61KMPb2IpvQ', 'pmLucUVyMRikKedMsv', 'SrvO0vnC5', 'LTy4aIDRd'
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, lQO9uhmCbqagJb7GYa.csHigh entropy of concatenated method names: 'l4ZiMXuvk6', 'b8niqbW70K', 'mMBi0EFsiD', 'NtHiL4Vbi7', 'USKiIlyoGA', 'nuqisDDETs', 'qQ6icIQD85', 'kCsiXtb6J9', 'PXXivNeh1m', 'H0ZiWkNtUO'
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, eDBu31CqcU3PePfhMM.csHigh entropy of concatenated method names: 'hlsrnsJ9p6', 'XRErxxuwQo', 'siDrC5Yx8m', 'zJErEdqBZH', 'z74rty4ap5', 'R63rP4exKW', 'CFqrdYuyWc', 'JGhrwE1LAe', 'dNGrGdvewi', 'zsQr5G0XU0'
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, SUiHtDTSsI7nguggCE1.csHigh entropy of concatenated method names: 'vmQeMWbkCU', 'X19eqMCEUF', 'Fk4e0S7DTo', 'FfUeLrQKd0', 'C2ueIWomrU', 'nw7esvSSjV', 'q0lecMubLT', 'sYMeXttjjR', 'q0KevqdAxI', 'q63eWJ2FeT'
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, HhgaP85gxD8LSSDVuE.csHigh entropy of concatenated method names: 'xYciUHcBma', 'EI5iB3LuxD', 'oHpiZcrGer', 'iajZNWLcZJ', 'zAHZzWNkuk', 'LuMiSuttFv', 'gkaiT9dPZC', 'zEqiAg0h2k', 'o0ni8clKhd', 'DBiikelwqt'
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, FjUvt3J3Za31i3v2xU.csHigh entropy of concatenated method names: 'AiKZu9GGTk', 'SMfZQxhTCq', 'FuOZY10PEE', 'XkRZiG5mRM', 'OVwZaZUB2j', 'Q46Yb4Ik3j', 'zp7Yf8JxXU', 'hc6YVgscGc', 'febYKi7coG', 'iaiYptyPjl'
              Source: 0.2.RFQ 20726 - T5 7841.exe.cba0000.9.raw.unpack, RhLMBMHXFPwEcRuasF.csHigh entropy of concatenated method names: 'oty7RcixNu', 'YmG7hlxjcL', 'ToString', 'c2h7UOFanf', 'fIK7QDV3Iv', 'YEM7BSO6Dp', 'wOe7YfyHCw', 'dse7Z9v6t6', 'Rk97ipVS1p', 'aSx7aeLUaT'
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeFile created: C:\Users\user\AppData\Roaming\lmUupyodsah.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lmUupyodsah" /XML "C:\Users\user\AppData\Local\Temp\tmp38C0.tmp"

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: RFQ 20726 - T5 7841.exe PID: 7832, type: MEMORYSTR
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeMemory allocated: 2280000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeMemory allocated: 2470000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeMemory allocated: 4470000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeMemory allocated: 7400000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeMemory allocated: 8400000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeMemory allocated: 85B0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeMemory allocated: 95B0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeMemory allocated: 9910000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeMemory allocated: A910000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeMemory allocated: B910000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeMemory allocated: CC40000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeMemory allocated: DC40000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeMemory allocated: EC40000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeMemory allocated: F300000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeMemory allocated: EF0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeMemory allocated: 2B40000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeMemory allocated: 2A50000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeMemory allocated: 2230000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeMemory allocated: 24D0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeMemory allocated: 2230000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeMemory allocated: 7280000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeMemory allocated: 8280000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeMemory allocated: 8430000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeMemory allocated: 9430000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeMemory allocated: 9790000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeMemory allocated: A790000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeMemory allocated: B790000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeMemory allocated: C790000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeMemory allocated: D790000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeMemory allocated: E790000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeMemory allocated: EE30000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeMemory allocated: 11D0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeMemory allocated: 2DB0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeMemory allocated: 13E0000 memory reserve | memory write watch
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 599859Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 599750Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 599640Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 599531Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 599422Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 599313Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 599188Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 599063Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 598938Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 598813Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 598703Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 598594Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 598469Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 598359Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 598250Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 598141Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 598031Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 597922Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 597813Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 597688Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 597578Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 597469Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 597344Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 597235Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 597110Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 596985Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 596860Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 596734Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 596625Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 596515Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 596405Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 596296Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 596188Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 596063Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 595853Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 595735Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 595625Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 595516Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 595391Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 595281Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 595172Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 595063Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 594938Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 594813Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 594688Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 594578Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 594469Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 594344Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 594234Jump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 600000
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 599890
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 599755
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 599614
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 599484
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 599375
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 599265
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 599156
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 599046
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 598937
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 598826
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 598718
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 598609
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 598500
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 598390
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 598281
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 598172
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 598062
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 597952
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 597843
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 597734
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 597625
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 597515
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 597404
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 597281
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 597172
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 597062
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 596953
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 596844
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 596719
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 596609
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 596500
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 596390
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 596281
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 596172
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 596062
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 595950
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 595844
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 595734
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 595625
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 595515
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 595406
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 595297
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 595187
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 595078
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 594968
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 594859
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 594750
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 594640
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 594531
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5171Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 687Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7276Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 685Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeWindow / User API: threadDelayed 3354Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeWindow / User API: threadDelayed 6475Jump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeWindow / User API: threadDelayed 2612
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeWindow / User API: threadDelayed 7245
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 7872Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8120Thread sleep count: 5171 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7560Thread sleep time: -3689348814741908s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8116Thread sleep count: 687 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8184Thread sleep time: -1844674407370954s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7620Thread sleep time: -4611686018427385s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7456Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep count: 36 > 30Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -33204139332677172s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -600000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -599859s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 5260Thread sleep count: 3354 > 30Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -599750s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -599640s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -599531s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -599422s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -599313s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 5260Thread sleep count: 6475 > 30Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -599188s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -599063s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -598938s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -598813s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -598703s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -598594s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -598469s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -598359s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -598250s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -598141s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -598031s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -597922s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -597813s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -597688s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -597578s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -597469s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -597344s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -597235s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -597110s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -596985s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -596860s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -596734s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -596625s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -596515s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -596405s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -596296s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -596188s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -596063s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -595853s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -595735s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -595625s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -595516s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -595391s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -595281s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -595172s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -595063s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -594938s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -594813s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -594688s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -594578s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -594469s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -594344s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe TID: 3636Thread sleep time: -594234s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 1736Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep count: 37 > 30
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -34126476536362649s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -600000s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 332Thread sleep count: 2612 > 30
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -599890s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 332Thread sleep count: 7245 > 30
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -599755s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -599614s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -599484s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -599375s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -599265s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -599156s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -599046s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -598937s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -598826s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -598718s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -598609s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -598500s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -598390s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -598281s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -598172s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -598062s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -597952s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -597843s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -597734s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -597625s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -597515s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -597404s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -597281s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -597172s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -597062s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -596953s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -596844s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -596719s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -596609s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -596500s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -596390s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -596281s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -596172s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -596062s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -595950s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -595844s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -595734s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -595625s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -595515s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -595406s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -595297s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -595187s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -595078s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -594968s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -594859s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -594750s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -594640s >= -30000s
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exe TID: 5140Thread sleep time: -594531s >= -30000s
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 599859Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 599750Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 599640Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 599531Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 599422Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 599313Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 599188Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 599063Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 598938Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 598813Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 598703Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 598594Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 598469Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 598359Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 598250Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 598141Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 598031Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 597922Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 597813Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 597688Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 597578Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 597469Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 597344Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 597235Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 597110Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 596985Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 596860Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 596734Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 596625Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 596515Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 596405Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 596296Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 596188Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 596063Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 595853Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 595735Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 595625Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 595516Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 595391Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 595281Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 595172Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 595063Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 594938Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 594813Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 594688Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 594578Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 594469Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 594344Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeThread delayed: delay time: 594234Jump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 600000
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 599890
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 599755
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 599614
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 599484
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 599375
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 599265
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 599156
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 599046
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 598937
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 598826
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 598718
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 598609
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 598500
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 598390
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 598281
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 598172
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 598062
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 597952
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 597843
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 597734
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 597625
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 597515
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 597404
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 597281
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 597172
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 597062
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 596953
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 596844
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 596719
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 596609
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 596500
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 596390
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 596281
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 596172
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 596062
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 595950
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 595844
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 595734
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 595625
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 595515
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 595406
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 595297
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 595187
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 595078
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 594968
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 594859
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 594750
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 594640
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeThread delayed: delay time: 594531
              Source: lmUupyodsah.exe, 0000000A.00000002.1424040888.00000000005DF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:
              Source: lmUupyodsah.exe, 0000000F.00000002.3814102911.0000000001249000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll 3
              Source: RFQ 20726 - T5 7841.exe, 00000009.00000002.3814015301.0000000000F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeCode function: 15_2_057D7588 LdrInitializeThunk,15_2_057D7588
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe"
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lmUupyodsah.exe"
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe"Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lmUupyodsah.exe"Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeMemory written: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeMemory written: C:\Users\user\AppData\Roaming\lmUupyodsah.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe"Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lmUupyodsah.exe"Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lmUupyodsah" /XML "C:\Users\user\AppData\Local\Temp\tmp38C0.tmp"Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeProcess created: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lmUupyodsah" /XML "C:\Users\user\AppData\Local\Temp\tmp490C.tmp"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess created: C:\Users\user\AppData\Roaming\lmUupyodsah.exe "C:\Users\user\AppData\Roaming\lmUupyodsah.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeProcess created: C:\Users\user\AppData\Roaming\lmUupyodsah.exe "C:\Users\user\AppData\Roaming\lmUupyodsah.exe"Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeQueries volume information: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeQueries volume information: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeQueries volume information: C:\Users\user\AppData\Roaming\lmUupyodsah.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeQueries volume information: C:\Users\user\AppData\Roaming\lmUupyodsah.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 9.2.RFQ 20726 - T5 7841.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.lmUupyodsah.exe.355cce8.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.lmUupyodsah.exe.353c4c8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.lmUupyodsah.exe.355cce8.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.lmUupyodsah.exe.353c4c8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000F.00000002.3812867070.000000000041B000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3815453085.0000000002D14000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.1430038668.000000000353C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000002.3815610243.0000000002F7F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1385448550.00000000034DD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000002.3815610243.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3815453085.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RFQ 20726 - T5 7841.exe PID: 7832, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RFQ 20726 - T5 7841.exe PID: 7436, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: lmUupyodsah.exe PID: 5168, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: lmUupyodsah.exe PID: 8164, type: MEMORYSTR
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
              Source: C:\Users\user\Desktop\RFQ 20726 - T5 7841.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
              Source: C:\Users\user\AppData\Roaming\lmUupyodsah.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
              Source: Yara matchFile source: 10.2.lmUupyodsah.exe.355cce8.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.lmUupyodsah.exe.353c4c8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.lmUupyodsah.exe.355cce8.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.lmUupyodsah.exe.353c4c8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000A.00000002.1430038668.000000000353C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1385448550.00000000034DD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RFQ 20726 - T5 7841.exe PID: 7832, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RFQ 20726 - T5 7841.exe PID: 7436, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: lmUupyodsah.exe PID: 5168, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: lmUupyodsah.exe PID: 8164, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 9.2.RFQ 20726 - T5 7841.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.lmUupyodsah.exe.355cce8.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.lmUupyodsah.exe.353c4c8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.lmUupyodsah.exe.355cce8.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.RFQ 20726 - T5 7841.exe.34fde20.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.RFQ 20726 - T5 7841.exe.34dd600.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.lmUupyodsah.exe.353c4c8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000F.00000002.3812867070.000000000041B000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3815453085.0000000002D14000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.1430038668.000000000353C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000002.3815610243.0000000002F7F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1385448550.00000000034DD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000002.3815610243.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3815453085.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RFQ 20726 - T5 7841.exe PID: 7832, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RFQ 20726 - T5 7841.exe PID: 7436, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: lmUupyodsah.exe PID: 5168, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: lmUupyodsah.exe PID: 8164, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Scheduled Task/Job
              1
              Scheduled Task/Job
              111
              Process Injection
              1
              Masquerading
              1
              OS Credential Dumping
              11
              Security Software Discovery
              Remote Services1
              Email Collection
              11
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              DLL Side-Loading
              1
              Scheduled Task/Job
              11
              Disable or Modify Tools
              LSASS Memory1
              Process Discovery
              Remote Desktop Protocol11
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              31
              Virtualization/Sandbox Evasion
              Security Account Manager31
              Virtualization/Sandbox Evasion
              SMB/Windows Admin Shares1
              Data from Local System
              2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
              Process Injection
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput Capture13
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Deobfuscate/Decode Files or Information
              LSA Secrets1
              System Network Configuration Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
              Obfuscated Files or Information
              Cached Domain Credentials1
              File and Directory Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
              Software Packing
              DCSync13
              System Information Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1467070 Sample: RFQ 20726 - T5 7841.exe Startdate: 03/07/2024 Architecture: WINDOWS Score: 100 48 reallyfreegeoip.org 2->48 50 checkip.dyndns.org 2->50 52 checkip.dyndns.com 2->52 58 Found malware configuration 2->58 60 Malicious sample detected (through community Yara rule) 2->60 62 Antivirus / Scanner detection for submitted sample 2->62 66 13 other signatures 2->66 8 RFQ 20726 - T5 7841.exe 7 2->8         started        12 lmUupyodsah.exe 5 2->12         started        signatures3 64 Tries to detect the country of the analysis system (by using the IP) 48->64 process4 file5 40 C:\Users\user\AppData\...\lmUupyodsah.exe, PE32 8->40 dropped 42 C:\Users\...\lmUupyodsah.exe:Zone.Identifier, ASCII 8->42 dropped 44 C:\Users\user\AppData\Local\...\tmp38C0.tmp, XML 8->44 dropped 46 C:\Users\user\...\RFQ 20726 - T5 7841.exe.log, ASCII 8->46 dropped 68 Adds a directory exclusion to Windows Defender 8->68 70 Injects a PE file into a foreign processes 8->70 14 RFQ 20726 - T5 7841.exe 15 2 8->14         started        18 powershell.exe 23 8->18         started        20 powershell.exe 23 8->20         started        22 schtasks.exe 1 8->22         started        72 Antivirus detection for dropped file 12->72 74 Multi AV Scanner detection for dropped file 12->74 76 Machine Learning detection for dropped file 12->76 24 lmUupyodsah.exe 12->24         started        26 schtasks.exe 12->26         started        28 lmUupyodsah.exe 12->28         started        signatures6 process7 dnsIp8 54 reallyfreegeoip.org 188.114.96.3, 443, 49707, 49708 CLOUDFLARENETUS European Union 14->54 56 checkip.dyndns.com 193.122.130.0, 49705, 49709, 49713 ORACLE-BMC-31898US United States 14->56 78 Loading BitLocker PowerShell Module 18->78 30 conhost.exe 18->30         started        32 WmiPrvSE.exe 18->32         started        34 conhost.exe 20->34         started        36 conhost.exe 22->36         started        80 Tries to steal Mail credentials (via file / registry access) 24->80 82 Tries to harvest and steal browser information (history, passwords, etc) 24->82 38 conhost.exe 26->38         started        signatures9 process10

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              RFQ 20726 - T5 7841.exe34%ReversingLabsWin32.Trojan.Generic
              RFQ 20726 - T5 7841.exe100%AviraHEUR/AGEN.1323711
              RFQ 20726 - T5 7841.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\lmUupyodsah.exe100%AviraHEUR/AGEN.1323711
              C:\Users\user\AppData\Roaming\lmUupyodsah.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\lmUupyodsah.exe34%ReversingLabsWin32.Trojan.Generic
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://checkip.dyndns.org/0%URL Reputationsafe
              http://checkip.dyndns.org/q0%URL Reputationsafe
              http://checkip.dyndns.org0%URL Reputationsafe
              http://checkip.dyndns.com0%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              https://reallyfreegeoip.org/xml/0%URL Reputationsafe
              https://reallyfreegeoip.orgh0%Avira URL Cloudsafe
              http://gorosoft.com/fwlin0%Avira URL Cloudsafe
              http://checkip.dyndns.orgh0%Avira URL Cloudsafe
              https://reallyfreegeoip.org/xml/8.46.123.330%Avira URL Cloudsafe
              https://reallyfreegeoip.org0%Avira URL Cloudsafe
              https://reallyfreegeoip.org/xml/8.46.123.33$0%Avira URL Cloudsafe
              http://reallyfreegeoip.org0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              reallyfreegeoip.org
              188.114.96.3
              truetrue
                unknown
                checkip.dyndns.com
                193.122.130.0
                truefalse
                  unknown
                  checkip.dyndns.org
                  unknown
                  unknowntrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    http://checkip.dyndns.org/false
                    • URL Reputation: safe
                    unknown
                    https://reallyfreegeoip.org/xml/8.46.123.33false
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://reallyfreegeoip.org/xml/8.46.123.33$RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CBC000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002D06000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CCA000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CF8000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F35000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002EB8000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F1A000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F27000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F63000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F0C000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F71000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://checkip.dyndns.orghlmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002E67000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F1A000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://checkip.dyndns.org/qRFQ 20726 - T5 7841.exe, 00000000.00000002.1385448550.00000000034DD000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000A.00000002.1430038668.000000000353C000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3812867070.000000000041B000.00000040.00000400.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://reallyfreegeoip.orghlmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F63000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://reallyfreegeoip.orgRFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002C27000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CBC000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002D06000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CCA000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CF8000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F35000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F1A000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F27000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F63000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002E92000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F0C000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F71000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://reallyfreegeoip.orgRFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CBC000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002D06000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CCA000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CF8000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002C0E000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F35000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002EB8000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002E7A000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F1A000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F27000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F63000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F0C000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F71000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://checkip.dyndns.orgRFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CBC000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CD8000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002D06000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CCA000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CF8000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002C0E000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002E67000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F43000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F35000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002EB8000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002E7A000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F1A000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F27000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F63000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F0C000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F71000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://checkip.dyndns.comRFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CBC000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002D06000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CCA000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CF8000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002C0E000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F35000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002E7A000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F1A000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F27000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F63000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F0C000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002F71000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://gorosoft.com/fwlinlmUupyodsah.exe, 0000000A.00000002.1424040888.00000000005B6000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRFQ 20726 - T5 7841.exe, 00000000.00000002.1384845899.00000000025B1000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000A.00000002.1426105529.0000000002614000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002DB1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://reallyfreegeoip.org/xml/RFQ 20726 - T5 7841.exe, 00000000.00000002.1385448550.00000000034DD000.00000004.00000800.00020000.00000000.sdmp, RFQ 20726 - T5 7841.exe, 00000009.00000002.3815453085.0000000002C0E000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000A.00000002.1430038668.000000000353C000.00000004.00000800.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3812867070.000000000041B000.00000040.00000400.00020000.00000000.sdmp, lmUupyodsah.exe, 0000000F.00000002.3815610243.0000000002E7A000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    188.114.96.3
                    reallyfreegeoip.orgEuropean Union
                    13335CLOUDFLARENETUStrue
                    193.122.130.0
                    checkip.dyndns.comUnited States
                    31898ORACLE-BMC-31898USfalse
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1467070
                    Start date and time:2024-07-03 17:37:06 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 10m 46s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:20
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:RFQ 20726 - T5 7841.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@21/15@2/2
                    EGA Information:
                    • Successful, ratio: 75%
                    HCA Information:
                    • Successful, ratio: 98%
                    • Number of executed functions: 457
                    • Number of non-executed functions: 17
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Execution Graph export aborted for target RFQ 20726 - T5 7841.exe, PID 7436 because it is empty
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                    • Report size getting too big, too many NtCreateKey calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    • VT rate limit hit for: RFQ 20726 - T5 7841.exe
                    TimeTypeDescription
                    11:38:10API Interceptor8775171x Sleep call for process: RFQ 20726 - T5 7841.exe modified
                    11:38:12API Interceptor35x Sleep call for process: powershell.exe modified
                    11:38:15API Interceptor6439679x Sleep call for process: lmUupyodsah.exe modified
                    17:38:13Task SchedulerRun new task: lmUupyodsah path: C:\Users\user\AppData\Roaming\lmUupyodsah.exe
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    188.114.96.39098393827383039.exeGet hashmaliciousFormBookBrowse
                    • www.coinwab.com/kqqj/
                    SOA 020724.exeGet hashmaliciousFormBookBrowse
                    • www.ad14.fun/az6h/?Vn=Ydx4qJJ0n&3jJlx=2tWzkzncG4ra8DBegJJBToW7oB13AdJXZ1KkbDLW+Ah9MGsNEQDOdLre6u2t4zOJ63yLnsPJ97sPnqMxsSzbOxuABFq0Im2Ecm9EQ8GOdhogxDCvRrrALITlDFg7ZHNgcXHQPxMcHnGf
                    Adjunto confirmacion de pedido.exeGet hashmaliciousDBatLoader, FormBookBrowse
                    • www.coinwab.com/kqqj/
                    aAEsSBx24sxHhRz.exeGet hashmaliciousFormBookBrowse
                    • www.camperelektrikde.shop/dy13/?GdIHAFZ=8bNdgr3QvPw6/pDIZNt+55DvjzemDI0RO+pYD3qlulbIe6f7Sn3K06Z4F4Tg3hK83Y0/&BhU=5jl0ddZhNnYlOrV0
                    http://sp.26skins.com/steamstore/category/adventure_rpg/?snr=1_5_9__12Get hashmaliciousUnknownBrowse
                    • sp.26skins.com/favicon.ico
                    30Fqen2Bu3.exeGet hashmaliciousUnknownBrowse
                    • filetransfer.io/data-package/TbaYPT0S/download
                    30Fqen2Bu3.exeGet hashmaliciousUnknownBrowse
                    • filetransfer.io/data-package/TbaYPT0S/download
                    Vg46FzGtNo.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                    • 000366cm.nyashka.top/phpflowergenerator.php
                    QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    • filetransfer.io/data-package/mHgyHEv5/download
                    file.exeGet hashmaliciousFormBookBrowse
                    • www.cavetta.org.mt/yhnb/
                    193.122.130.01mXbuDDPbF.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • checkip.dyndns.org/
                    Bank Slip 2.docGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    zkB0qfWSJk.exeGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    file.exeGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    LETTER OF AUTHORIZATION.exeGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    PRODUCTS LIST.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    file.exeGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    IMG_0071191023.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • checkip.dyndns.org/
                    SDFS0987678900H..Bat.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • checkip.dyndns.org/
                    Vessel Particulars.exeGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    reallyfreegeoip.orgfile.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.97.3
                    7vwfhMuUQg.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.96.3
                    j6OUc3S2uP.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.96.3
                    7vwfhMuUQg.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.96.3
                    1mXbuDDPbF.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • 188.114.97.3
                    k8TljgjfDl.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.97.3
                    IMG_0178520003023PDF.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • 188.114.97.3
                    MT_01452_03607PDF.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • 188.114.97.3
                    PETUNJUK-PENGISIAN DAN PENGIRIMAN KONFIRMASI EDITED.xlsx.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.96.3
                    whiteee.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.97.3
                    checkip.dyndns.comfile.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 132.226.247.73
                    7vwfhMuUQg.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 132.226.247.73
                    j6OUc3S2uP.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 132.226.8.169
                    7vwfhMuUQg.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 132.226.247.73
                    1mXbuDDPbF.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • 193.122.130.0
                    k8TljgjfDl.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 132.226.247.73
                    project plan.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 132.226.247.73
                    IMG_0178520003023PDF.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • 158.101.44.242
                    MT_01452_03607PDF.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • 132.226.247.73
                    payment.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 158.101.44.242
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    CLOUDFLARENETUSfile.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.97.3
                    Service Desk - Please verify your Account!.emlGet hashmaliciousHTMLPhisherBrowse
                    • 104.17.2.184
                    MKCC-MEC-RFQ-115-2024.exeGet hashmaliciousFormBookBrowse
                    • 188.114.97.3
                    https://mail.pfl.fyi/v1/messages/0190749a-2f6a-7c9f-b37a-88f0ae969ede/click?link_id=0190749a-2ffa-7f41-ad16-3ecda235df51&signature=3e892faf1c0137166fda82e5ff5c6a3150c2cec9Get hashmaliciousHTMLPhisherBrowse
                    • 104.17.2.184
                    http://beetrootculture.comGet hashmaliciousUnknownBrowse
                    • 104.22.21.226
                    https://link.mail.beehiiv.com/ls/click?upn=u001.DTQiLe1mLQCNek4IXPrb3cd8am3-2BtbSaRRShUhZCbhF1FE2NDum-2B9YeqhMivZ-2FcIJGKdOjfqgyCSTZimAiOiNKkJG3N5vgYBNDNlk5YkmOU2XPb-2FKTFlF-2Fc7jFH7Nb8Q0JW6uJclJabjCcGs0cWdzdydwDpcxzScPZQBex7SofyQj6MGdYzEG8hbxGGqYt2bpR0NjPAx6JIYz6GJiSrQNg-3D-3DNN1n_VW5ZEdFpCuXmC2nf4fwMfiBmdui0O95PSMmp4s-2F2oS3jvSHISWr6XQl8RtHpD7TWmHpRBlT8NsCamUZaroeFibjayeskXeuNnFhPFOon1-2FD6SmbcpIEUC7jghzzXsggajKIODB16RJEeGNz4SFHe6mT-2Bn59v08ju13fD9NtKJQcr97qiQNjiGiaoQJcvN3gUurUBqLZp9I4f9bNW54ZUVVCzpwaogbLaWcL9oScbt8r4Ku34t9zOqlF27gTqXVf6T2MbNMKkoCYnb-2BuL8kIZdyoRM3EFOIuktrG5gMH3OTa1K2klBhmxFOQ2d7plqd5asAi8Ofl9YcYOh-2FL4f45riCQtSdd7jru06EkHcBuJahi-2BD3xm-2F7PbjpIpmn-2Bu7KYdjQeOSKE-2FSiD6UNxc7JQNRWkdnK1RTC7eoEMZms82uCa8fJQIoMgqBt91NrcdZIDONaGhhpHXRhQ1VbYp5h6Cow-3D-3D#?email=dmFsZXJpZS5jaHJ1c2NpZWxAb3Zlcmxha2Vob3NwaXRhbC5vcmc=Get hashmaliciousHTMLPhisherBrowse
                    • 104.17.25.14
                    7EulSGn18e.exeGet hashmaliciousLummaCBrowse
                    • 172.67.154.12
                    NSLC_Billing_Document_No_0240255100.htmlGet hashmaliciousCVE-2024-21412Browse
                    • 104.16.231.132
                    62b1bf60394248d2c743ec6df0935d58e5009c9e04aab.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                    • 188.114.97.3
                    GJRX21GBj3.exeGet hashmaliciousFormBookBrowse
                    • 23.227.38.74
                    ORACLE-BMC-31898US1mXbuDDPbF.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • 193.122.130.0
                    IMG_0178520003023PDF.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • 158.101.44.242
                    payment.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 158.101.44.242
                    FiddlerSetup.5.0.20243.10853-latest.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                    • 192.29.11.142
                    https://ssl.sonicsecuremail.com/r.aspx?b=8&e=pamela%2Ecase%40marionfl%2Eorg&p=4VEU&cb=181Get hashmaliciousUnknownBrowse
                    • 192.29.14.118
                    PETUNJUK-PENGISIAN DAN PENGIRIMAN KONFIRMASI EDITED.xlsx.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 193.122.6.168
                    whiteee.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 193.122.6.168
                    whiteee.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 158.101.44.242
                    mirai.mips.elfGet hashmaliciousMiraiBrowse
                    • 129.147.199.239
                    PM114079-990528.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 193.122.6.168
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    54328bd36c14bd82ddaa0c04b25ed9adfile.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.96.3
                    7vwfhMuUQg.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.96.3
                    j6OUc3S2uP.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.96.3
                    7vwfhMuUQg.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.96.3
                    kZa81nzREg.exeGet hashmaliciousAgentTeslaBrowse
                    • 188.114.96.3
                    ptKNiAaGus.exeGet hashmaliciousUnknownBrowse
                    • 188.114.96.3
                    beK7HmoXro.exeGet hashmaliciousUnknownBrowse
                    • 188.114.96.3
                    1mXbuDDPbF.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • 188.114.96.3
                    k8TljgjfDl.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.96.3
                    IMG_0178520003023PDF.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                    • 188.114.96.3
                    No context
                    Process:C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1216
                    Entropy (8bit):5.34331486778365
                    Encrypted:false
                    SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                    MD5:1330C80CAAC9A0FB172F202485E9B1E8
                    SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                    SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                    SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                    Process:C:\Users\user\AppData\Roaming\lmUupyodsah.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1216
                    Entropy (8bit):5.34331486778365
                    Encrypted:false
                    SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                    MD5:1330C80CAAC9A0FB172F202485E9B1E8
                    SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                    SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                    SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                    Malicious:false
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    File Type:data
                    Category:modified
                    Size (bytes):2232
                    Entropy (8bit):5.379401388151058
                    Encrypted:false
                    SSDEEP:48:fWSU4xymI4RfoUeW+gZ9tK8NPZHUxL7u1iMuge//ZPUyufF:fLHxvIIwLgZ2KRHWLOugbfF
                    MD5:58A7096CB025BD77BA72EE5581CB27AB
                    SHA1:117086EE7A79152A8B9A29BAF4F6EA054BF52079
                    SHA-256:4B5F2A06594AC976EFF59A4D7DF8C99ED052E7818400AFCF9FB850E1ACBE6459
                    SHA-512:EFDC08D76A8D270295089A557578CB53A17A56E31321C8656DA5A75AF1084C56AE36892C2D409CAFAD4743C9B87920E8306BBBF9356689D9A9F42CA1C639452B
                    Malicious:false
                    Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe
                    File Type:XML 1.0 document, ASCII text
                    Category:dropped
                    Size (bytes):1570
                    Entropy (8bit):5.103902656144871
                    Encrypted:false
                    SSDEEP:48:cge7XQBBYrFdOFzOzN33ODOiDdKrsuT2Zv:He7XQBBYrFdOFzOz6dKrsu4
                    MD5:3EABAA398CFD44236AE4F66759999150
                    SHA1:848489C8D187FF74B53F1363111263308E84A789
                    SHA-256:B70F5CF727F76ABAF6BDDF91C67123662D506A518E6C23AA110C7E7E99439413
                    SHA-512:F171CF19A68556934BEC77816241E74FE30E54D0F94CC5ABA08903255219ECBC449A4BEC44BBD3779CDD92B54BF104A2B4190F3F9EEE9D55CF32C3F67950D842
                    Malicious:true
                    Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvailable>f
                    Process:C:\Users\user\AppData\Roaming\lmUupyodsah.exe
                    File Type:XML 1.0 document, ASCII text
                    Category:dropped
                    Size (bytes):1570
                    Entropy (8bit):5.103902656144871
                    Encrypted:false
                    SSDEEP:48:cge7XQBBYrFdOFzOzN33ODOiDdKrsuT2Zv:He7XQBBYrFdOFzOz6dKrsu4
                    MD5:3EABAA398CFD44236AE4F66759999150
                    SHA1:848489C8D187FF74B53F1363111263308E84A789
                    SHA-256:B70F5CF727F76ABAF6BDDF91C67123662D506A518E6C23AA110C7E7E99439413
                    SHA-512:F171CF19A68556934BEC77816241E74FE30E54D0F94CC5ABA08903255219ECBC449A4BEC44BBD3779CDD92B54BF104A2B4190F3F9EEE9D55CF32C3F67950D842
                    Malicious:false
                    Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvailable>f
                    Process:C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):846336
                    Entropy (8bit):7.939976042250448
                    Encrypted:false
                    SSDEEP:12288:B61ODNf+wYk4ezUlsvU6PnfdLEoB+q0yJsIYScFpy7w88Uk8/6Tk976QCAxGXgXM:X4ezUqTRGpIYSupf8v/6Tkl6EGQgxN7
                    MD5:68BCD11DA168BCD33C61ADFE6CF8B2B3
                    SHA1:2C1233FB5A6E73A8CF5B97248F771CA92F3776DC
                    SHA-256:4C38813CA8FC7A8A94ACAB611B0D5A8F64592E6C8E5DF52E35B7182CDEC8DAB0
                    SHA-512:9FDB2A0615A85354C6F1588E5EE2D8685B0D6F1E1D0913440090DF9D704F87A84F5131FD978A0ACFAD2E46380B3B925907C57745B57B7466D6EE38C39B59B563
                    Malicious:true
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: ReversingLabs, Detection: 34%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...z.f.....................f......&.... ........@.. .......................`............@....................................W........c...................@....................................................... ............... ..H............text...,.... ...................... ..`.rsrc....c.......d..................@..@.reloc.......@......................@..B........................H........e...:..............x...........................................z.(......}.....(....o....}....*..0...........{............3.....(.....*..................0...........{......,....f.........}......}......}.......s....o....}.......}....8......{....o....}......{....}......}.............}.....{........Y}.....{....-...+H.{........{....X.{....X .;.|.{....Xa}......}.....{....op...:q....(....+..(........}.........(......*................n..}.....{....,..{....ol...*..{....*.s..
                    Process:C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):26
                    Entropy (8bit):3.95006375643621
                    Encrypted:false
                    SSDEEP:3:ggPYV:rPYV
                    MD5:187F488E27DB4AF347237FE461A079AD
                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                    Malicious:true
                    Preview:[ZoneTransfer]....ZoneId=0
                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):7.939976042250448
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    • Win32 Executable (generic) a (10002005/4) 49.78%
                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    • DOS Executable Generic (2002/1) 0.01%
                    File name:RFQ 20726 - T5 7841.exe
                    File size:846'336 bytes
                    MD5:68bcd11da168bcd33c61adfe6cf8b2b3
                    SHA1:2c1233fb5a6e73a8cf5b97248f771ca92f3776dc
                    SHA256:4c38813ca8fc7a8a94acab611b0d5a8f64592e6c8e5df52e35b7182cdec8dab0
                    SHA512:9fdb2a0615a85354c6f1588e5ee2d8685b0d6f1e1d0913440090df9d704f87a84f5131fd978a0acfad2e46380b3b925907c57745b57b7466d6ee38c39b59b563
                    SSDEEP:12288:B61ODNf+wYk4ezUlsvU6PnfdLEoB+q0yJsIYScFpy7w88Uk8/6Tk976QCAxGXgXM:X4ezUqTRGpIYSupf8v/6Tkl6EGQgxN7
                    TLSH:A7051241B269DA37C66C10F94417604807B2DC4B21D6DBCEAEC7F8EAE5B1BCC85097A7
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...z..f.....................f......&.... ........@.. .......................`............@................................
                    Icon Hash:66666667e69c310e
                    Entrypoint:0x4ca026
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0x6684EB7A [Wed Jul 3 06:11:06 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                    Instruction
                    jmp dword ptr [00402000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0xc9fcc0x57.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xcc0000x63c4.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xd40000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000xc802c0xc8200d96fd6a763d79febea1346934ef9b269False0.9666077841973766data7.973599311397862IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rsrc0xcc0000x63c40x64004a054d4d83ce7ad27a0787d10ae0d089False0.3947265625data5.162719074061561IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0xd40000xc0x200c65a40f2248dfa4ea27f48f4473362fcFalse0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_ICON0xcc2800x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 00.2701612903225806
                    RT_ICON0xcc5680x128Device independent bitmap graphic, 16 x 32 x 4, image size 00.4966216216216216
                    RT_ICON0xcc6900xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.5439765458422174
                    RT_ICON0xcd5380x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.6656137184115524
                    RT_ICON0xcdde00x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5021676300578035
                    RT_ICON0xce3480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.3157676348547718
                    RT_ICON0xd08f00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.4090056285178236
                    RT_ICON0xd19980x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.5859929078014184
                    RT_GROUP_ICON0xd1e000x76data0.6440677966101694
                    RT_VERSION0xd1e780x398OpenPGP Public Key0.41847826086956524
                    RT_MANIFEST0xd22100x1b4XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (433), with no line terminators0.5642201834862385
                    DLLImport
                    mscoree.dll_CorExeMain
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 3, 2024 17:38:13.289716005 CEST4970580192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:13.294538975 CEST8049705193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:13.294606924 CEST4970580192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:13.295049906 CEST4970580192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:13.299833059 CEST8049705193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:13.753755093 CEST8049705193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:13.764710903 CEST4970580192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:13.769908905 CEST8049705193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:13.930816889 CEST8049705193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:13.978404045 CEST4970580192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:14.033401966 CEST49707443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:14.033452988 CEST44349707188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:14.033745050 CEST49707443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:14.039669037 CEST49707443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:14.039707899 CEST44349707188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:14.537667036 CEST44349707188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:14.537782907 CEST49707443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:14.550529957 CEST49707443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:14.550561905 CEST44349707188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:14.550971985 CEST44349707188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:14.603590965 CEST49707443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:14.656357050 CEST49707443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:14.696496964 CEST44349707188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:14.769645929 CEST44349707188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:14.769759893 CEST44349707188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:14.769848108 CEST49707443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:14.784204960 CEST49707443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:14.798073053 CEST4970580192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:14.803018093 CEST8049705193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:14.898572922 CEST8049705193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:14.922831059 CEST49708443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:14.922884941 CEST44349708188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:14.922962904 CEST49708443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:14.923230886 CEST49708443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:14.923245907 CEST44349708188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:14.990055084 CEST4970580192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:15.394496918 CEST44349708188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:15.405343056 CEST49708443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:15.405379057 CEST44349708188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:15.548743963 CEST44349708188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:15.548845053 CEST44349708188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:15.548885107 CEST49708443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:15.549510956 CEST49708443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:15.552855968 CEST4970580192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:15.553960085 CEST4970980192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:15.560739040 CEST8049709193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:15.560815096 CEST4970980192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:15.560873985 CEST8049705193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:15.560956001 CEST4970980192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:15.560971975 CEST4970580192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:15.565784931 CEST8049709193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:16.058547020 CEST8049709193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:16.059653044 CEST49711443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:16.059708118 CEST44349711188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:16.059953928 CEST49711443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:16.060082912 CEST49711443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:16.060096025 CEST44349711188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:16.229192019 CEST4970980192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:16.577271938 CEST44349711188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:16.578788042 CEST49711443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:16.578823090 CEST44349711188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:16.732917070 CEST44349711188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:16.733016968 CEST44349711188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:16.733521938 CEST49711443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:16.733522892 CEST49711443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:16.740225077 CEST4971380192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:16.745379925 CEST8049713193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:16.745539904 CEST4971380192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:16.745644093 CEST4971380192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:16.750431061 CEST8049713193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:17.192857027 CEST4971480192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:17.197798014 CEST8049714193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:17.197869062 CEST4971480192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:17.198478937 CEST4971480192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:17.203329086 CEST8049714193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:17.223428965 CEST8049713193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:17.224726915 CEST49715443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:17.224786997 CEST44349715188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:17.224852085 CEST49715443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:17.225126982 CEST49715443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:17.225145102 CEST44349715188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:17.369101048 CEST4971380192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:17.667821884 CEST8049714193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:17.671854973 CEST4971480192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:17.676887035 CEST8049714193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:17.681035995 CEST44349715188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:17.682877064 CEST49715443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:17.682913065 CEST44349715188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:17.774383068 CEST8049714193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:17.828679085 CEST44349715188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:17.828773022 CEST44349715188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:17.828819990 CEST49715443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:17.829261065 CEST49715443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:17.829478979 CEST49716443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:17.829523087 CEST44349716188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:17.829587936 CEST49716443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:17.833177090 CEST4971380192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:17.834501028 CEST4971780192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:17.836227894 CEST49716443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:17.836244106 CEST44349716188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:17.838615894 CEST8049713193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:17.838677883 CEST4971380192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:17.839554071 CEST8049717193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:17.839618921 CEST4971780192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:17.839703083 CEST4971780192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:17.844537020 CEST8049717193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:17.869021893 CEST4971480192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:18.303997993 CEST44349716188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:18.304124117 CEST49716443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:18.306126118 CEST49716443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:18.306138992 CEST44349716188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:18.306493044 CEST44349716188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:18.315993071 CEST8049717193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:18.317214966 CEST49718443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:18.317266941 CEST44349718188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:18.317323923 CEST49718443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:18.317693949 CEST49718443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:18.317711115 CEST44349718188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:18.369087934 CEST4971780192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:18.403069973 CEST49716443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:18.444494963 CEST44349716188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:18.517066956 CEST44349716188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:18.517183065 CEST44349716188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:18.521235943 CEST49716443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:18.544137001 CEST49716443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:18.549583912 CEST4971480192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:18.554562092 CEST8049714193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:18.651623011 CEST8049714193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:18.653795004 CEST49719443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:18.653834105 CEST44349719188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:18.654006958 CEST49719443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:18.654196024 CEST49719443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:18.654212952 CEST44349719188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:18.759633064 CEST4971480192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:18.783346891 CEST44349718188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:18.784879923 CEST49718443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:18.784919977 CEST44349718188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:18.920985937 CEST44349718188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:18.921113968 CEST44349718188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:18.921170950 CEST49718443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:18.960315943 CEST49718443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:19.033483982 CEST4971780192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:19.034672976 CEST4972080192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:19.038717031 CEST8049717193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:19.038793087 CEST4971780192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:19.039526939 CEST8049720193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:19.039583921 CEST4972080192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:19.039724112 CEST4972080192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:19.044524908 CEST8049720193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:19.124943018 CEST44349719188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:19.126827002 CEST49719443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:19.126848936 CEST44349719188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:19.278626919 CEST44349719188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:19.278724909 CEST44349719188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:19.278938055 CEST49719443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:19.279542923 CEST49719443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:19.283041000 CEST4971480192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:19.284370899 CEST4972180192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:19.288520098 CEST8049714193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:19.288568020 CEST4971480192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:19.289558887 CEST8049721193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:19.289654970 CEST4972180192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:19.289755106 CEST4972180192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:19.294648886 CEST8049721193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:19.520874977 CEST8049720193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:19.522268057 CEST49722443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:19.522316933 CEST44349722188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:19.522383928 CEST49722443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:19.522712946 CEST49722443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:19.522727013 CEST44349722188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:19.638634920 CEST4972080192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:19.764913082 CEST8049721193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:19.766166925 CEST49723443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:19.766207933 CEST44349723188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:19.766408920 CEST49723443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:19.766726971 CEST49723443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:19.766741037 CEST44349723188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:19.897583961 CEST4972180192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:19.981141090 CEST44349722188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:19.983150959 CEST49722443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:19.983181953 CEST44349722188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:20.124370098 CEST44349722188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:20.124486923 CEST44349722188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:20.125370026 CEST49722443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:20.128976107 CEST4972080192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:20.129040956 CEST49722443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:20.130220890 CEST4972480192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:20.134393930 CEST8049720193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:20.134526968 CEST4972080192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:20.135099888 CEST8049724193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:20.135252953 CEST4972480192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:20.135329962 CEST4972480192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:20.140127897 CEST8049724193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:20.224814892 CEST44349723188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:20.226747036 CEST49723443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:20.226769924 CEST44349723188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:20.373770952 CEST44349723188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:20.373874903 CEST44349723188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:20.374424934 CEST49723443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:20.374555111 CEST49723443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:20.379160881 CEST4972580192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:20.384031057 CEST8049725193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:20.384239912 CEST4972580192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:20.384239912 CEST4972580192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:20.389091015 CEST8049725193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:20.604667902 CEST8049724193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:20.609168053 CEST49726443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:20.609220982 CEST44349726188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:20.614636898 CEST49726443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:20.615114927 CEST49726443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:20.615143061 CEST44349726188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:20.650269032 CEST4972480192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:20.866614103 CEST8049725193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:20.868169069 CEST49727443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:20.868210077 CEST44349727188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:20.869230032 CEST49727443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:20.871741056 CEST49727443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:20.871756077 CEST44349727188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:20.915932894 CEST4972580192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:21.080674887 CEST44349726188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:21.082405090 CEST49726443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:21.082425117 CEST44349726188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:21.230564117 CEST44349726188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:21.230667114 CEST44349726188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:21.230863094 CEST49726443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:21.231468916 CEST49726443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:21.235073090 CEST4972480192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:21.236390114 CEST4972880192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:21.241173983 CEST8049724193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:21.241245031 CEST4972480192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:21.241365910 CEST8049728193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:21.241466999 CEST4972880192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:21.241595984 CEST4972880192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:21.246531963 CEST8049728193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:21.349744081 CEST44349727188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:21.373008013 CEST49727443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:21.373043060 CEST44349727188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:21.500471115 CEST44349727188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:21.500576973 CEST44349727188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:21.500725985 CEST49727443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:21.501296997 CEST49727443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:21.509519100 CEST4972580192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:21.514646053 CEST8049725193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:21.514709949 CEST4972580192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:21.516666889 CEST4972980192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:21.521485090 CEST8049729193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:21.521569967 CEST4972980192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:21.521800995 CEST4972980192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:21.527179956 CEST8049729193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:21.701400042 CEST8049728193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:21.702697039 CEST49730443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:21.702739000 CEST44349730188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:21.702848911 CEST49730443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:21.703134060 CEST49730443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:21.703145981 CEST44349730188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:21.744035006 CEST4972880192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:21.981581926 CEST8049729193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:21.982906103 CEST49731443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:21.982934952 CEST44349731188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:21.983006954 CEST49731443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:21.983299017 CEST49731443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:21.983314991 CEST44349731188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:22.025269985 CEST4972980192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:22.180628061 CEST44349730188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:22.182491064 CEST49730443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:22.182518959 CEST44349730188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:22.330177069 CEST44349730188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:22.330286980 CEST44349730188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:22.330338955 CEST49730443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:22.330817938 CEST49730443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:22.452090025 CEST44349731188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:22.454139948 CEST49731443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:22.454176903 CEST44349731188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:22.598001957 CEST44349731188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:22.598115921 CEST44349731188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:22.598184109 CEST49731443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:22.598702908 CEST49731443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:22.602379084 CEST4972980192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:22.603961945 CEST4973280192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:22.610498905 CEST8049729193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:22.610667944 CEST4972980192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:22.610789061 CEST8049732193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:22.610960960 CEST4973280192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:22.611088037 CEST4973280192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:22.617567062 CEST8049732193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:23.164043903 CEST8049732193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:23.165471077 CEST49733443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:23.165512085 CEST44349733188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:23.165591002 CEST49733443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:23.165852070 CEST49733443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:23.165868044 CEST44349733188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:23.212784052 CEST4973280192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:23.625225067 CEST44349733188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:23.627250910 CEST49733443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:23.627279043 CEST44349733188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:23.772355080 CEST44349733188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:23.772464037 CEST44349733188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:23.772559881 CEST49733443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:23.773158073 CEST49733443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:23.776668072 CEST4973280192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:23.777714014 CEST4973480192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:23.782301903 CEST8049732193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:23.782627106 CEST8049734193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:23.782718897 CEST4973280192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:23.782751083 CEST4973480192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:23.782886028 CEST4973480192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:23.787811995 CEST8049734193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:24.251707077 CEST8049734193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:24.253268003 CEST49735443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:24.253320932 CEST44349735188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:24.253420115 CEST49735443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:24.253915071 CEST49735443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:24.253928900 CEST44349735188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:24.306525946 CEST4973480192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:24.720101118 CEST44349735188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:24.721822977 CEST49735443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:24.721852064 CEST44349735188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:24.868551970 CEST44349735188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:24.868640900 CEST44349735188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:24.868704081 CEST49735443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:24.869486094 CEST49735443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:24.872809887 CEST4973480192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:24.873790979 CEST4973680192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:24.877882957 CEST8049734193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:24.877963066 CEST4973480192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:24.878952980 CEST8049736193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:24.879132986 CEST4973680192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:24.879240036 CEST4973680192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:24.884195089 CEST8049736193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:25.335912943 CEST8049736193.122.130.0192.168.2.10
                    Jul 3, 2024 17:38:25.337688923 CEST49737443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:25.337743044 CEST44349737188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:25.337829113 CEST49737443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:25.338140011 CEST49737443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:25.338151932 CEST44349737188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:25.384704113 CEST4973680192.168.2.10193.122.130.0
                    Jul 3, 2024 17:38:25.806862116 CEST44349737188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:25.808670998 CEST49737443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:25.808684111 CEST44349737188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:25.936148882 CEST44349737188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:25.936239958 CEST44349737188.114.96.3192.168.2.10
                    Jul 3, 2024 17:38:25.936295033 CEST49737443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:38:25.936903954 CEST49737443192.168.2.10188.114.96.3
                    Jul 3, 2024 17:39:21.246387959 CEST8049709193.122.130.0192.168.2.10
                    Jul 3, 2024 17:39:21.246493101 CEST4970980192.168.2.10193.122.130.0
                    Jul 3, 2024 17:39:24.764810085 CEST8049721193.122.130.0192.168.2.10
                    Jul 3, 2024 17:39:24.764878035 CEST4972180192.168.2.10193.122.130.0
                    Jul 3, 2024 17:39:26.703217030 CEST8049728193.122.130.0192.168.2.10
                    Jul 3, 2024 17:39:26.703284025 CEST4972880192.168.2.10193.122.130.0
                    Jul 3, 2024 17:39:30.335376978 CEST8049736193.122.130.0192.168.2.10
                    Jul 3, 2024 17:39:30.335470915 CEST4973680192.168.2.10193.122.130.0
                    Jul 3, 2024 17:40:01.865314007 CEST4972880192.168.2.10193.122.130.0
                    Jul 3, 2024 17:40:01.870420933 CEST8049728193.122.130.0192.168.2.10
                    Jul 3, 2024 17:40:05.338677883 CEST4973680192.168.2.10193.122.130.0
                    Jul 3, 2024 17:40:05.343928099 CEST8049736193.122.130.0192.168.2.10
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 3, 2024 17:38:13.274862051 CEST6211653192.168.2.101.1.1.1
                    Jul 3, 2024 17:38:13.281887054 CEST53621161.1.1.1192.168.2.10
                    Jul 3, 2024 17:38:14.024570942 CEST6101453192.168.2.101.1.1.1
                    Jul 3, 2024 17:38:14.032465935 CEST53610141.1.1.1192.168.2.10
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Jul 3, 2024 17:38:13.274862051 CEST192.168.2.101.1.1.10xebaStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                    Jul 3, 2024 17:38:14.024570942 CEST192.168.2.101.1.1.10x3cc4Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Jul 3, 2024 17:38:13.281887054 CEST1.1.1.1192.168.2.100xebaNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                    Jul 3, 2024 17:38:13.281887054 CEST1.1.1.1192.168.2.100xebaNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                    Jul 3, 2024 17:38:13.281887054 CEST1.1.1.1192.168.2.100xebaNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                    Jul 3, 2024 17:38:13.281887054 CEST1.1.1.1192.168.2.100xebaNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                    Jul 3, 2024 17:38:13.281887054 CEST1.1.1.1192.168.2.100xebaNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                    Jul 3, 2024 17:38:13.281887054 CEST1.1.1.1192.168.2.100xebaNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                    Jul 3, 2024 17:38:14.032465935 CEST1.1.1.1192.168.2.100x3cc4No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                    Jul 3, 2024 17:38:14.032465935 CEST1.1.1.1192.168.2.100x3cc4No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                    • reallyfreegeoip.org
                    • checkip.dyndns.org
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.1049705193.122.130.0807436C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe
                    TimestampBytes transferredDirectionData
                    Jul 3, 2024 17:38:13.295049906 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Jul 3, 2024 17:38:13.753755093 CEST320INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:13 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: 6aef6130b53b3503a413c5cbb84b5040
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                    Jul 3, 2024 17:38:13.764710903 CEST127OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Jul 3, 2024 17:38:13.930816889 CEST320INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:13 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: 438bcc62c6718b58230abf93e1e30a8b
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                    Jul 3, 2024 17:38:14.798073053 CEST127OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Jul 3, 2024 17:38:14.898572922 CEST320INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:14 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: 3b0a3ab8f343c9363782d1f827b84502
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.1049709193.122.130.0807436C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe
                    TimestampBytes transferredDirectionData
                    Jul 3, 2024 17:38:15.560956001 CEST127OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Jul 3, 2024 17:38:16.058547020 CEST320INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:15 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: fa388695fae7ce7b68a886e36a619ffa
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    2192.168.2.1049713193.122.130.0807436C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe
                    TimestampBytes transferredDirectionData
                    Jul 3, 2024 17:38:16.745644093 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Jul 3, 2024 17:38:17.223428965 CEST320INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:17 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: 0dd91d4d5d537e8fea2f681db70475fd
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    3192.168.2.1049714193.122.130.0808164C:\Users\user\AppData\Roaming\lmUupyodsah.exe
                    TimestampBytes transferredDirectionData
                    Jul 3, 2024 17:38:17.198478937 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Jul 3, 2024 17:38:17.667821884 CEST320INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:17 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: 14a8a0390464b9cab40ded1e78bc474a
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                    Jul 3, 2024 17:38:17.671854973 CEST127OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Jul 3, 2024 17:38:17.774383068 CEST320INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:17 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: f50e86e042aa8eadb9171762a4238c0b
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                    Jul 3, 2024 17:38:18.549583912 CEST127OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Jul 3, 2024 17:38:18.651623011 CEST320INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:18 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: e3dd1055b6d8b8d95c2245c8c6e7b781
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    4192.168.2.1049717193.122.130.0807436C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe
                    TimestampBytes transferredDirectionData
                    Jul 3, 2024 17:38:17.839703083 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Jul 3, 2024 17:38:18.315993071 CEST320INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:18 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: 1b7c53451fdf3ba08450ffa0a98ac4c8
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    5192.168.2.1049720193.122.130.0807436C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe
                    TimestampBytes transferredDirectionData
                    Jul 3, 2024 17:38:19.039724112 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Jul 3, 2024 17:38:19.520874977 CEST320INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:19 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: d3ea356a4c6fc3c3ae740b8b465d88a2
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    6192.168.2.1049721193.122.130.0808164C:\Users\user\AppData\Roaming\lmUupyodsah.exe
                    TimestampBytes transferredDirectionData
                    Jul 3, 2024 17:38:19.289755106 CEST127OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Jul 3, 2024 17:38:19.764913082 CEST320INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:19 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: e38f8634af40d6661f1de52bc8c09167
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    7192.168.2.1049724193.122.130.0807436C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe
                    TimestampBytes transferredDirectionData
                    Jul 3, 2024 17:38:20.135329962 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Jul 3, 2024 17:38:20.604667902 CEST320INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:20 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: 61eb227a5f40684c7c98e0a529a40799
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    8192.168.2.1049725193.122.130.0808164C:\Users\user\AppData\Roaming\lmUupyodsah.exe
                    TimestampBytes transferredDirectionData
                    Jul 3, 2024 17:38:20.384239912 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Jul 3, 2024 17:38:20.866614103 CEST320INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:20 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: a5908787706b0b991e3f5a6654be8edd
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    9192.168.2.1049728193.122.130.0807436C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe
                    TimestampBytes transferredDirectionData
                    Jul 3, 2024 17:38:21.241595984 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Jul 3, 2024 17:38:21.701400042 CEST320INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:21 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: 7055a34d25738bed39fe80e34cab1b0d
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    10192.168.2.1049729193.122.130.0808164C:\Users\user\AppData\Roaming\lmUupyodsah.exe
                    TimestampBytes transferredDirectionData
                    Jul 3, 2024 17:38:21.521800995 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Jul 3, 2024 17:38:21.981581926 CEST320INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:21 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: 812cbfdea61be52e72cffac1b597fe33
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    11192.168.2.1049732193.122.130.0808164C:\Users\user\AppData\Roaming\lmUupyodsah.exe
                    TimestampBytes transferredDirectionData
                    Jul 3, 2024 17:38:22.611088037 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Jul 3, 2024 17:38:23.164043903 CEST320INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:23 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: e79b385cb50ee154e552fab39bf5b9e0
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    12192.168.2.1049734193.122.130.0808164C:\Users\user\AppData\Roaming\lmUupyodsah.exe
                    TimestampBytes transferredDirectionData
                    Jul 3, 2024 17:38:23.782886028 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Jul 3, 2024 17:38:24.251707077 CEST320INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:24 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: a7b0a7c803a7310c0f918fe0e2a43e5c
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    13192.168.2.1049736193.122.130.0808164C:\Users\user\AppData\Roaming\lmUupyodsah.exe
                    TimestampBytes transferredDirectionData
                    Jul 3, 2024 17:38:24.879240036 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Jul 3, 2024 17:38:25.335912943 CEST320INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:25 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: 2e380c43b0a9f4f3823a094912f3c20c
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.1049707188.114.96.34437436C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe
                    TimestampBytes transferredDirectionData
                    2024-07-03 15:38:14 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-07-03 15:38:14 UTC710INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:14 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 33718
                    Last-Modified: Wed, 03 Jul 2024 06:16:16 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2s8s9cPtiHTzqQfREwnsK3boajBwy9QP8yMoMBw7JPdRpOX4IMfaZeYX3LPAylzkB4YYyvZoMKWhERiuM40ysjE4%2BR80xgqUv%2F5TB3WyhvBieQSGK4lSDY%2F%2BN1jJgESKYDiEqK%2FH"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89d7f621ef692363-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-03 15:38:14 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-03 15:38:14 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.1049708188.114.96.34437436C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe
                    TimestampBytes transferredDirectionData
                    2024-07-03 15:38:15 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    2024-07-03 15:38:15 UTC710INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:15 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 33719
                    Last-Modified: Wed, 03 Jul 2024 06:16:16 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=asMQ%2FRA8PZm6VCoAqr7VdoMw00OxA2kjBdLGGq1xcIFHqvC2BMcacEnTaNS1yYL%2BEB0xyGfR60vkpwQ0GkfBqU%2Ba5GcyR4p%2B%2FyDeDigrPiQOD0wVvRRXYUPFa1mvEBK4pqp6goVV"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89d7f626cf5a4262-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-03 15:38:15 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-03 15:38:15 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    2192.168.2.1049711188.114.96.34437436C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe
                    TimestampBytes transferredDirectionData
                    2024-07-03 15:38:16 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-07-03 15:38:16 UTC704INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:16 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 33720
                    Last-Modified: Wed, 03 Jul 2024 06:16:16 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cK9T2UUHlRxT1n3KOQMc02GhxitgvKCdVH%2F3DoW8wNlyf0PjHtakTyzSZnQPyFoJnoa3NmBZZicHDGau7GeHtX8ZitcbvbMHebQhYHfNF0%2BVqnTPR19hDdAHNVvlhoXeWGYGwX13"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89d7f62e1dfa728f-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-03 15:38:16 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-03 15:38:16 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    3192.168.2.1049715188.114.96.34437436C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe
                    TimestampBytes transferredDirectionData
                    2024-07-03 15:38:17 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-07-03 15:38:17 UTC710INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:17 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 33721
                    Last-Modified: Wed, 03 Jul 2024 06:16:16 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5B9SeEgABjbTAAaZoUzx59S%2Bf7t%2BOMieuA7%2Fah%2F5HjZ8vfvRV2IPbu87x1yyQ%2FmIon0efB4yBN7L0la4uTLJU3TMjUFOiHyk7oIehSFS6pZbtJVBildpHgvx9AbklcxTK2fIB5md"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89d7f6351b4a430e-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-03 15:38:17 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-03 15:38:17 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    4192.168.2.1049716188.114.96.34438164C:\Users\user\AppData\Roaming\lmUupyodsah.exe
                    TimestampBytes transferredDirectionData
                    2024-07-03 15:38:18 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-07-03 15:38:18 UTC712INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:18 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 33722
                    Last-Modified: Wed, 03 Jul 2024 06:16:16 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=AirsUKX%2BP2%2BZAsOvPfe0m02yy%2FrEayCt5Foh0Y9Rj0sDotoo6pGjUDpl9nQfJSs9I28%2FQDD2ED%2BOpAi8s0AIWBF6mZ51KCkjzvXNBdiQWcs7RS%2BvmBihDzCknENSTlyJNBJRv4uv"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89d7f6395ec84400-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-03 15:38:18 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-03 15:38:18 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    5192.168.2.1049718188.114.96.34437436C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe
                    TimestampBytes transferredDirectionData
                    2024-07-03 15:38:18 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-07-03 15:38:18 UTC712INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:18 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 33722
                    Last-Modified: Wed, 03 Jul 2024 06:16:16 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=clS4%2BFyY1uyyBsalCs48CmCHa%2Bq170Pj4Gel6GmgMRXJ8%2F1J3AiVGYP1UqMqlcA%2F9f86syu%2FcYaHuI5JIeSEPwmGsVkooTtupVVsOANc7L8r%2FDeXaC7sI2cC5UkswIoPvs1HeVdo"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89d7f63bee74c356-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-03 15:38:18 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-03 15:38:18 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    6192.168.2.1049719188.114.96.34438164C:\Users\user\AppData\Roaming\lmUupyodsah.exe
                    TimestampBytes transferredDirectionData
                    2024-07-03 15:38:19 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    2024-07-03 15:38:19 UTC708INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:19 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 33723
                    Last-Modified: Wed, 03 Jul 2024 06:16:16 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Bhirqg175DofDC%2FQWg4wB9dHtJZp8X4hMq%2F94BxpmM%2BH1iGEUHWCe3zgj8KCYhQiH3vByuHOsaFfyAkSvejpHBSs7PsDfiQpyvVakdS7vOtFEyInRkQnEPF%2FUZXqrx8CUvILtOHS"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89d7f63e1c4717e5-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-03 15:38:19 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-03 15:38:19 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    7192.168.2.1049722188.114.96.34437436C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe
                    TimestampBytes transferredDirectionData
                    2024-07-03 15:38:19 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-07-03 15:38:20 UTC708INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:20 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 33724
                    Last-Modified: Wed, 03 Jul 2024 06:16:16 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nwU9oppwFU%2BcqwA4fTTgLgsVCih5Pfl4fl0CIju7PXOotjCQ64v70rkGl7aK5TDqfc9ENOr3nvk%2BA3dnkPHrElTL%2FiyKwC%2F2nziT8Cb1mNXe3791cqFJGRlcXeyRFmmcYW4toqdS"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89d7f6436fdb7cff-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-03 15:38:20 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-03 15:38:20 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    8192.168.2.1049723188.114.96.34438164C:\Users\user\AppData\Roaming\lmUupyodsah.exe
                    TimestampBytes transferredDirectionData
                    2024-07-03 15:38:20 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    2024-07-03 15:38:20 UTC712INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:20 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 33724
                    Last-Modified: Wed, 03 Jul 2024 06:16:16 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=99vcVRnL7TV6MGULfLPV96cM%2FAXXW1oUtyRRDUsfBPI22WPM1KnoQwVSYJjwcUp6bfSMEFNaJEOY%2BMZsaWmIlPFe8%2FAfi9BpnA%2BZ798pQ95cmn%2FRLrI3nVNvEcQJDUl4ebmh%2F1iG"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89d7f644fc0f4245-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-03 15:38:20 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-03 15:38:20 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    9192.168.2.1049726188.114.96.34437436C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe
                    TimestampBytes transferredDirectionData
                    2024-07-03 15:38:21 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    2024-07-03 15:38:21 UTC712INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:21 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 33725
                    Last-Modified: Wed, 03 Jul 2024 06:16:16 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KE6%2Bvc5j1WBnN74ZFHj%2BH4bCW2GoC3KzvLy87GCRczTzJXiHvzb7iHxLnmLS98Fna8oqJIvnXE29MdZ8lnXXQvS8Cpy9rTSW6QxithKcZSyVL5%2BD1P%2FOb%2B%2BA6AkkvlDh2KGa7ddJ"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89d7f64a38ba8c30-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-03 15:38:21 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-03 15:38:21 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    10192.168.2.1049727188.114.96.34438164C:\Users\user\AppData\Roaming\lmUupyodsah.exe
                    TimestampBytes transferredDirectionData
                    2024-07-03 15:38:21 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-07-03 15:38:21 UTC712INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:21 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 33725
                    Last-Modified: Wed, 03 Jul 2024 06:16:16 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=k8yDZ%2BPB3896Gx%2FUnEH%2FuEjxHjQk6YvdP6Z8DMJZc%2BXhQQkAdJb%2FkXIZZXyCOpWKGN1qEEsnmERLXa79cXihQoY8etCGdOUADijup3tno1JBJUv7JMm%2BcYyZuuPhuhBy2SbwBDkK"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89d7f64bf849430e-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-03 15:38:21 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-03 15:38:21 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    11192.168.2.1049730188.114.96.34437436C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe
                    TimestampBytes transferredDirectionData
                    2024-07-03 15:38:22 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-07-03 15:38:22 UTC708INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:22 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 33726
                    Last-Modified: Wed, 03 Jul 2024 06:16:16 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TLXVAH4KxUYEvZtnDv1EuETa4scu%2FRWWJ0gsk8otUZv%2FMn92WbhDeEZVNm2RDsdq6Vww1zsd7%2Bf%2F6xnbVI2t2z0VRA47bwtmyKeAsueE5uaCtmjT4AjsGo9nkT2998QTXeIuI67D"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89d7f6512af1432e-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-03 15:38:22 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-03 15:38:22 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    12192.168.2.1049731188.114.96.34438164C:\Users\user\AppData\Roaming\lmUupyodsah.exe
                    TimestampBytes transferredDirectionData
                    2024-07-03 15:38:22 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-07-03 15:38:22 UTC712INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:22 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 33726
                    Last-Modified: Wed, 03 Jul 2024 06:16:16 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zCoktqrRAB1Jgi6NagxFu0cqF%2BtU0%2Fgze6Fiut4QEMTn0vNvFOGWbwiA5Bs63MQdPHDh%2BljeeOrArMh%2FTZMMtRQ8qe70d7BX30CRj9XEp5BMMfXemmhg50RD%2BDkyd7Ph%2FSoVYfiq"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89d7f652dfe543ef-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-03 15:38:22 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-03 15:38:22 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    13192.168.2.1049733188.114.96.34438164C:\Users\user\AppData\Roaming\lmUupyodsah.exe
                    TimestampBytes transferredDirectionData
                    2024-07-03 15:38:23 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-07-03 15:38:23 UTC704INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:23 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 33727
                    Last-Modified: Wed, 03 Jul 2024 06:16:16 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BhfNiUYvGsi9Q0GhxSwoDm9WEe0FQE3Vko54AHuNa909GBksYz9vmUizFE6ahRXD4PaNx9SkFuID6VoWLlsk%2FbZM0W4NoWdxc40YGIXd1PfVujfLE4etw1PXWWNMIYczf9v89cjB"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89d7f65a2a6d4237-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-03 15:38:23 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-03 15:38:23 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    14192.168.2.1049735188.114.96.34438164C:\Users\user\AppData\Roaming\lmUupyodsah.exe
                    TimestampBytes transferredDirectionData
                    2024-07-03 15:38:24 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-07-03 15:38:24 UTC708INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:24 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 33728
                    Last-Modified: Wed, 03 Jul 2024 06:16:16 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3mRkdU%2BgqTa1H2iCCVO%2FEXYfIcMlrvnN5kM72eDQwRR7iR4%2FXKt7Q8dm1HGfPteq4d9bpR02rnU2xD4HLbOb5NYKbA6zGViprRLy4%2FXmPTo6ET2TgGrVFvjRCwxCxUBZ6OFtQrZc"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89d7f66119194307-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-03 15:38:24 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-03 15:38:24 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    15192.168.2.1049737188.114.96.34438164C:\Users\user\AppData\Roaming\lmUupyodsah.exe
                    TimestampBytes transferredDirectionData
                    2024-07-03 15:38:25 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-07-03 15:38:25 UTC704INHTTP/1.1 200 OK
                    Date: Wed, 03 Jul 2024 15:38:25 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 33729
                    Last-Modified: Wed, 03 Jul 2024 06:16:16 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bvIecBCwn45ispSfdH6AeRAM55rAjKtGSZi73hJzWeNPyQLcqOa2M1pzsnxjmGyq%2BQ9Q1Rzz%2Fg2KAnpX15pDWHfsemxmaafNSGJ2Uf1E97pC5v7CStgx6svq12aVDULwPS7sfNDP"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 89d7f667ba4d0f8b-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-03 15:38:25 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-07-03 15:38:25 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:11:38:10
                    Start date:03/07/2024
                    Path:C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe"
                    Imagebase:0x90000
                    File size:846'336 bytes
                    MD5 hash:68BCD11DA168BCD33C61ADFE6CF8B2B3
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1385448550.00000000034DD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.1385448550.00000000034DD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1385448550.00000000034DD000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.1385448550.00000000034DD000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    Reputation:low
                    Has exited:true

                    Target ID:3
                    Start time:11:38:11
                    Start date:03/07/2024
                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe"
                    Imagebase:0xfd0000
                    File size:433'152 bytes
                    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:4
                    Start time:11:38:11
                    Start date:03/07/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff620390000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:5
                    Start time:11:38:11
                    Start date:03/07/2024
                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lmUupyodsah.exe"
                    Imagebase:0xfd0000
                    File size:433'152 bytes
                    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:6
                    Start time:11:38:11
                    Start date:03/07/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff620390000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:7
                    Start time:11:38:11
                    Start date:03/07/2024
                    Path:C:\Windows\SysWOW64\schtasks.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lmUupyodsah" /XML "C:\Users\user\AppData\Local\Temp\tmp38C0.tmp"
                    Imagebase:0x6c0000
                    File size:187'904 bytes
                    MD5 hash:48C2FE20575769DE916F48EF0676A965
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:8
                    Start time:11:38:11
                    Start date:03/07/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff620390000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:9
                    Start time:11:38:12
                    Start date:03/07/2024
                    Path:C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\RFQ 20726 - T5 7841.exe"
                    Imagebase:0x820000
                    File size:846'336 bytes
                    MD5 hash:68BCD11DA168BCD33C61ADFE6CF8B2B3
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000009.00000002.3812859081.000000000040A000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000009.00000002.3815453085.0000000002D14000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000009.00000002.3815453085.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:false

                    Target ID:10
                    Start time:11:38:13
                    Start date:03/07/2024
                    Path:C:\Users\user\AppData\Roaming\lmUupyodsah.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Roaming\lmUupyodsah.exe
                    Imagebase:0x40000
                    File size:846'336 bytes
                    MD5 hash:68BCD11DA168BCD33C61ADFE6CF8B2B3
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.1430038668.000000000353C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000A.00000002.1430038668.000000000353C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 0000000A.00000002.1430038668.000000000353C000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 0000000A.00000002.1430038668.000000000353C000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    Antivirus matches:
                    • Detection: 100%, Avira
                    • Detection: 100%, Joe Sandbox ML
                    • Detection: 34%, ReversingLabs
                    Reputation:low
                    Has exited:true

                    Target ID:11
                    Start time:11:38:14
                    Start date:03/07/2024
                    Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Imagebase:0x7ff6616b0000
                    File size:496'640 bytes
                    MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                    Has elevated privileges:true
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:12
                    Start time:11:38:16
                    Start date:03/07/2024
                    Path:C:\Windows\SysWOW64\schtasks.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lmUupyodsah" /XML "C:\Users\user\AppData\Local\Temp\tmp490C.tmp"
                    Imagebase:0x6c0000
                    File size:187'904 bytes
                    MD5 hash:48C2FE20575769DE916F48EF0676A965
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:13
                    Start time:11:38:16
                    Start date:03/07/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff620390000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:14
                    Start time:11:38:16
                    Start date:03/07/2024
                    Path:C:\Users\user\AppData\Roaming\lmUupyodsah.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Users\user\AppData\Roaming\lmUupyodsah.exe"
                    Imagebase:0x270000
                    File size:846'336 bytes
                    MD5 hash:68BCD11DA168BCD33C61ADFE6CF8B2B3
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:true

                    Target ID:15
                    Start time:11:38:16
                    Start date:03/07/2024
                    Path:C:\Users\user\AppData\Roaming\lmUupyodsah.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\lmUupyodsah.exe"
                    Imagebase:0x990000
                    File size:846'336 bytes
                    MD5 hash:68BCD11DA168BCD33C61ADFE6CF8B2B3
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000F.00000002.3812867070.000000000041B000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 0000000F.00000002.3812867070.000000000041B000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000F.00000002.3815610243.0000000002F7F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000F.00000002.3815610243.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:false

                    Reset < >

                      Execution Graph

                      Execution Coverage:12.7%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:184
                      Total number of Limit Nodes:5
                      execution_graph 41935 22c4668 41936 22c4672 41935->41936 41938 22c4758 41935->41938 41939 22c477d 41938->41939 41943 22c4868 41939->41943 41947 22c4859 41939->41947 41944 22c488f 41943->41944 41945 22c496c 41944->41945 41951 22c44e0 41944->41951 41945->41945 41948 22c488f 41947->41948 41949 22c44e0 CreateActCtxA 41948->41949 41950 22c496c 41948->41950 41949->41950 41952 22c58f8 CreateActCtxA 41951->41952 41954 22c59bb 41952->41954 41955 22cd378 41956 22cd3be 41955->41956 41960 22cd558 41956->41960 41963 22cd547 41956->41963 41957 22cd4ab 41961 22cd586 41960->41961 41966 22cb6d0 41960->41966 41961->41957 41964 22cb6d0 DuplicateHandle 41963->41964 41965 22cd586 41964->41965 41965->41957 41967 22cd5c0 DuplicateHandle 41966->41967 41968 22cd656 41967->41968 41968->41961 42008 44941ac 42009 4493f91 42008->42009 42010 4494029 42009->42010 42013 4497038 42009->42013 42019 449702a 42009->42019 42014 449704d 42013->42014 42025 4497078 42014->42025 42039 44970d6 42014->42039 42054 449706a 42014->42054 42015 449705f 42015->42010 42020 449704d 42019->42020 42022 4497078 12 API calls 42020->42022 42023 449706a 12 API calls 42020->42023 42024 44970d6 12 API calls 42020->42024 42021 449705f 42021->42010 42022->42021 42023->42021 42024->42021 42026 4497092 42025->42026 42027 44970b6 42026->42027 42068 4497507 42026->42068 42072 44977c4 42026->42072 42077 449780b 42026->42077 42082 449772b 42026->42082 42087 4497aa9 42026->42087 42091 44975b6 42026->42091 42096 4497497 42026->42096 42100 44978b3 42026->42100 42105 4497591 42026->42105 42110 44975bf 42026->42110 42115 4497627 42026->42115 42027->42015 42040 4497064 42039->42040 42041 44970d9 42039->42041 42042 44970b6 42040->42042 42043 4497aa9 2 API calls 42040->42043 42044 449772b 2 API calls 42040->42044 42045 449780b 2 API calls 42040->42045 42046 44977c4 2 API calls 42040->42046 42047 4497507 2 API calls 42040->42047 42048 4497627 2 API calls 42040->42048 42049 44975bf 2 API calls 42040->42049 42050 4497591 2 API calls 42040->42050 42051 44978b3 2 API calls 42040->42051 42052 4497497 2 API calls 42040->42052 42053 44975b6 2 API calls 42040->42053 42041->42015 42042->42015 42043->42042 42044->42042 42045->42042 42046->42042 42047->42042 42048->42042 42049->42042 42050->42042 42051->42042 42052->42042 42053->42042 42055 4497092 42054->42055 42056 4497aa9 2 API calls 42055->42056 42057 449772b 2 API calls 42055->42057 42058 449780b 2 API calls 42055->42058 42059 44970b6 42055->42059 42060 44977c4 2 API calls 42055->42060 42061 4497507 2 API calls 42055->42061 42062 4497627 2 API calls 42055->42062 42063 44975bf 2 API calls 42055->42063 42064 4497591 2 API calls 42055->42064 42065 44978b3 2 API calls 42055->42065 42066 4497497 2 API calls 42055->42066 42067 44975b6 2 API calls 42055->42067 42056->42059 42057->42059 42058->42059 42059->42015 42060->42059 42061->42059 42062->42059 42063->42059 42064->42059 42065->42059 42066->42059 42067->42059 42120 44938f8 42068->42120 42124 44938f1 42068->42124 42069 449752b 42069->42027 42073 4497735 42072->42073 42074 4497757 42073->42074 42128 44939e8 42073->42128 42132 44939e1 42073->42132 42074->42027 42078 4497818 42077->42078 42136 4493278 42078->42136 42140 4493271 42078->42140 42079 44978e6 42079->42027 42079->42079 42083 4497734 42082->42083 42085 44939e8 ReadProcessMemory 42083->42085 42086 44939e1 ReadProcessMemory 42083->42086 42084 4497757 42084->42027 42085->42084 42086->42084 42145 4493328 42087->42145 42149 4493321 42087->42149 42088 4497ac3 42092 44975f3 42091->42092 42153 4493838 42092->42153 42157 4493830 42092->42157 42093 4497611 42162 4493b80 42096->42162 42166 4493b75 42096->42166 42101 44978b9 42100->42101 42103 4493278 ResumeThread 42101->42103 42104 4493271 ResumeThread 42101->42104 42102 44978e6 42102->42027 42102->42102 42103->42102 42104->42102 42106 44975b0 42105->42106 42108 44938f8 WriteProcessMemory 42106->42108 42109 44938f1 WriteProcessMemory 42106->42109 42107 44974ef 42107->42027 42108->42107 42109->42107 42111 44975ca 42110->42111 42113 44938f8 WriteProcessMemory 42111->42113 42114 44938f1 WriteProcessMemory 42111->42114 42112 4497c4d 42113->42112 42114->42112 42116 4497ae2 42115->42116 42118 4493328 Wow64SetThreadContext 42116->42118 42119 4493321 Wow64SetThreadContext 42116->42119 42117 4497afd 42118->42117 42119->42117 42121 4493940 WriteProcessMemory 42120->42121 42123 4493997 42121->42123 42123->42069 42125 44938f7 WriteProcessMemory 42124->42125 42127 4493997 42125->42127 42127->42069 42129 4493a2e ReadProcessMemory 42128->42129 42131 4493a77 42129->42131 42131->42074 42133 44939e7 ReadProcessMemory 42132->42133 42135 4493a77 42133->42135 42135->42074 42137 44932b8 ResumeThread 42136->42137 42139 44932e9 42137->42139 42139->42079 42141 44932be ResumeThread 42140->42141 42142 4493277 ResumeThread 42140->42142 42143 44932e9 42141->42143 42142->42143 42143->42079 42146 449336d Wow64SetThreadContext 42145->42146 42148 44933b5 42146->42148 42148->42088 42150 4493327 Wow64SetThreadContext 42149->42150 42152 44933b5 42150->42152 42152->42088 42154 4493878 VirtualAllocEx 42153->42154 42156 44938b5 42154->42156 42156->42093 42158 449387e VirtualAllocEx 42157->42158 42159 4493837 VirtualAllocEx 42157->42159 42160 44938b5 42158->42160 42159->42160 42160->42093 42163 4493c09 CreateProcessA 42162->42163 42165 4493dcb 42163->42165 42165->42165 42167 4493c09 CreateProcessA 42166->42167 42169 4493dcb 42167->42169 42169->42169 41928 4498270 41929 44983fb 41928->41929 41930 4498291 41928->41930 41930->41929 41932 4494ac0 41930->41932 41933 44984f0 PostMessageW 41932->41933 41934 449855c 41933->41934 41934->41930 41969 22cabf0 41973 22cace8 41969->41973 41982 22cacd9 41969->41982 41970 22cabff 41974 22cacf9 41973->41974 41975 22cad1c 41973->41975 41974->41975 41991 22cafd4 41974->41991 41996 22caf80 41974->41996 42000 22caf70 41974->42000 41975->41970 41976 22cad14 41976->41975 41977 22caf20 GetModuleHandleW 41976->41977 41978 22caf4d 41977->41978 41978->41970 41983 22cacf9 41982->41983 41985 22cad1c 41982->41985 41983->41985 41988 22cafd4 LoadLibraryExW 41983->41988 41989 22caf70 LoadLibraryExW 41983->41989 41990 22caf80 LoadLibraryExW 41983->41990 41984 22cad14 41984->41985 41986 22caf20 GetModuleHandleW 41984->41986 41985->41970 41987 22caf4d 41986->41987 41987->41970 41988->41984 41989->41984 41990->41984 41993 22caf79 41991->41993 41994 22cafda 41991->41994 41992 22cafb9 41992->41976 41993->41992 42004 22ca0a8 41993->42004 41997 22caf94 41996->41997 41998 22cafb9 41997->41998 41999 22ca0a8 LoadLibraryExW 41997->41999 41998->41976 41999->41998 42001 22caf94 42000->42001 42002 22cafb9 42001->42002 42003 22ca0a8 LoadLibraryExW 42001->42003 42002->41976 42003->42002 42005 22cb160 LoadLibraryExW 42004->42005 42007 22cb1d9 42005->42007 42007->41992
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID: !Y3E
                      • API String ID: 0-2826621527
                      • Opcode ID: 38cf15410caa87adbc09ccc1b2239d680ce68ebc06dc64f7af5cd165033362da
                      • Instruction ID: 259970fd5b6a5340d2c8a1a2ed37afb35fa1e353c5a04c4acbd4e5e056eaff85
                      • Opcode Fuzzy Hash: 38cf15410caa87adbc09ccc1b2239d680ce68ebc06dc64f7af5cd165033362da
                      • Instruction Fuzzy Hash: 53A18F74B502048FEB88AB79C85476E77F7BB99701F208069E80AEB794DA74DC018B51
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID: T(z
                      • API String ID: 0-3184255237
                      • Opcode ID: 3daf69c385871029014e7c5985b31b0de4108cd2e4f19722c57452ec5d04d7d8
                      • Instruction ID: 7e2f392aba2e00730d244ae938b0787667d279c126c5230dd03caa46d863047c
                      • Opcode Fuzzy Hash: 3daf69c385871029014e7c5985b31b0de4108cd2e4f19722c57452ec5d04d7d8
                      • Instruction Fuzzy Hash: 1C416AF1F143188BFB889AB584507BFBBBBABC9200F14C53BD456AB780DA708D018B51
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID: T(z
                      • API String ID: 0-3184255237
                      • Opcode ID: 64ccd60325907dfc00aeab7250a7eba25f3c0e2a028b6dc2b80b65bb1ab0d90b
                      • Instruction ID: f1ac187a71ef45188949e1cd452d3075e1c8d2f75f719ea2b2ef189d30e8ac49
                      • Opcode Fuzzy Hash: 64ccd60325907dfc00aeab7250a7eba25f3c0e2a028b6dc2b80b65bb1ab0d90b
                      • Instruction Fuzzy Hash: 7F417CF1F10318CBFB889AB585507BFB6ABABC9600F14C537D45ABB740DA708D018B51
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e5ce93876ad22daf294eb7519c04cc6beebe52d72ad452d0b5d7b26096fd74c5
                      • Instruction ID: 21a414333641d93e9c8aceb835a297784ead751f99be965342ff9984eea7e493
                      • Opcode Fuzzy Hash: e5ce93876ad22daf294eb7519c04cc6beebe52d72ad452d0b5d7b26096fd74c5
                      • Instruction Fuzzy Hash: E212B775D1061ACFCB15DF68C880AD9F7B1BF59300F15C6AAD859AB251EB70AAC4CF80
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3b6d5f5ff5b349020c9752c8b6aa5cfedeca8708ddbf0abb9c0bf0ab8fc27187
                      • Instruction ID: 52cb628fad8c3dde6908bb5bffcbae5f1abce9a9444ca03b896ebaf8bb45772c
                      • Opcode Fuzzy Hash: 3b6d5f5ff5b349020c9752c8b6aa5cfedeca8708ddbf0abb9c0bf0ab8fc27187
                      • Instruction Fuzzy Hash: 0412B875D0071A8FCB15DF68C880AD9F7B1BF59310F15C6AAD858AB251EB70AAC5CF80
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1d29e00627712b5f8531e346441cf5f22605acec228a7e7a49494bd40213e0ad
                      • Instruction ID: bc8353c75e558357385719cfd02c08a52ecc0df63bb20edaa4367bd89f69f083
                      • Opcode Fuzzy Hash: 1d29e00627712b5f8531e346441cf5f22605acec228a7e7a49494bd40213e0ad
                      • Instruction Fuzzy Hash: 92A18D74B502048FEB84AFB8D85476E77F7FB99701F208069E90AEB794DA74DC018B91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c1946c7638fe10e8878ddb08fe329ea6a5606a8814100d6efb2ee6d46bf00f29
                      • Instruction ID: c226cb607327b249fb89c7b867919d47d953b77a1d9491e73425f559822d9824
                      • Opcode Fuzzy Hash: c1946c7638fe10e8878ddb08fe329ea6a5606a8814100d6efb2ee6d46bf00f29
                      • Instruction Fuzzy Hash: 6491F4F1615342CFEB459F34D48449ABFBAFB86300B564497C88A9F652C334E885CBC6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 50efb75c6a617517c5b68d20d1f8933c04bf0b784658f75fd2e474a3ba2b2c3f
                      • Instruction ID: 901b03827385e6fdb57eb678669f44ed7c0111df04be58e1fae7c9bd7e699646
                      • Opcode Fuzzy Hash: 50efb75c6a617517c5b68d20d1f8933c04bf0b784658f75fd2e474a3ba2b2c3f
                      • Instruction Fuzzy Hash: BB8139F1A1538A8FEB85DB78C8045AEBFB6FF86300F19815BD4469B252C7348D46CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5a1a81cd6b04e04ba85971f545f1566a792eb647117c82e9e5ce82ecbcb7e630
                      • Instruction ID: 044a6c4f44cc9245a2d3dc674818efe66e4e5df7391cf20640fb63605a641795
                      • Opcode Fuzzy Hash: 5a1a81cd6b04e04ba85971f545f1566a792eb647117c82e9e5ce82ecbcb7e630
                      • Instruction Fuzzy Hash: A3615BF2B1528A8FEB459B7888045AEBFB6FF86300F19415BD846DB252C7348D46CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 76b5df0c45387b0e488f7331710619d5a63aacf58eb7f1025cf07b3a822d8c18
                      • Instruction ID: ce7a88e692eae05555cad2b63466585219aab8845c29bd8cd999497cd1925230
                      • Opcode Fuzzy Hash: 76b5df0c45387b0e488f7331710619d5a63aacf58eb7f1025cf07b3a822d8c18
                      • Instruction Fuzzy Hash: 24618CF1B1538A8FEB459B7488045AEBFB6FF86300F28415BD846DB652C7318D46CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6bf2901e20ae5c9e70c3bf36e60ab75a20e1c14f25e65d92c4b65402e34ca937
                      • Instruction ID: 20bd6b431128e0d09a968c99763f89ca3f6fba9c1c7c5832782cca3c2c6c9a45
                      • Opcode Fuzzy Hash: 6bf2901e20ae5c9e70c3bf36e60ab75a20e1c14f25e65d92c4b65402e34ca937
                      • Instruction Fuzzy Hash: CA619FF1625202CFE784EF28C98046A7BFAFB85300B528457D84ADF652D734ED41CB96
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e9892d3e29459fdc07d7a525dce4b6885213bd2630cb99adf31460ff40d92f99
                      • Instruction ID: a5c3882ed3eb727744c619abdada6226a095e502ef722662918ba4ccf25ee009
                      • Opcode Fuzzy Hash: e9892d3e29459fdc07d7a525dce4b6885213bd2630cb99adf31460ff40d92f99
                      • Instruction Fuzzy Hash: 14519C74B412049FEB58AF74D855B6EBAB2FB88701F208429E906AB790CA75DC418B50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d59b6246aa8bb1445fc880375e62d446c948d4f2e6b7b4020ad723cef4ba473c
                      • Instruction ID: bacf4b997ca9d0caaca1efba62e6d78e034117d2ddcb8813f1f2b4dc801f8371
                      • Opcode Fuzzy Hash: d59b6246aa8bb1445fc880375e62d446c948d4f2e6b7b4020ad723cef4ba473c
                      • Instruction Fuzzy Hash: 885106F1B246058FE7C8EE68C98165BF76AFB86210F50C526D51EDBA00C770DA19C791
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2f715104d0073ad0f4362ad3fbe40978c6fd7b60b91b65e9d3b19f899ec60e0b
                      • Instruction ID: 8bae27d21c9242c730c2e18d4e246ccf26e545a0087a84f49c55ab7093c85d24
                      • Opcode Fuzzy Hash: 2f715104d0073ad0f4362ad3fbe40978c6fd7b60b91b65e9d3b19f899ec60e0b
                      • Instruction Fuzzy Hash: 644117B1B111188FEB48DBA8C84567EB7F6FF89310F25452EE906EB750CA359D02CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 06e59c20c1fd1ef006dc6ae3d2aa0b9b8687ad82f4379df967bf047eafcfda4d
                      • Instruction ID: 1b435115287a992396428a77b9998fa6cd624cb05dd33bfb8d14b469affabe36
                      • Opcode Fuzzy Hash: 06e59c20c1fd1ef006dc6ae3d2aa0b9b8687ad82f4379df967bf047eafcfda4d
                      • Instruction Fuzzy Hash: 7541D6F1A14319DFE784EFB4D5405BEBBBAEF89200F10445BE449EB660D632DD418B51
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e574696328f5753f077fcbd2c38ad7381d0e084d9a86b2087585f810d23b1385
                      • Instruction ID: 0b39f41bae73caf11ea72382ba392bf6ebe40d6dab04aeb62e07d59b1ba7c2b4
                      • Opcode Fuzzy Hash: e574696328f5753f077fcbd2c38ad7381d0e084d9a86b2087585f810d23b1385
                      • Instruction Fuzzy Hash: 2241E4F5B193198FD748DA95D4804AEBBFAFB99200F1181ABE509EB391C374CE02CB51
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d11609febb9b9981a013cd71b672b439984db90caf55a70af2933cd2cfa4d1dd
                      • Instruction ID: 4b4bab3b6c48b481ec2a325cf75703fafd976f6ba5c400ad0d40098bbceab99a
                      • Opcode Fuzzy Hash: d11609febb9b9981a013cd71b672b439984db90caf55a70af2933cd2cfa4d1dd
                      • Instruction Fuzzy Hash: 724128F1B10219DBEB84EFB8D5405BEFBBAEF89200F50441BE409EB660D632ED018B51
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bbc96b6dd3eb6390c7d53284d1038cf710181e54b27a96d212a2cb17ffcce261
                      • Instruction ID: 716ed4d655cd51414ad4b868c1ee1e10786e73897cc25ba2dba6151876d48c01
                      • Opcode Fuzzy Hash: bbc96b6dd3eb6390c7d53284d1038cf710181e54b27a96d212a2cb17ffcce261
                      • Instruction Fuzzy Hash: 1BD04274A5A204CFCF208F50D4445F8BBF8EB1A311F04A096D40BA3212E734AE82EF45
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 745f413a2400f893b41c72fce634ade7defa0bc9b1b289b43674b29b3ee43e49
                      • Instruction ID: 3b9c0559fc8e20faa85eeadb5c810c551d5a39584a46c7003913866dcaceb928
                      • Opcode Fuzzy Hash: 745f413a2400f893b41c72fce634ade7defa0bc9b1b289b43674b29b3ee43e49
                      • Instruction Fuzzy Hash: DBB00901BAE009C8EC25085028152F599ECAA0B049A48B453985B7260AA208EE267659

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 4493b75-4493c15 2 4493c4e-4493c6e 0->2 3 4493c17-4493c21 0->3 10 4493c70-4493c7a 2->10 11 4493ca7-4493cd6 2->11 3->2 4 4493c23-4493c25 3->4 5 4493c48-4493c4b 4->5 6 4493c27-4493c31 4->6 5->2 8 4493c33 6->8 9 4493c35-4493c44 6->9 8->9 9->9 12 4493c46 9->12 10->11 13 4493c7c-4493c7e 10->13 17 4493cd8-4493ce2 11->17 18 4493d0f-4493dc9 CreateProcessA 11->18 12->5 15 4493ca1-4493ca4 13->15 16 4493c80-4493c8a 13->16 15->11 19 4493c8c 16->19 20 4493c8e-4493c9d 16->20 17->18 21 4493ce4-4493ce6 17->21 31 4493dcb-4493dd1 18->31 32 4493dd2-4493e58 18->32 19->20 20->20 22 4493c9f 20->22 23 4493d09-4493d0c 21->23 24 4493ce8-4493cf2 21->24 22->15 23->18 26 4493cf4 24->26 27 4493cf6-4493d05 24->27 26->27 27->27 28 4493d07 27->28 28->23 31->32 42 4493e68-4493e6c 32->42 43 4493e5a-4493e5e 32->43 45 4493e7c-4493e80 42->45 46 4493e6e-4493e72 42->46 43->42 44 4493e60 43->44 44->42 48 4493e90-4493e94 45->48 49 4493e82-4493e86 45->49 46->45 47 4493e74 46->47 47->45 51 4493ea6-4493ead 48->51 52 4493e96-4493e9c 48->52 49->48 50 4493e88 49->50 50->48 53 4493eaf-4493ebe 51->53 54 4493ec4 51->54 52->51 53->54 56 4493ec5 54->56 56->56
                      APIs
                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04493DB6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: d748d37d00a23f7cc8f60b9defb3f1d23573c3601ac152d53aa4e89bf524ce6e
                      • Instruction ID: 2f7334b96ca876d709abec152e1c6c4193005f086d7532bf3a89c528f9c71173
                      • Opcode Fuzzy Hash: d748d37d00a23f7cc8f60b9defb3f1d23573c3601ac152d53aa4e89bf524ce6e
                      • Instruction Fuzzy Hash: D7A13771D007199FEF20CF68C841BEEBBF2BB49314F15856AE809A7240DB74AD859F91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 57 4493b80-4493c15 59 4493c4e-4493c6e 57->59 60 4493c17-4493c21 57->60 67 4493c70-4493c7a 59->67 68 4493ca7-4493cd6 59->68 60->59 61 4493c23-4493c25 60->61 62 4493c48-4493c4b 61->62 63 4493c27-4493c31 61->63 62->59 65 4493c33 63->65 66 4493c35-4493c44 63->66 65->66 66->66 69 4493c46 66->69 67->68 70 4493c7c-4493c7e 67->70 74 4493cd8-4493ce2 68->74 75 4493d0f-4493dc9 CreateProcessA 68->75 69->62 72 4493ca1-4493ca4 70->72 73 4493c80-4493c8a 70->73 72->68 76 4493c8c 73->76 77 4493c8e-4493c9d 73->77 74->75 78 4493ce4-4493ce6 74->78 88 4493dcb-4493dd1 75->88 89 4493dd2-4493e58 75->89 76->77 77->77 79 4493c9f 77->79 80 4493d09-4493d0c 78->80 81 4493ce8-4493cf2 78->81 79->72 80->75 83 4493cf4 81->83 84 4493cf6-4493d05 81->84 83->84 84->84 85 4493d07 84->85 85->80 88->89 99 4493e68-4493e6c 89->99 100 4493e5a-4493e5e 89->100 102 4493e7c-4493e80 99->102 103 4493e6e-4493e72 99->103 100->99 101 4493e60 100->101 101->99 105 4493e90-4493e94 102->105 106 4493e82-4493e86 102->106 103->102 104 4493e74 103->104 104->102 108 4493ea6-4493ead 105->108 109 4493e96-4493e9c 105->109 106->105 107 4493e88 106->107 107->105 110 4493eaf-4493ebe 108->110 111 4493ec4 108->111 109->108 110->111 113 4493ec5 111->113 113->113
                      APIs
                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04493DB6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: a79dd6e08504d8953c47ad63a5f0b9d5fadf0ce497b339bcd05af7f5dfbdc16b
                      • Instruction ID: cfaeaee070a9060c6f0d1f4d4dfc86d82ca667bc6fe08a80ecf0f09179971295
                      • Opcode Fuzzy Hash: a79dd6e08504d8953c47ad63a5f0b9d5fadf0ce497b339bcd05af7f5dfbdc16b
                      • Instruction Fuzzy Hash: AC915971D007199FEF20CF68C841BEEBAF2BB49314F15856AE808A7240DB74AD85DF91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 114 22cace8-22cacf7 115 22cacf9-22cad06 call 22ca040 114->115 116 22cad23-22cad27 114->116 123 22cad1c 115->123 124 22cad08 115->124 118 22cad29-22cad33 116->118 119 22cad3b-22cad7c 116->119 118->119 125 22cad7e-22cad86 119->125 126 22cad89-22cad97 119->126 123->116 171 22cad0e call 22cafd4 124->171 172 22cad0e call 22caf70 124->172 173 22cad0e call 22caf80 124->173 125->126 127 22cad99-22cad9e 126->127 128 22cadbb-22cadbd 126->128 130 22cada9 127->130 131 22cada0-22cada7 call 22ca04c 127->131 133 22cadc0-22cadc7 128->133 129 22cad14-22cad16 129->123 132 22cae58-22caed4 129->132 135 22cadab-22cadb9 130->135 131->135 164 22caed6-22caefe 132->164 165 22caf00-22caf18 132->165 136 22cadc9-22cadd1 133->136 137 22cadd4-22caddb 133->137 135->133 136->137 138 22caddd-22cade5 137->138 139 22cade8-22cadf1 call 22ca05c 137->139 138->139 145 22cadfe-22cae03 139->145 146 22cadf3-22cadfb 139->146 147 22cae05-22cae0c 145->147 148 22cae21-22cae25 145->148 146->145 147->148 150 22cae0e-22cae1e call 22ca06c call 22ca07c 147->150 153 22cae2b-22cae2e 148->153 150->148 154 22cae30-22cae4e 153->154 155 22cae51-22cae57 153->155 154->155 164->165 166 22caf1a-22caf1d 165->166 167 22caf20-22caf4b GetModuleHandleW 165->167 166->167 168 22caf4d-22caf53 167->168 169 22caf54-22caf68 167->169 168->169 171->129 172->129 173->129
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 022CAF3E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1384344681.00000000022C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_22c0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: 6f2ab75408849d2df8dc27d4eb7cfb717708014c26b11f7e86a1cf628aee1fa9
                      • Instruction ID: 6baa9da0935496eb890b80200bb57d62b4442fe6f4ce21bb8ae4249b14ea8f0e
                      • Opcode Fuzzy Hash: 6f2ab75408849d2df8dc27d4eb7cfb717708014c26b11f7e86a1cf628aee1fa9
                      • Instruction Fuzzy Hash: DC815870A10B098FDB24DF69D04575ABBF1FF88304F208A2DD48ADBA44DB75E945CB90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 174 22c58ed-22c596c 175 22c596f-22c59b9 CreateActCtxA 174->175 177 22c59bb-22c59c1 175->177 178 22c59c2-22c5a1c 175->178 177->178 185 22c5a1e-22c5a21 178->185 186 22c5a2b-22c5a2f 178->186 185->186 187 22c5a40 186->187 188 22c5a31-22c5a3d 186->188 190 22c5a41 187->190 188->187 190->190
                      APIs
                      • CreateActCtxA.KERNEL32(?), ref: 022C59A9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1384344681.00000000022C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_22c0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: 5b2483f08d8a94ab96a9e712fe3a11eb2254a854d614d15f55929709a2642bff
                      • Instruction ID: 486e1a993c202cee04f27ac2c6f7d296c0a855a951dfd749c5604ec9ade874cb
                      • Opcode Fuzzy Hash: 5b2483f08d8a94ab96a9e712fe3a11eb2254a854d614d15f55929709a2642bff
                      • Instruction Fuzzy Hash: 8A410570C10719CBEB24CFA9C844BCEBBB1FF48304F60816AD408AB255DBB56949CF90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 191 22c44e0-22c59b9 CreateActCtxA 195 22c59bb-22c59c1 191->195 196 22c59c2-22c5a1c 191->196 195->196 203 22c5a1e-22c5a21 196->203 204 22c5a2b-22c5a2f 196->204 203->204 205 22c5a40 204->205 206 22c5a31-22c5a3d 204->206 208 22c5a41 205->208 206->205 208->208
                      APIs
                      • CreateActCtxA.KERNEL32(?), ref: 022C59A9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1384344681.00000000022C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_22c0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: 70a4f6e9364d3a6b4761462ccf64556ef253a00a00c107ead46b30d86d721f18
                      • Instruction ID: 54eafc64c74bc3b904b68ea50fd4faceea34e83ac04eb202d3d58ce4ffbbf18f
                      • Opcode Fuzzy Hash: 70a4f6e9364d3a6b4761462ccf64556ef253a00a00c107ead46b30d86d721f18
                      • Instruction Fuzzy Hash: 4441E270C10719CBEB24DFAAC844B9EBBF5BF48304F60816AD408BB255DBB56949CF90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 209 22c5a64-22c5a70 210 22c5a22 209->210 211 22c5a72-22c5a77 209->211 212 22c5a24-22c5a27 210->212 213 22c5a92-22c5a97 210->213 214 22c5ae9-22c5af4 211->214 216 22c5a2b-22c5a2f 212->216 213->214 217 22c5a40 216->217 218 22c5a31-22c5a3d 216->218 220 22c5a41 217->220 218->217 220->220
                      Memory Dump Source
                      • Source File: 00000000.00000002.1384344681.00000000022C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_22c0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a642091eb8a5afe3fbc70013b8eb0fac6aa406fd4f54764c4f1dece26e734f4f
                      • Instruction ID: 8de5cd36adfac6aa61e2d52b18557817afa379be5051ad548548d844a59e8852
                      • Opcode Fuzzy Hash: a642091eb8a5afe3fbc70013b8eb0fac6aa406fd4f54764c4f1dece26e734f4f
                      • Instruction Fuzzy Hash: DA31E071824789CFEB10CFE5C8447DDBBF1AF46304F60428DC405AB259C7B9A94ACB41

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 221 44938f1-44938f5 222 449393e-4493946 221->222 223 44938f7-4493939 221->223 224 4493948-4493954 222->224 225 4493956-4493995 WriteProcessMemory 222->225 223->222 224->225 227 449399e-44939ce 225->227 228 4493997-449399d 225->228 228->227
                      APIs
                      • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04493988
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID:
                      • API String ID: 3559483778-0
                      • Opcode ID: 2cb02a974edb88e32da794373fd597746c87729fd72c454ed6a2cb882a90f21f
                      • Instruction ID: ed2b814c229db4ffef69261720e7a1c9335152bccd83ad3b5caed4d0251b1d1d
                      • Opcode Fuzzy Hash: 2cb02a974edb88e32da794373fd597746c87729fd72c454ed6a2cb882a90f21f
                      • Instruction Fuzzy Hash: 98212672D003499FDF10DFAAC8807DEBBF1FB48310F14842AE958A7240D7789941DBA0

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 232 22cd5b8-22cd5bc 233 22cd5be-22cd5ff 232->233 234 22cd602-22cd654 DuplicateHandle 232->234 233->234 235 22cd65d-22cd67a 234->235 236 22cd656-22cd65c 234->236 236->235
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,022CD586,?,?,?,?,?), ref: 022CD647
                      Memory Dump Source
                      • Source File: 00000000.00000002.1384344681.00000000022C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_22c0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 71e47e021d8a130e963901e6fe8ceb4d75499efa5fd389d7b75c2ded04fc4768
                      • Instruction ID: 0266d4c1166e21c9c915b211b5bc6c66bc5734d76ff7c9bc2d2cce7ad5904df5
                      • Opcode Fuzzy Hash: 71e47e021d8a130e963901e6fe8ceb4d75499efa5fd389d7b75c2ded04fc4768
                      • Instruction Fuzzy Hash: 6F3148B590034A9FDB10CFAAD440BDEBFF4EF49320F24415AE958A7251C374A941CFA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 250 44938f8-4493946 252 4493948-4493954 250->252 253 4493956-4493995 WriteProcessMemory 250->253 252->253 255 449399e-44939ce 253->255 256 4493997-449399d 253->256 256->255
                      APIs
                      • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04493988
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID:
                      • API String ID: 3559483778-0
                      • Opcode ID: 6b5ca1fe2740f79d4888e9fc8640853fb2e4fe3a2355618d1c72845421e5edac
                      • Instruction ID: 0ff597bca8189d07fd6c0c78dd26cd6c8466aeb72892bfecf1287a39948b3034
                      • Opcode Fuzzy Hash: 6b5ca1fe2740f79d4888e9fc8640853fb2e4fe3a2355618d1c72845421e5edac
                      • Instruction Fuzzy Hash: 792124719003099FDF10DFAAC884BEEBBF5FF48310F14842AE958A7240C778A944DBA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 239 4493321-4493373 242 4493383-44933b3 Wow64SetThreadContext 239->242 243 4493375-4493381 239->243 245 44933bc-44933ec 242->245 246 44933b5-44933bb 242->246 243->242 246->245
                      APIs
                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 044933A6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID: ContextThreadWow64
                      • String ID:
                      • API String ID: 983334009-0
                      • Opcode ID: a8d9ad3d8f5763cc14a63b7629c313733b58fcbedc20666210efe7344c424fd7
                      • Instruction ID: de8ff0f95c741405badf1fd0b3c14629f7ce6a6430f336eb8b2a4eb4ca4141aa
                      • Opcode Fuzzy Hash: a8d9ad3d8f5763cc14a63b7629c313733b58fcbedc20666210efe7344c424fd7
                      • Instruction Fuzzy Hash: EE214871D003098FDB20DFAAC4857EEBBF4EF49320F14842AD859A7241DB78A945CFA1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 260 44939e1-44939e5 261 4493a2e-4493a75 ReadProcessMemory 260->261 262 44939e7-4493a2c 260->262 265 4493a7e-4493aae 261->265 266 4493a77-4493a7d 261->266 262->261 266->265
                      APIs
                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04493A68
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID: MemoryProcessRead
                      • String ID:
                      • API String ID: 1726664587-0
                      • Opcode ID: 4b7e490a3adad1a1064e7a9603eec2d55acc2197fe71a4316680a64dd3b2abcb
                      • Instruction ID: e6ee3def887ab299e1698d475e6333169a73338bcf3f0f330c004744aa5a8377
                      • Opcode Fuzzy Hash: 4b7e490a3adad1a1064e7a9603eec2d55acc2197fe71a4316680a64dd3b2abcb
                      • Instruction Fuzzy Hash: 012107B1D003599FDF10DFAAC880BEEBBF5FF48310F14842AE919A7240C77999419BA1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 270 22cb6d0-22cd654 DuplicateHandle 272 22cd65d-22cd67a 270->272 273 22cd656-22cd65c 270->273 273->272
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,022CD586,?,?,?,?,?), ref: 022CD647
                      Memory Dump Source
                      • Source File: 00000000.00000002.1384344681.00000000022C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_22c0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 9eed8971eed5759ac0c1290aebd79d7beb169a7df493131713ac91acc87626b1
                      • Instruction ID: 47988c1e5495071e98fead373c8bea286c75fc2b25f2bf121b59dab6368e9542
                      • Opcode Fuzzy Hash: 9eed8971eed5759ac0c1290aebd79d7beb169a7df493131713ac91acc87626b1
                      • Instruction Fuzzy Hash: 2421E4B59003499FDB10DF9AD584BEEFBF8EB48310F24842AE918A7350D374A950CFA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 286 44939e8-4493a75 ReadProcessMemory 290 4493a7e-4493aae 286->290 291 4493a77-4493a7d 286->291 291->290
                      APIs
                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04493A68
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID: MemoryProcessRead
                      • String ID:
                      • API String ID: 1726664587-0
                      • Opcode ID: cd1fcac61047f310893ca43ff6ddcf654173d32b88dfee1ff1c800fb2c45c03a
                      • Instruction ID: ccefb59297abdbd960cc943e59a9330767f7fcbda8857ebaf06303b96b8946c4
                      • Opcode Fuzzy Hash: cd1fcac61047f310893ca43ff6ddcf654173d32b88dfee1ff1c800fb2c45c03a
                      • Instruction Fuzzy Hash: 40210771C003499FDF10DFAAC880BEEBBF5FF48310F14842AE919A7240C77899419BA1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 276 4493328-4493373 278 4493383-44933b3 Wow64SetThreadContext 276->278 279 4493375-4493381 276->279 281 44933bc-44933ec 278->281 282 44933b5-44933bb 278->282 279->278 282->281
                      APIs
                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 044933A6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID: ContextThreadWow64
                      • String ID:
                      • API String ID: 983334009-0
                      • Opcode ID: a8eed8b7b498331cacec392846457fa35557e1c62f3b455bd01351bff9509e19
                      • Instruction ID: 33cc1bda95561b23547d0473ca09a8da67380c7733ae6e3d8f7d6f089bc0a096
                      • Opcode Fuzzy Hash: a8eed8b7b498331cacec392846457fa35557e1c62f3b455bd01351bff9509e19
                      • Instruction Fuzzy Hash: A9213771D003098FDB20DFAAC4847EEBBF5EF49320F14842AD859A7240CB78A945CFA0

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 295 4493830-4493835 296 449387e-44938b3 VirtualAllocEx 295->296 297 4493837-44938b3 VirtualAllocEx 295->297 299 44938bc-44938e1 296->299 300 44938b5-44938bb 296->300 297->299 297->300 300->299
                      APIs
                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 044938A6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: a6f0d6aee0e86b7451be20cf841472402b39fc4ab65c5fb8f8a8380ea295ab60
                      • Instruction ID: 627daf52ee8860dff99efda45c027952d43e3bc8530d8484309b1c283455c63a
                      • Opcode Fuzzy Hash: a6f0d6aee0e86b7451be20cf841472402b39fc4ab65c5fb8f8a8380ea295ab60
                      • Instruction Fuzzy Hash: 3C215672C003099FDF20DFAAC4447DEBFF5EB89320F24841AD915A7210CB79A941CBA0
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID: ResumeThread
                      • String ID:
                      • API String ID: 947044025-0
                      • Opcode ID: c187f4ede1000af87b67690bbe004991f9e4c55ef6b5958364af992bee63fece
                      • Instruction ID: 4f7014bdabd033ae4349e82692225a7238cf8f6778646f9a7389b9573a61251b
                      • Opcode Fuzzy Hash: c187f4ede1000af87b67690bbe004991f9e4c55ef6b5958364af992bee63fece
                      • Instruction Fuzzy Hash: 5E117971D003088FDF24DFAAC4457DEFBF5EB89320F24841AC819A7240CB79A9418B94
                      APIs
                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,022CAFB9,00000800,00000000,00000000), ref: 022CB1CA
                      Memory Dump Source
                      • Source File: 00000000.00000002.1384344681.00000000022C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_22c0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: 5c696e40c46280198819b57a06c63152aedf012a14c870e75ec5209563d99c08
                      • Instruction ID: 001a4bd49934712a4e5c2687779bc7f3f17129a6c4a046509f44ef9146ed547a
                      • Opcode Fuzzy Hash: 5c696e40c46280198819b57a06c63152aedf012a14c870e75ec5209563d99c08
                      • Instruction Fuzzy Hash: F911F4B69003499FDB10CF9AD445BDEBBF4EB48214F14852EE915A7310C3B5A945CFA4
                      APIs
                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,022CAFB9,00000800,00000000,00000000), ref: 022CB1CA
                      Memory Dump Source
                      • Source File: 00000000.00000002.1384344681.00000000022C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_22c0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: a707499da170a265d975bf7c7fef881c833f69b442e745e77e57476ba66e0043
                      • Instruction ID: 9e4fb6f615800a87a7856b11a1bec8cf9d5fd24e80d340662eb87b0a82af4883
                      • Opcode Fuzzy Hash: a707499da170a265d975bf7c7fef881c833f69b442e745e77e57476ba66e0043
                      • Instruction Fuzzy Hash: C311F2B69003498FDB14CFAAC444ADEBBF4EB49214F14846ED859A7310C3B5A945CFA5
                      APIs
                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 044938A6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 26c6a28188d421b58799f5cf0c8b3931592166b699f7e7ea332e966e39130321
                      • Instruction ID: 806d5d3089b9be6ddc63ee01df12d901c0d2fdcdf351760f7ea4e487c5284535
                      • Opcode Fuzzy Hash: 26c6a28188d421b58799f5cf0c8b3931592166b699f7e7ea332e966e39130321
                      • Instruction Fuzzy Hash: D31114769003499FDF20DFAAC844BDFBBF5EF88320F24841AE915A7250C775A944CBA0
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID: ResumeThread
                      • String ID:
                      • API String ID: 947044025-0
                      • Opcode ID: 91f8420eec9c79f97a34263e8f3bc2d3ab90b7077f3b47f459bf6bc83e0c73cf
                      • Instruction ID: c63855fc977619a0105f07988c39756e47ac8bd422ba7b7383e63433edebd175
                      • Opcode Fuzzy Hash: 91f8420eec9c79f97a34263e8f3bc2d3ab90b7077f3b47f459bf6bc83e0c73cf
                      • Instruction Fuzzy Hash: 2D112871D003498FDB24DFAAC4457DFFBF5EB88320F24841AD519A7240CB79A945CBA4
                      APIs
                      • PostMessageW.USER32(?,00000010,00000000,?), ref: 0449854D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID: MessagePost
                      • String ID:
                      • API String ID: 410705778-0
                      • Opcode ID: 01ea7e2719759268d2c4304ad59e6cbdc9bd32c16a1baf8c28efbba79955a62f
                      • Instruction ID: 7b5867f1d8a9e302d37d98dac06694d1aff00367a02906d06d72625e85576b79
                      • Opcode Fuzzy Hash: 01ea7e2719759268d2c4304ad59e6cbdc9bd32c16a1baf8c28efbba79955a62f
                      • Instruction Fuzzy Hash: AD11F2B58003499FDB20DF9AD485BDEBBF8EB48320F20841AE918A7200D375A944CFA5
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 022CAF3E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1384344681.00000000022C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_22c0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: 36416525241170f7ce3252d2bb1467e06a70f225d072ec5b7d993732a88f0e65
                      • Instruction ID: 32469814d7457a7534e09335a4639063d8d81710c83415543caf490d210ce502
                      • Opcode Fuzzy Hash: 36416525241170f7ce3252d2bb1467e06a70f225d072ec5b7d993732a88f0e65
                      • Instruction Fuzzy Hash: EF1110B6C003498FDB20CF9AD444BDEFBF4EB88314F24852AD828A7204C379A545CFA1
                      APIs
                      • PostMessageW.USER32(?,00000010,00000000,?), ref: 0449854D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID: MessagePost
                      • String ID:
                      • API String ID: 410705778-0
                      • Opcode ID: f6bc06608e4bfa270a2f5591512320c1e8b6cd894b53928d0c82540a0a77d822
                      • Instruction ID: 0340d80e7e8c3a5a0419b4ab26e3d0e55f9bf5c5e6e56c233f180f6bf7b2200c
                      • Opcode Fuzzy Hash: f6bc06608e4bfa270a2f5591512320c1e8b6cd894b53928d0c82540a0a77d822
                      • Instruction Fuzzy Hash: 4A11F2B58043499FDB20DF9AD884BDEBFF8EB49320F14841AD968A7241C375A944CFA5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID: ;I
                      • API String ID: 0-1842435098
                      • Opcode ID: 0dfdff70308c5c2cbb7b24276502ab9c7f18c12bb9b7a61f1b68979a1ce6938e
                      • Instruction ID: 61d5a9996f2ae8f8dd14cf9bb572ccbcc1613973cb9133135427e4b6cce6f14e
                      • Opcode Fuzzy Hash: 0dfdff70308c5c2cbb7b24276502ab9c7f18c12bb9b7a61f1b68979a1ce6938e
                      • Instruction Fuzzy Hash: BD21FF716002008FDB11EB79C4459AEBBE6EF81305B10C969E107DB799EB70ED058F92
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID: ;I
                      • API String ID: 0-1842435098
                      • Opcode ID: a819eeed4f26dde71fbe02b699951effb0ff7b54a90ca6309f0f21b176b36053
                      • Instruction ID: f0467342b5acb6fd423aaaec02d55cc9a1a0c3af43a1a4ed1fe1bcec8a28da35
                      • Opcode Fuzzy Hash: a819eeed4f26dde71fbe02b699951effb0ff7b54a90ca6309f0f21b176b36053
                      • Instruction Fuzzy Hash: 0E110FB16002008FDB01EB68C4419AFBBE2EF81305B10C869E107EB7A5DB70ED058F92
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID: W
                      • API String ID: 0-655174618
                      • Opcode ID: 82aab02486591dcd073909e9b99630ba8faa18a83bebf2a8a25b7aab90dd9c89
                      • Instruction ID: 907ddc72072a1e1f369261f0a075a8ce162f96140a821e515641de119a0de39c
                      • Opcode Fuzzy Hash: 82aab02486591dcd073909e9b99630ba8faa18a83bebf2a8a25b7aab90dd9c89
                      • Instruction Fuzzy Hash: 7CE02B32B0455047E714AB26584075B77D59FC8310F19C0AEED19A7785D9746C018B90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 573bc3e109d2bfc1179428e6d450ab37db568538670e8664e1638785705ddc8e
                      • Instruction ID: b1f53ca33b8870e16eb7c38ca196386a7799f2e2e6be6a2a416b4b82955c1cb7
                      • Opcode Fuzzy Hash: 573bc3e109d2bfc1179428e6d450ab37db568538670e8664e1638785705ddc8e
                      • Instruction Fuzzy Hash: 732271BCDC5F82CAD7709FA4A4843DD7690AB19300F248D6BC0FACF295C735A0968B49
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dc744364f592862d032413ca7090efed6a670211c6ac4523c9ca0f31508894f6
                      • Instruction ID: 8dd8d65d310caec85f8a113fb81e09cd46c923e4cf5cf3c3a463925924d35020
                      • Opcode Fuzzy Hash: dc744364f592862d032413ca7090efed6a670211c6ac4523c9ca0f31508894f6
                      • Instruction Fuzzy Hash: 1EF19FB5A042468FE7A5CF28C458755FBE0BB09314F1882E9D5489B3D2E376E8C4CF91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6e1d127493d624fb92c72a9e971cbc040a33bd2c946dbd7af54c393133204c7b
                      • Instruction ID: 4015bdbdbb3964c8b701ce165f1db5f6e9237273f616c9abddbc42e3fdc00213
                      • Opcode Fuzzy Hash: 6e1d127493d624fb92c72a9e971cbc040a33bd2c946dbd7af54c393133204c7b
                      • Instruction Fuzzy Hash: 15917075A002099FDB04DFA4D590AEEBBF6EF89300B14C06AE809EB351E735DD16CB51
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fe98fa18992cc88c38f29cdf2f4fa50d0579f9b47d4f80e0b54096c91d8f92d2
                      • Instruction ID: d513f18badeafcc3fbe3632f543353de55fdf98ff07014d90c8cae94da3f0101
                      • Opcode Fuzzy Hash: fe98fa18992cc88c38f29cdf2f4fa50d0579f9b47d4f80e0b54096c91d8f92d2
                      • Instruction Fuzzy Hash: D8814C74E003189FDF15DFA9D4946AEBBF2FF88300F14852AD409AB394DB74A945CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 18eb301686146d4063e38e04f012a6d66742f64fa0c2bc2caa6eef2e79955a96
                      • Instruction ID: f1284608b08d62f63f1c0b5cc0c2332d872d8e0edc8a82e38b806ac662f84d2e
                      • Opcode Fuzzy Hash: 18eb301686146d4063e38e04f012a6d66742f64fa0c2bc2caa6eef2e79955a96
                      • Instruction Fuzzy Hash: 8A8156B4600B008FD749EB38C454A9EB7E6FF8A304B50846DD05A9B361EF70ED86CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7d7b2d0ec215af18c32dcc4e0bf2c9f675d2c3b54b5af3ec14869ccd33c2f4a5
                      • Instruction ID: aa269d34ae5f60c16469e2d51a3e7e8bd3ef0cfc26dfb6d336ffa63a3f09b5f7
                      • Opcode Fuzzy Hash: 7d7b2d0ec215af18c32dcc4e0bf2c9f675d2c3b54b5af3ec14869ccd33c2f4a5
                      • Instruction Fuzzy Hash: 37717C35B002088FDB14EBB8D594AED77F2EF8D350B2484A9D446AB3A5DA35EC41CF61
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 46be59816ef7df6a95c0ca5ebbedeab207686be0208f3dfe650dada6e5b9a50f
                      • Instruction ID: 8a3af0971900faa57b8a25fc4b14fcd5a713966f06437b17bf329897ffb3a5ce
                      • Opcode Fuzzy Hash: 46be59816ef7df6a95c0ca5ebbedeab207686be0208f3dfe650dada6e5b9a50f
                      • Instruction Fuzzy Hash: 0F813474600B008FD749EB38C454AAEB7E6EF8A304B50846CD05A9B360EF71ED86CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d36fd7828753cc5d761f93a98ccd64183287f51c6fa60d76801ffbf6322fd950
                      • Instruction ID: 6b3d8ad4df229d46932faf824950c21e48f94d38a6352134956b68f6f8419658
                      • Opcode Fuzzy Hash: d36fd7828753cc5d761f93a98ccd64183287f51c6fa60d76801ffbf6322fd950
                      • Instruction Fuzzy Hash: 8761E4B4E14208CFEB48DFE9C884AADBBB6FF89300F109129D819AB355DB719945CF50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2edb93054e2664077d952027ec7e401c419b89f9d4783fd408408d2b06ec935b
                      • Instruction ID: dac3af738f11b6de117848db269ced8cf578b75e5820c4d6b0dc557145125428
                      • Opcode Fuzzy Hash: 2edb93054e2664077d952027ec7e401c419b89f9d4783fd408408d2b06ec935b
                      • Instruction Fuzzy Hash: B4619C30A006198FCB15CF98DA80AAEB7F5FF84300F55C95AE466AB291D734FD45CB90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5d7c279fd3c90ae76347464d16c57ce0487e8f9780b9b1a337bb36462455bdfb
                      • Instruction ID: 3bbe7778a77f939934fe3f404c93f64366436f1143ce3519d793be316849eb37
                      • Opcode Fuzzy Hash: 5d7c279fd3c90ae76347464d16c57ce0487e8f9780b9b1a337bb36462455bdfb
                      • Instruction Fuzzy Hash: 6D5124326043109FD729AF68E0487A977A6FFC9310F55C4AAE449AB791CB34BC43CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c19556cf132eadd1411c9a0ca2d8afe8af6e995be7a8d4cd4f6a1450ff3825bd
                      • Instruction ID: 65c63a27a7aa701553730a318b459e9fe6b4ee2faee48aade54c8947a391abb9
                      • Opcode Fuzzy Hash: c19556cf132eadd1411c9a0ca2d8afe8af6e995be7a8d4cd4f6a1450ff3825bd
                      • Instruction Fuzzy Hash: B1716E74A01208AFCB55DFA9E884DADBBB6FF49714F118498FA01AB361D731EC81CB50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b8ee85d0affccd1e77b9a37ab220421a595f404386adec275ea3333ef9590405
                      • Instruction ID: d3c10562eca654deb63b6be585e4e6149f0b99e203fedba9b916a733731e3f41
                      • Opcode Fuzzy Hash: b8ee85d0affccd1e77b9a37ab220421a595f404386adec275ea3333ef9590405
                      • Instruction Fuzzy Hash: 5D5147717043409FD729CB34D8447AAB7E5EF86320F14C5AED049CB2D1CB74A805CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f2a9a15ec6cd05280b892e003e85b37a3b6b31e4ab171bc3292016f4fadc31ae
                      • Instruction ID: 93a8585322de2171abf98146f1dfac3a43f069f1a3abc756c1b0e7e37f0f616e
                      • Opcode Fuzzy Hash: f2a9a15ec6cd05280b892e003e85b37a3b6b31e4ab171bc3292016f4fadc31ae
                      • Instruction Fuzzy Hash: E551C071B103068FEB15EB7988485AFBBF7EFC4210724866AE459DB391EB30DD058B91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: da8edc548f5d404d08194707a6d8437cb332d9d5a535fbab0619258e3bd1e2f2
                      • Instruction ID: 23ef33842837e2136dce2b8b301ca66db952260dc2c676eaa21a6250b7f7f7db
                      • Opcode Fuzzy Hash: da8edc548f5d404d08194707a6d8437cb332d9d5a535fbab0619258e3bd1e2f2
                      • Instruction Fuzzy Hash: 6E517E75E002459FDB24DFAAD844AAFBBF5EF88304F10C52AD855E7280DB74A945CBA0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d83297db243725b833c505058ef6fca6bfab85223ffa3ae5bc962bf07f423827
                      • Instruction ID: 503a7293fb7aa2cf86ddd1b188cc0d2abd2605659253234ba881ce0e8bd92117
                      • Opcode Fuzzy Hash: d83297db243725b833c505058ef6fca6bfab85223ffa3ae5bc962bf07f423827
                      • Instruction Fuzzy Hash: 4B518071A003189FDF18EFB4881076E7BA2AFC9310F24C169D455AB381DA39DD468B91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c62bcea1283ae947ad0fec6373cd844aefb5a91e7aa8d3c3f13edea04a5846ad
                      • Instruction ID: 052a12d53b99dc8be6f5d8d06d8d9c3403f6c24eefa21356f9e67204da5d07af
                      • Opcode Fuzzy Hash: c62bcea1283ae947ad0fec6373cd844aefb5a91e7aa8d3c3f13edea04a5846ad
                      • Instruction Fuzzy Hash: 4B51BF316003048FD714DB78D494BAEBBE6EF89314F1489A9D106EB2A1CA75EC45CB60
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b10debe44aae6ad9f5df90c885d1972f23f19f02b7a186dcb2ca5e1f1e3ef90a
                      • Instruction ID: 06bbd8b669b632782cd1df98cf8d5573fe8db5e2c96f1bbfcb8f698abf2f3909
                      • Opcode Fuzzy Hash: b10debe44aae6ad9f5df90c885d1972f23f19f02b7a186dcb2ca5e1f1e3ef90a
                      • Instruction Fuzzy Hash: EF517E74B412049FEB44AF75D855BAEBBB3FF88701F208029E906AB791DA75DC018B50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3f60a728243ae4966f28de256d85c1b16bf6d0100e8d2e4999ac919cae604d83
                      • Instruction ID: ec06875e309880e3b29622aedc05c1b236a4d322121ffb01d7b111274d7e9b66
                      • Opcode Fuzzy Hash: 3f60a728243ae4966f28de256d85c1b16bf6d0100e8d2e4999ac919cae604d83
                      • Instruction Fuzzy Hash: 6B5181B450A684DFD306DF69E554988BFB0EF8A201F2A80D6D485DF2B3C7399E16C712
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 392d4bc9fc5a869753908b365779c49034de6f4e865844b6917a82d4ba9fef5d
                      • Instruction ID: 7ece465e60775ef05e22938ec220768926958717f24a7dabcd8665bb4ecb29f9
                      • Opcode Fuzzy Hash: 392d4bc9fc5a869753908b365779c49034de6f4e865844b6917a82d4ba9fef5d
                      • Instruction Fuzzy Hash: 01418D78B412049FEB48AF75D855B6EBBB3FFC8701F208429E906AB790DA75DC018B50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 32711aefce5f70cfb0d7d00847245129de1b7f0f8b174bc8772b7516703d3a47
                      • Instruction ID: ac3313006a36ce751f73d287db306052bb154349993ce988d2a8a4a8dd109405
                      • Opcode Fuzzy Hash: 32711aefce5f70cfb0d7d00847245129de1b7f0f8b174bc8772b7516703d3a47
                      • Instruction Fuzzy Hash: 33318F70A02318DFCB14EFA0E5845ADBBB2FF85304F1185A9E44177695CB35A865CF54
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d5147a12202d55d7004e96cb00d6ff6d823662932cae1bdc8346fb94f3ec5c74
                      • Instruction ID: ed055b5209c0741f058214a28fc59e9dd40cf2fa12c845e34088a6f049ea17d2
                      • Opcode Fuzzy Hash: d5147a12202d55d7004e96cb00d6ff6d823662932cae1bdc8346fb94f3ec5c74
                      • Instruction Fuzzy Hash: D6519234A01244AFCB54DF68D494D9DBBB2FF49320B1144A8F902AB361DB31EC82CF50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d199ce9beed3582fca416081febbd363c05a6c2f47649d89f5f835e57eec7688
                      • Instruction ID: daae74dedac767f53fc22250a8ba32f9a78cf00d2eb817644610921411b74789
                      • Opcode Fuzzy Hash: d199ce9beed3582fca416081febbd363c05a6c2f47649d89f5f835e57eec7688
                      • Instruction Fuzzy Hash: 0C419275A00214DFEB25EFB9D1503AD7BB2EF88318F148429D401BB284DB356895CBA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8719d4f85017b1b56958db60b6e86fb9cafe8e6202e10774c2767b7ea675c936
                      • Instruction ID: 8a77eff399d7196b49fac65073fe20f8fef122b440418005b3192cc521eb0002
                      • Opcode Fuzzy Hash: 8719d4f85017b1b56958db60b6e86fb9cafe8e6202e10774c2767b7ea675c936
                      • Instruction Fuzzy Hash: 13419FE290E7C55FE35757345CA5286BF74AF63204B0E80DBD0C9CB1A3E128691EC362
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 73c275fe17b94d4cc0f262f1472345bb061a32efb468875f10fa62f2b8ef2fd7
                      • Instruction ID: 54c298bc62913cdb1dd12602cd44bd2d188096c8cd975fc510ae7ae07ffe515d
                      • Opcode Fuzzy Hash: 73c275fe17b94d4cc0f262f1472345bb061a32efb468875f10fa62f2b8ef2fd7
                      • Instruction Fuzzy Hash: 214156F4E16219DFDB80EFA9E4858EEBBB8FB4E300F019855D45AA7716D7309811CB24
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8ade7127e3302425615ab667184865c6d5048f0ca7c937a8f57412b9ce83f758
                      • Instruction ID: 343b0540f4de7459fcd465f54ad4d5c9fe13f9935ae2603be07db6d2e145fea7
                      • Opcode Fuzzy Hash: 8ade7127e3302425615ab667184865c6d5048f0ca7c937a8f57412b9ce83f758
                      • Instruction Fuzzy Hash: BC416D35A1461A8FDF00DF69D4846EEB7F1FF88311F14816AE845E7290DB38DA85CBA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 52a43d24c2730cfa70d409eeab10c2cce01b47a6b32556edf1393b89b4ba5a1b
                      • Instruction ID: b0760c55519309dda0c6a628c47714aaf033acb3c259dc256c3970b84cf8db5c
                      • Opcode Fuzzy Hash: 52a43d24c2730cfa70d409eeab10c2cce01b47a6b32556edf1393b89b4ba5a1b
                      • Instruction Fuzzy Hash: 9541E834B002188FDB54EBA8D844BDDB7B2BF8C714F154068E505AB3A5DB79E801CFA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9abdb2b488769cbcfc242d24bd81d365400dcbe3264488fc34515848bef7f328
                      • Instruction ID: 3ef5da2966bb84108381ab288f1621d59b680dc1277782319924deb9280b0a33
                      • Opcode Fuzzy Hash: 9abdb2b488769cbcfc242d24bd81d365400dcbe3264488fc34515848bef7f328
                      • Instruction Fuzzy Hash: 9D4165F4E16219DFDB80EFA9E4858EEBBB8FB4E300F015855E45AA7716D7309811CB24
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6347c56d1b4aa3a2f079d8c5d671231140ab5695e3921ed285b38bda34cd8c2d
                      • Instruction ID: 68a300579b9dc2adf157bb8127d5bdf2092eb49bcbf18f51043de1e60e4c2e08
                      • Opcode Fuzzy Hash: 6347c56d1b4aa3a2f079d8c5d671231140ab5695e3921ed285b38bda34cd8c2d
                      • Instruction Fuzzy Hash: D9319E31A04615CFCB01CFA9F8845BEBBB6EF85315B14C466E808EF291E775D852C791
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8f9423b92546577fdabaf9a1d5278391bc0a9e9d2ca6fafa66b3f963188bde4e
                      • Instruction ID: d032089b150a0d1ac0b2dc163605781dbbd42d5a80c62fc7979ab9295c4b1f9d
                      • Opcode Fuzzy Hash: 8f9423b92546577fdabaf9a1d5278391bc0a9e9d2ca6fafa66b3f963188bde4e
                      • Instruction Fuzzy Hash: 0241BCB4E1122D9FDB85DFE8D884AEDBBB2BB4A301F209015E81AF7210D7349941CF24
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c9e7f1a5f94351d475b47e00eca274db5f9cf471d2b4a1c0dc95cdf6f8869292
                      • Instruction ID: 0058f8ec204baff135b4c056b35ff3f62d5d0c20486c181625ca34b71e57b04e
                      • Opcode Fuzzy Hash: c9e7f1a5f94351d475b47e00eca274db5f9cf471d2b4a1c0dc95cdf6f8869292
                      • Instruction Fuzzy Hash: DA319D317002048FCB24DBBDD944AAA73E5EF89725B144579E616CB3E0DA31F841CB60
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cd5a063ade37e6cb361cdcf3440fc472b2cadd8f41ddaa06ccec4548071bc81d
                      • Instruction ID: f123e85ef2e1f4deac3965256abd6ce140839b318e00f64840a98a7d3502b82e
                      • Opcode Fuzzy Hash: cd5a063ade37e6cb361cdcf3440fc472b2cadd8f41ddaa06ccec4548071bc81d
                      • Instruction Fuzzy Hash: A031F271A00209AFDB08AFA4D8949AEBBB3FFC8300F118529F4026F654DF34A945CB90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 24ba96acc8385aa9492c01f8ddfad06c9c81c6c004ff9af0aeec27bf6dbb112d
                      • Instruction ID: 6d182e1e03c4f612861781f4ecb1bbcd9fd1084b63a0fc5cf1339e63788f762b
                      • Opcode Fuzzy Hash: 24ba96acc8385aa9492c01f8ddfad06c9c81c6c004ff9af0aeec27bf6dbb112d
                      • Instruction Fuzzy Hash: E4411130D0474A8ECB41EFA8D894AAEB7B1FF55300F05CA6AD459BB161EB30E9C5CB50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7a0ee887602bc461a7b81173353a48d95eb82342e8be201cf98401f13f2e8d2b
                      • Instruction ID: 3e4aa026fe001e002aa3343e370e0b84ee33e0ecef1c14897fc9e3a4b9ab0e49
                      • Opcode Fuzzy Hash: 7a0ee887602bc461a7b81173353a48d95eb82342e8be201cf98401f13f2e8d2b
                      • Instruction Fuzzy Hash: C64136F0D16219DFEB80EFA9E4858EDBBB8FB4E300F015455E45AA7716DB349811CB24
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5e1f243740dfc7700e5ec0377236451c7db80da9f2aab27575025a0a5af022a1
                      • Instruction ID: 50e2803ced3cf0f37d6bf1621032cd7403510aef84256c5bd187d408ba98658c
                      • Opcode Fuzzy Hash: 5e1f243740dfc7700e5ec0377236451c7db80da9f2aab27575025a0a5af022a1
                      • Instruction Fuzzy Hash: 1531E131B043444FCB19ABB8D81076E7BB6EFC9310B25C5AAD046DB391DE74AC068BA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7a48373b86bded37cbc05574b02371aef04224b03890e7d18ff93e6b26d4023e
                      • Instruction ID: 99d52625c4fd074ecfc58e4344e5a85951fdd1a262e81577758f0bcdf1676726
                      • Opcode Fuzzy Hash: 7a48373b86bded37cbc05574b02371aef04224b03890e7d18ff93e6b26d4023e
                      • Instruction Fuzzy Hash: FF3128B1904309AFDF14DFA9D844ADEBBF5EB49310F14842AE909A7210D775A944CBA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fb5f631685fca2989d0a416b8f7b0b1cbfe761f673dca3c7de80060fc67790ce
                      • Instruction ID: e14923433eca172a802aeaf697c8c499300f438b444d76be4760224e0edaa985
                      • Opcode Fuzzy Hash: fb5f631685fca2989d0a416b8f7b0b1cbfe761f673dca3c7de80060fc67790ce
                      • Instruction Fuzzy Hash: 7C317A756002098FEB04EF64C994AEE7BF6EF49304F1580A9E905AF361DA35EE05CF50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ae302f3495e355cc9375e4f160ca8a8c5583fa207ca1877fa87569b78bf36d8c
                      • Instruction ID: 5b77f3775fd70e0f0b2942efc091753459cb040350db66ca5021ae886b10a5b0
                      • Opcode Fuzzy Hash: ae302f3495e355cc9375e4f160ca8a8c5583fa207ca1877fa87569b78bf36d8c
                      • Instruction Fuzzy Hash: E431C1749003148FEB25AF78D0503ADBBF2EF89318F54C879C402BB281DE359985CBA2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1ce0aefbb988ba6a48b5b8493390281542c0c038eb9831b2c372b1aeaee2cc19
                      • Instruction ID: a9e16a3899f0ee190d037d5d5354296ff61af2268c2b4c54be55c98733d524dc
                      • Opcode Fuzzy Hash: 1ce0aefbb988ba6a48b5b8493390281542c0c038eb9831b2c372b1aeaee2cc19
                      • Instruction Fuzzy Hash: 3641CFB1D043099BDB24DFAAD584ADDFBB5BF48304F24802AD409BB245D7B56A86CF90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 42698d95b5d80fd45abbfcd107b096af26329fff27e1f1f249d301f06f78b6f5
                      • Instruction ID: 1904a2f50c51851ef65807e91866b1dea003928149bc4bd2cbebb0562d5df8d0
                      • Opcode Fuzzy Hash: 42698d95b5d80fd45abbfcd107b096af26329fff27e1f1f249d301f06f78b6f5
                      • Instruction Fuzzy Hash: 9A41E0B1D003098BDB24CFAAD584ADDFBB5BF48304F24802AD409BB245D7B56A86CF90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: eff362f9def69ac383b54d1af0009edcddbe693b88d120fe0e35f4740a81a759
                      • Instruction ID: 22d144db13338436d073cd994663e3945ffe426aed9001e06ec6a5513f1f5c82
                      • Opcode Fuzzy Hash: eff362f9def69ac383b54d1af0009edcddbe693b88d120fe0e35f4740a81a759
                      • Instruction Fuzzy Hash: 75419DB4D003589FDB14CF9AD884ADEFBB5FF49310F64812AE418AB254D7B46845CF94
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 10e725b57cffc158150d1babac686252bd9581719e2f321791d245c8e8a4472d
                      • Instruction ID: f4242ab3f48b25580a4246e7e5314ec23deee7c3763c2aede1366d74a3e5e16c
                      • Opcode Fuzzy Hash: 10e725b57cffc158150d1babac686252bd9581719e2f321791d245c8e8a4472d
                      • Instruction Fuzzy Hash: CB314D35A0061A8FDF14CF69D5806EEB7F1FF88311F14856AE805E3290DB38EA85CB60
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: af3d8f86ccea71bbf034a49019339a9662f70d02ff67d8ae1580fc1b0a544e85
                      • Instruction ID: c71c56c6c5f6994e46cdb71f789f7c2d67fc414742f00ee1202285272c3de108
                      • Opcode Fuzzy Hash: af3d8f86ccea71bbf034a49019339a9662f70d02ff67d8ae1580fc1b0a544e85
                      • Instruction Fuzzy Hash: 6F2107757053404FDB118B78E4205993BF5AF9B32071580EBE545CB3B2DA61EC06CB60
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0b0bf66f18533a58dc5e9940a2ed9a867b76d0160aa83fc4f8bc09b7457409fd
                      • Instruction ID: ad65f8bd7450219ce0db390776a4e09321c41bc512e90ee9f8dedd87a6269db1
                      • Opcode Fuzzy Hash: 0b0bf66f18533a58dc5e9940a2ed9a867b76d0160aa83fc4f8bc09b7457409fd
                      • Instruction Fuzzy Hash: B021A1757106048FDB28DB7DE424A5E37E9EFC976071580AAE505DB3A0DEB1EC01CBA0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 293d60b44a85d39c4fb371fd1b8586d7a3c84bdaea48068931936d6ec87eec18
                      • Instruction ID: d2f1dbb4196af4247ecb1ca881d941a1068b48c3dcb44a0e075557d2b259d1b6
                      • Opcode Fuzzy Hash: 293d60b44a85d39c4fb371fd1b8586d7a3c84bdaea48068931936d6ec87eec18
                      • Instruction Fuzzy Hash: C231CEB5E0531A8FDB40DFE8D984AEDBBF6AB0A220F204566E419F7350E3349945CB20
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 80cf06682fd4bba22d042b0308114b2bfc77781a0d3f36c8fb1acf1913778304
                      • Instruction ID: a08068fe99d4d11f27151aec07991048c4c13937658a5b3b1c0f60623199f97e
                      • Opcode Fuzzy Hash: 80cf06682fd4bba22d042b0308114b2bfc77781a0d3f36c8fb1acf1913778304
                      • Instruction Fuzzy Hash: 682194B1E002455FDB15DFA9D900ABFBBF9EFC4304F14C16AD415E3290EA70AA45C7A0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 123ffafe0c0f8dfcc688c96c92a900d0f710b165a2938a42434c085513d4608d
                      • Instruction ID: 2c866c2e766b7961d4a47dccfe028b69263475a43a4684fc58b584b03d6d1c86
                      • Opcode Fuzzy Hash: 123ffafe0c0f8dfcc688c96c92a900d0f710b165a2938a42434c085513d4608d
                      • Instruction Fuzzy Hash: B831F630705B019FD7399FB8E545616B7F1FB49720F044F2AE0AACBA81D720F9058B91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0cecb4356a00af6b49e1eb9566fe8ddb8d850747a9c1cacd17c65770274ca4cd
                      • Instruction ID: 0a6fcb2779207a4d2dd0641c537594280f6621689ba556f0057634b538a2bd96
                      • Opcode Fuzzy Hash: 0cecb4356a00af6b49e1eb9566fe8ddb8d850747a9c1cacd17c65770274ca4cd
                      • Instruction Fuzzy Hash: E62159303117008FDB199B38D854A6A77E6AF9A718B2580AED506CF3A1DB72FC46CB50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4908ab85840d3fe77af2212dd8b5e405206949b7c8fb621fade9440e7d072e45
                      • Instruction ID: 8349b07bca4cb38831780747392d313ecdc7f4eac0c9c8d2c570767c64021dca
                      • Opcode Fuzzy Hash: 4908ab85840d3fe77af2212dd8b5e405206949b7c8fb621fade9440e7d072e45
                      • Instruction Fuzzy Hash: 6A317C36A003198FEB50DF64D998BEEB7F1BF48304F1480A5E844AB6E2C775A941CB60
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5dbcc16fa80d6c51217da585f086e47ffd191708736fea044c3e08f385d0364d
                      • Instruction ID: ed0df8a1dcd11b00d6efc94722a16a945000cb2ae11f4515c4376025c69c6da1
                      • Opcode Fuzzy Hash: 5dbcc16fa80d6c51217da585f086e47ffd191708736fea044c3e08f385d0364d
                      • Instruction Fuzzy Hash: 80218E756007409FCB209F25E994BA67BB6FB9A721B05805EE646877A1CB31FC42CB60
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fd794cc7cfbed311b6ab557934dba0278b925d302fb2428d13cad203ab26b1ea
                      • Instruction ID: 1501fb05920e4ca7c4cb18618773aff871afd48b65f8d7594753e87b45f173a8
                      • Opcode Fuzzy Hash: fd794cc7cfbed311b6ab557934dba0278b925d302fb2428d13cad203ab26b1ea
                      • Instruction Fuzzy Hash: 32310132914B09DECB01EFB8D8548D9FBB1FF95300B118B69E9596B121FB30E695CB81
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 73dcc11d5c49661e83dff888234238382e7ad9c35b2e5584b5e1f9fe2d49ac30
                      • Instruction ID: efb4f42b7359ef1ac118c04451642d1084030f3ef20a24940d4d9c8c8efa3e69
                      • Opcode Fuzzy Hash: 73dcc11d5c49661e83dff888234238382e7ad9c35b2e5584b5e1f9fe2d49ac30
                      • Instruction Fuzzy Hash: 4121A330600B059BD738DFB8E586616B7F1FB49720F044F29E0AACBA81D764F9498B90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ad98ec0a3b0f22d79a4de875c9814d9b087eda2d14932dd7ea4e8c2f5d9100f2
                      • Instruction ID: b629ba9f11d1bee711808569e4db017d346dd17073630a4b56e307684ff40451
                      • Opcode Fuzzy Hash: ad98ec0a3b0f22d79a4de875c9814d9b087eda2d14932dd7ea4e8c2f5d9100f2
                      • Instruction Fuzzy Hash: 21310C31C14B4A8ECB01EFA8C4945E9FBB0FF55310F45CA9AD4987B122EB30A5C5CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1383749404.000000000093D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0093D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_93d000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fb428ae7c2b59aa2cf1640eb6af35496e2f5e8b12eaaa9b8e67bb9a2097bf671
                      • Instruction ID: c8c2f9ca981beeef5807ce4abf71482624659f12229400d5fea9e090cbe202cc
                      • Opcode Fuzzy Hash: fb428ae7c2b59aa2cf1640eb6af35496e2f5e8b12eaaa9b8e67bb9a2097bf671
                      • Instruction Fuzzy Hash: A3213AB1504304DFDB05DF10E9C4B26BB69FB94324F24C56DD90A0B2A6C33AE856CFA2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6f25ce44e7ad5703fcf7a0ae77fed2eb9323e0e3525df0413cbd6c3d3289b1f3
                      • Instruction ID: cf6386dfe89b49478bd3a5155707338c6d1aa6eb73ea81e12a66997126eb50f1
                      • Opcode Fuzzy Hash: 6f25ce44e7ad5703fcf7a0ae77fed2eb9323e0e3525df0413cbd6c3d3289b1f3
                      • Instruction Fuzzy Hash: 0E31F032914B09DACB01AFA8C854499F7B5FF95300B118B5AE9596B121FB30E695CB81
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d7dfe7bedcf5a47f34720b9baaec09f424d5d45d2ec772b9ff3b5586dd763d1f
                      • Instruction ID: 53724d4310ab1c83e70a2af13d7426f41893e2a64c1046b27562e2bec58cfe35
                      • Opcode Fuzzy Hash: d7dfe7bedcf5a47f34720b9baaec09f424d5d45d2ec772b9ff3b5586dd763d1f
                      • Instruction Fuzzy Hash: 2121B075E002199FDF05DFA8C8906EEB7F6FF88304B14812AC805F7284EB34A9008BA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 50d425a44da89028b152c0028e6ff1a7e14621fbdf2142a84ccb17e3a7806a6d
                      • Instruction ID: 61117d0c48ef688b93aa2db6eac55378d9a962def67d347b3b19851826965899
                      • Opcode Fuzzy Hash: 50d425a44da89028b152c0028e6ff1a7e14621fbdf2142a84ccb17e3a7806a6d
                      • Instruction Fuzzy Hash: E421797090561A8BDB00CF65E8816BFBBB6EF85301B14C426EC08EB255E774DA12C7A1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bb28bd4111a52cff7248d29560c104ba55ce064c6b1357f17414414982dbc995
                      • Instruction ID: 8eea7f7c8201e7c1f884e90e75ec6abcbd8ba60308c42a445b56b3e39fe82fda
                      • Opcode Fuzzy Hash: bb28bd4111a52cff7248d29560c104ba55ce064c6b1357f17414414982dbc995
                      • Instruction Fuzzy Hash: 22214A757006149FCB24DF19E984BAAB3BAFBD9721B11842EE60687791CB71FC41CB60
                      Memory Dump Source
                      • Source File: 00000000.00000002.1383806055.000000000094D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0094D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_94d000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 33e0f4b003f89efdfae8d1dbce44cd5b0e3ed8262ca89a3a7270f8b499a877d1
                      • Instruction ID: 87b40b5632f37007f3e455f50026a3f1b6cc23991b3fc1bd96cbb686bb62ffc0
                      • Opcode Fuzzy Hash: 33e0f4b003f89efdfae8d1dbce44cd5b0e3ed8262ca89a3a7270f8b499a877d1
                      • Instruction Fuzzy Hash: 69210779604304DFDB05DF10D5C0F25BBA5FB84314F24CA6DE9094B256C3BAD846CA61
                      Memory Dump Source
                      • Source File: 00000000.00000002.1383806055.000000000094D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0094D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_94d000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 540392562832e60b0223440cfec9abd62e75326731d7a9638531db6e9903ae67
                      • Instruction ID: b83bd66fa39c5482fb57bc41a5be47e06c051fbc09146000395eec515a93c6c2
                      • Opcode Fuzzy Hash: 540392562832e60b0223440cfec9abd62e75326731d7a9638531db6e9903ae67
                      • Instruction Fuzzy Hash: 1B21F279604344DFDB14DF14D984F26BBA5EB84314F24C96DD80A4B286C37AD847CA62
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7d9f3177014c6d198dc8d2fd4fc26b578febd216e46668558df4c24035af7755
                      • Instruction ID: ed3f9a027eb89838fff0b217adb0ae06ad94b1ed1af9ba9d23b21b862cf4fdef
                      • Opcode Fuzzy Hash: 7d9f3177014c6d198dc8d2fd4fc26b578febd216e46668558df4c24035af7755
                      • Instruction Fuzzy Hash: F921ACB5A007118FD310CF64C880AABBBB9FFC9704B11846DE8499B320E770E945C7A0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 45a48d943c4b620696099131297fda6c112e3d5371cf75be01848fd8d7c6d060
                      • Instruction ID: 1561266de7bd11c009cd2b9b84f895c1cb3192efa72b5342460b341c186636e7
                      • Opcode Fuzzy Hash: 45a48d943c4b620696099131297fda6c112e3d5371cf75be01848fd8d7c6d060
                      • Instruction Fuzzy Hash: 9431F4B1D123189FEB20EF99C5847CEBBF5AB48314F648419E808BB350C3B55949CFA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e9ec25675d67d972c1cadff6cf7dd0a92f8b47db21cea775f8aae8d4eca499a3
                      • Instruction ID: 2960da8187428e7427c19a693d3744bdb1dc07a1b4e3bab589ff43877868ff6e
                      • Opcode Fuzzy Hash: e9ec25675d67d972c1cadff6cf7dd0a92f8b47db21cea775f8aae8d4eca499a3
                      • Instruction Fuzzy Hash: F5214D757006009FCB24CF15E884BAA77BAFF99721B11805DEA4687791CB31FC46CB10
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ffd0245bc10bdd428e8a4db4b8dbde7cf637a5e17ec167a9c411752e12361d5e
                      • Instruction ID: 6e6b3d88824da5d48beb3b9f81e9aa472c30296e45dc07eb3e1bbabc35e9da9b
                      • Opcode Fuzzy Hash: ffd0245bc10bdd428e8a4db4b8dbde7cf637a5e17ec167a9c411752e12361d5e
                      • Instruction Fuzzy Hash: 2F31E3B1C113189FEB60EF99C584BDEBBF5AB48314F648419E408BB254C3B55845CF91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dd4e4ca0a0aa2d2fcc9303681b5421c09e1b1479def4be2d8269ef4b0a0d8bec
                      • Instruction ID: 0a73b8d9aed683140270483a0692a1b905364d44d01f137cdd9ac5f18fb902d9
                      • Opcode Fuzzy Hash: dd4e4ca0a0aa2d2fcc9303681b5421c09e1b1479def4be2d8269ef4b0a0d8bec
                      • Instruction Fuzzy Hash: DF2188B5A007158BD320CF65C880AABB7F9FFC8714B018929E8099B320E770ED45C7A0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dae6c94b229e8374be9876e21835f16b83e48778c61a23e0df10aee72207922b
                      • Instruction ID: 98a5b88880aafeb23c9da61ea6bd061e13b996ef644b8a3d99f7d09457ffd3bb
                      • Opcode Fuzzy Hash: dae6c94b229e8374be9876e21835f16b83e48778c61a23e0df10aee72207922b
                      • Instruction Fuzzy Hash: 8A11A3F5A103065BAB65EE7988405BFB7FBEFC82607604529E419D7340DF70DD0247A1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6ab8bcbcb89d7dec1e34d8bafd84a56848da3b88bc33896b05e51f71da6307ee
                      • Instruction ID: f72ff82240702ad21afb520723f3b318d7281bd6f51d404c7bffd2cbcc22df37
                      • Opcode Fuzzy Hash: 6ab8bcbcb89d7dec1e34d8bafd84a56848da3b88bc33896b05e51f71da6307ee
                      • Instruction Fuzzy Hash: 421190B1B1D3849FEB05DB748829ABE7BF89B4210471544FBD84ADB282E934ED058312
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 155de7c9d509fb71482de97f9a4540f831ad16b3dde4683ae9676669d3a40964
                      • Instruction ID: e559e672e3af3f245acac25750ae75bcb1a6541f788b5375cd051586cfb02a93
                      • Opcode Fuzzy Hash: 155de7c9d509fb71482de97f9a4540f831ad16b3dde4683ae9676669d3a40964
                      • Instruction Fuzzy Hash: 7F1127366056509FDB026F64E41475ABBE2EF85310F11C069D5469B2E6CB38DC46C792
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 62b51df93c1380a188c21b8d9b17a82b02d33755fd6fe6ec4efb03bf714cf31d
                      • Instruction ID: 56207707083dfac44dc3dff5534211e2eafcb65f1c3d0ab3f36d988a3526de87
                      • Opcode Fuzzy Hash: 62b51df93c1380a188c21b8d9b17a82b02d33755fd6fe6ec4efb03bf714cf31d
                      • Instruction Fuzzy Hash: 7721E875E0024A9FCB05DFA9C8848AEFBF5FF99200B14825AE414E7211E771A956CB90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6d1e7f051264ba0a70861fe06e8c9a3f6bf24f8155acc76c6e08776a4b511b69
                      • Instruction ID: 8a1bf35a6b68f2d7f9a3ad5dd554c03670fc627268d3aea8736246f601d74e77
                      • Opcode Fuzzy Hash: 6d1e7f051264ba0a70861fe06e8c9a3f6bf24f8155acc76c6e08776a4b511b69
                      • Instruction Fuzzy Hash: 12211F71E1020A9F8B04DFADC8449AFFBF5FF88300B10C51AE515E7214E771A951CB90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1383806055.000000000094D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0094D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_94d000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c0d6526f9c931929f6d06f2c6ea0aa0bc55d6e50adaa859ceb3a421584d53395
                      • Instruction ID: f8a7fc01390d0883115bbe4056ca017363ba20395bc0dcdfaa27c3a6265af369
                      • Opcode Fuzzy Hash: c0d6526f9c931929f6d06f2c6ea0aa0bc55d6e50adaa859ceb3a421584d53395
                      • Instruction Fuzzy Hash: 1C2150755093808FDB16CF24D994B15BF71EB46314F28C5EAD8498F6A7C33A980ACB62
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 003af561ea926066ec1ef6249f648583753b9f55290929e0d52479b2701f5807
                      • Instruction ID: a460144c12296f8af4f8cc4060a075bc806164fcf8acfd279112d49bb8cb8c5f
                      • Opcode Fuzzy Hash: 003af561ea926066ec1ef6249f648583753b9f55290929e0d52479b2701f5807
                      • Instruction Fuzzy Hash: 2C21A5B4A01908DFD744DF9AE284999BBF1FF9C300B6280D5D4499B329DB35EE51DB04
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e66d12cefccaa04d03d24891d7c31b48df78f50e4a7179fe96755e60cb34ff2f
                      • Instruction ID: bcbc88d5b9a8ee1fe1e2d3ac63b551111a6188a6df5bc81ba6292eb6ca4aa306
                      • Opcode Fuzzy Hash: e66d12cefccaa04d03d24891d7c31b48df78f50e4a7179fe96755e60cb34ff2f
                      • Instruction Fuzzy Hash: EB11E3B5A013064FAB11EF7988405BFB7F7EFC82207544629E419D7340DF309D0687A1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1f891a8350534568c888079b47d19bf696cb743387a96e5e8aafa77df0fb1633
                      • Instruction ID: 74577e649a9d82057407719495b3ffc9343da6f0042e3d33acefc3edb1e9e6f6
                      • Opcode Fuzzy Hash: 1f891a8350534568c888079b47d19bf696cb743387a96e5e8aafa77df0fb1633
                      • Instruction Fuzzy Hash: 9611A3353003008BE7259F25E894B6AB396ABC6314F54C5BDE84A9B2C4CB71EC468B91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7815ac0b67eda75df8f4b0b67442d4b12b392da19e46897a024c222c2933c56c
                      • Instruction ID: 02524a8406c4bdfddd8d70d61dca1e0a16d79263d12917908f7d14ad492d4f97
                      • Opcode Fuzzy Hash: 7815ac0b67eda75df8f4b0b67442d4b12b392da19e46897a024c222c2933c56c
                      • Instruction Fuzzy Hash: E5112931B246008FE7249BF4E48574FBBE6FBC9704F50892ED286DB685DB70B5118B50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ed1953f032dec0be846f5c40af1dddd08bf7dd3c6bc476449770701d6b941ae3
                      • Instruction ID: 3ffecfebc06dece246c172079ce122a215be4ebac25aba8f5645aeae6717e5bb
                      • Opcode Fuzzy Hash: ed1953f032dec0be846f5c40af1dddd08bf7dd3c6bc476449770701d6b941ae3
                      • Instruction Fuzzy Hash: E91100703547004FE7056BB4D49138A7FD6EB85B08F20816DE1419FBE2CBB6A8578750
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 269a9f3744f1e883a165c0df3f283d7f7743548f5cd306aef8e0114473b14869
                      • Instruction ID: f208e544d2a1fb4e0035b6991bd90185aa60133c753d17de469cee1e5fa8d04d
                      • Opcode Fuzzy Hash: 269a9f3744f1e883a165c0df3f283d7f7743548f5cd306aef8e0114473b14869
                      • Instruction Fuzzy Hash: 672141B4AC5341CFE7489FB0F4996693BA2F798720F024829E9165F3C9CAB41C52DB11
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f7a991ee2d1f00976d75602ed5422caf7c1a4bd62b0ca92909bfde6ace9b0442
                      • Instruction ID: dc65307c31b06d470b7884067bb5f8043f42e1489dac3cf2ab084f7cf84d1c2b
                      • Opcode Fuzzy Hash: f7a991ee2d1f00976d75602ed5422caf7c1a4bd62b0ca92909bfde6ace9b0442
                      • Instruction Fuzzy Hash: 3311E5353003005BD724DF65E894B6A7396EBCA314F54C5ADE4099B2C4CB71EC428B90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dd109568b01fb7ae6ef2a0b0b069dd308977c075e4648e0332b6aba1c86dc36e
                      • Instruction ID: 2421f7a37a7608af848897227db6c31c3e53d6c4a1fa30f359ab6745231f3c66
                      • Opcode Fuzzy Hash: dd109568b01fb7ae6ef2a0b0b069dd308977c075e4648e0332b6aba1c86dc36e
                      • Instruction Fuzzy Hash: 05114CB1B4030A8BDF94EBB998106EEBAB6BF88310B604179C509E7340EB319D05CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2d11de2175e2cfa701a434866c2682e41e4c117cd704bf602c48e900513b7659
                      • Instruction ID: 5357e0e5f108d47dbba4b6eaacf606c2f4ec34cbc7a625fc0d3b186914ac9c68
                      • Opcode Fuzzy Hash: 2d11de2175e2cfa701a434866c2682e41e4c117cd704bf602c48e900513b7659
                      • Instruction Fuzzy Hash: 1D21C4B4E14209DFDB80DFA9C1809AEBBF5EB4D300F2090A9D809A7751D730AE40CFA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9134194e5e3a90ee84e288c2b8fdc804479ef17de5201923b99e881e93357b86
                      • Instruction ID: 3312041618bdf655fe625463eefeda5a4537a81237ad93113c4add8151b2ebe9
                      • Opcode Fuzzy Hash: 9134194e5e3a90ee84e288c2b8fdc804479ef17de5201923b99e881e93357b86
                      • Instruction Fuzzy Hash: 302114B59043499FDB20DF9AD844BDEBBF4FB48310F14842AE919A7310C374A944CFA5
                      Memory Dump Source
                      • Source File: 00000000.00000002.1383749404.000000000093D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0093D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_93d000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                      • Instruction ID: 0d92411141c0a9b1dba07c49aa3eb97ea19fc9c87143b5a539204663727e1fcb
                      • Opcode Fuzzy Hash: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                      • Instruction Fuzzy Hash: B211D376504240DFDB16CF10E5C4B16BF72FB94324F24C6A9D8490B666C33AE856CFA2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a6e0ac057107068f72f3d6ee85dee4d595780f3920efda391c7824a9695e0e70
                      • Instruction ID: 69ec9bf4ec65d41ec0e5adbdfd17ea7aa2d68a46808ff038fbbf469ce99778d2
                      • Opcode Fuzzy Hash: a6e0ac057107068f72f3d6ee85dee4d595780f3920efda391c7824a9695e0e70
                      • Instruction Fuzzy Hash: 3D1148363083409FDB066BB8D8506AE3BE3AFC9240715C066E146CB3A2DF288D0697A1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5a9616a0a42548636321e0c44d03fe61698bcca6bea1476c751b04454aa5b7b8
                      • Instruction ID: 25b6781e53ee342263deca56c53f3e772d72490f8f73ee16e1464d7a93e91d05
                      • Opcode Fuzzy Hash: 5a9616a0a42548636321e0c44d03fe61698bcca6bea1476c751b04454aa5b7b8
                      • Instruction Fuzzy Hash: BE01D4767416105FD3049B69E844DAABBE5EFCD220B19C076FA0DCB321CA30EC01CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d1f9237c582e1e1e08372970a4c8ce870fe9b176d7fa38ad5a9be565b9ab4ff5
                      • Instruction ID: 3a49c85107bc383e7df3d9be4f32fc2f0e4c1c11cc50095d6795c39b829ac61e
                      • Opcode Fuzzy Hash: d1f9237c582e1e1e08372970a4c8ce870fe9b176d7fa38ad5a9be565b9ab4ff5
                      • Instruction Fuzzy Hash: 5F11A131B706008BE714ABE8E44575FB7DAE789704F50892DE286DB784DEB1B8114B91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c0e37a67b70830c6483cbec5e2e67669e9d68198a081febed1aaee888eba5be2
                      • Instruction ID: 6e8c84c768c90fa968067000c9ca879c316c3ba837f58028c899a05f41fc833a
                      • Opcode Fuzzy Hash: c0e37a67b70830c6483cbec5e2e67669e9d68198a081febed1aaee888eba5be2
                      • Instruction Fuzzy Hash: 43210EB4AC1341CFE7489FB0F4896693BA2F798B20F014829E9165F3C9CAB41C91DB11
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: acfa4d8d1baad691869033c2742eefd39efba0ed3bc12758e1ae8448474ec55c
                      • Instruction ID: 468a61c88754256f47665ca933e8fd36d146f35ea54c89136fa2c34525bb179d
                      • Opcode Fuzzy Hash: acfa4d8d1baad691869033c2742eefd39efba0ed3bc12758e1ae8448474ec55c
                      • Instruction Fuzzy Hash: 9C11CE70A163849FDB46EFB4E95818C7FB0FF66204F0480DAC046EB243EA346E49CB52
                      Memory Dump Source
                      • Source File: 00000000.00000002.1383806055.000000000094D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0094D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_94d000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                      • Instruction ID: 66e55ac0f59415f9a5cf2ab8fb9f2df410b30793683d4aa1419b9e6a504f3530
                      • Opcode Fuzzy Hash: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                      • Instruction Fuzzy Hash: 84119D79504280DFDB16CF10D5C4B15FBB1FB84314F28C6AED8494B696C37AD84ACB61
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b8da39c407d6916af5a938c49f6c03588b08d0b0ed55f0b0c8cf94dcbe7200b5
                      • Instruction ID: 6be97a4f5f1c9e8e546bff1c9f3475acb36f75c179d57bf63031831d0b67670b
                      • Opcode Fuzzy Hash: b8da39c407d6916af5a938c49f6c03588b08d0b0ed55f0b0c8cf94dcbe7200b5
                      • Instruction Fuzzy Hash: 7211E2B5D007098FDB20DF9AD444B9EFBF8EB58310F14842AD819A7250D374A945CFA5
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6c52e16d478e536c0b35145b2632de9b7b82a573ad66b245acf10486d96b4139
                      • Instruction ID: 971bdafc0fe15ad4927faf8fb69532ffbf29e615d89728cc705f7b60fcf13842
                      • Opcode Fuzzy Hash: 6c52e16d478e536c0b35145b2632de9b7b82a573ad66b245acf10486d96b4139
                      • Instruction Fuzzy Hash: FF112AF4E18208DFDB84EFA9D4409ADBBF9FB8D300F109595C458A7741D7B0AA408F80
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 40645f2eb3827b8f41530248ec7384e30f176b0e77214775fc9ff932da89327b
                      • Instruction ID: bd4291043cba9b202ed39c7f1cfeeafcedd91b14d97816d34adf193eaedfe4e0
                      • Opcode Fuzzy Hash: 40645f2eb3827b8f41530248ec7384e30f176b0e77214775fc9ff932da89327b
                      • Instruction Fuzzy Hash: 4E11EFB6D006498FDB24DF9AD444BDEFBF4EB89310F24841AD859A7210C374A545CFA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cc36966dbcae1de0caaaf9b7685698889deeae3bab02accd14e85d58618234cb
                      • Instruction ID: 7389fd500f1270e894658a17501777c834d7e3b0be070f03e452cc7430ba32a9
                      • Opcode Fuzzy Hash: cc36966dbcae1de0caaaf9b7685698889deeae3bab02accd14e85d58618234cb
                      • Instruction Fuzzy Hash: 63F058B391D2C12FDB0356A01CAA8E43F75DF2724831A01DAE6C48E1A3E4274A1FD762
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6c89409bee705b345e4552af2e61f270c90614798dba3f0c858e742866cb2e80
                      • Instruction ID: 941dda9323ccecd74d0781248f560368a6e5506188c11dfca35bc5267d7896c4
                      • Opcode Fuzzy Hash: 6c89409bee705b345e4552af2e61f270c90614798dba3f0c858e742866cb2e80
                      • Instruction Fuzzy Hash: 9C118E70E00209CFEB24EFB5E1147AD7AB2EF88318F548439D401AA2D4DB7959958FA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 11b66afee4f1a330bb9db3ae4b1f1f9dd135b9f9db5d29d1bca1008d26f040b7
                      • Instruction ID: 80662874955040d95cb5c3e7cb4deef55e3df94c53143441b352a43ba279f122
                      • Opcode Fuzzy Hash: 11b66afee4f1a330bb9db3ae4b1f1f9dd135b9f9db5d29d1bca1008d26f040b7
                      • Instruction Fuzzy Hash: 63018CB0648749CFE3459B29CC55B213BB2AF86600F5AC0D6E14A8F2B3CA35D801CB11
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2580828cf444c2df2e3ef9612c45b42cf3770ca59a6e0140b1584abafa2237c6
                      • Instruction ID: 8959fb3d15ff58c74ff5e14243c12d1a2bfec5fdc4ddaa8cc164fbf168eb2d61
                      • Opcode Fuzzy Hash: 2580828cf444c2df2e3ef9612c45b42cf3770ca59a6e0140b1584abafa2237c6
                      • Instruction Fuzzy Hash: B71103B59003488FDB20DF9AD485BDEFBF4EB48320F24841AD969AB341D374A945CFA5
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 657f540b5a78f5713d939d282e16aa910a8a82c76967912cb1827032ad18740d
                      • Instruction ID: f7f0df6ebee3b6474b2987c0b6515be0065ba1dcbd99e516e1e5742b51b163d7
                      • Opcode Fuzzy Hash: 657f540b5a78f5713d939d282e16aa910a8a82c76967912cb1827032ad18740d
                      • Instruction Fuzzy Hash: 5E012B74B002149FEF02BBA8A8505BE7FB5EF89214F0080BDE505AB3C0CA341906C7A5
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 87dcead67036a7185bb1a9bfcdd9251cb99f6d5b8bb50c46b2f3c6fb6c815643
                      • Instruction ID: d36c7afb06a323ca3f0e1e3ab3cfd0c95f049f62eb4c5c191d050b7cbfb73e15
                      • Opcode Fuzzy Hash: 87dcead67036a7185bb1a9bfcdd9251cb99f6d5b8bb50c46b2f3c6fb6c815643
                      • Instruction Fuzzy Hash: A811F2B59003488FDB20DF9AD448BDEBBF8EB48320F24841AD969A7341D375A944CFA5
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 97d36bb0f2eb074e71c59b19a5c39d43d6e55bbe490b032a79c44aea13516574
                      • Instruction ID: 2f332cbc90b93142d3d26b46cb9778f128d4446b27058c9862dfe48bcbef68c4
                      • Opcode Fuzzy Hash: 97d36bb0f2eb074e71c59b19a5c39d43d6e55bbe490b032a79c44aea13516574
                      • Instruction Fuzzy Hash: 6511F2B59003498FDB20DF9AD448BDEBBF8EB48320F24841AD959A7341D375A944CFA5
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 158399940e3a8f3e46d1f6551994ef9c088ab0a89a8f0bd60abf8eaa60d62b0c
                      • Instruction ID: f2a13890e05267db0f7493268d9baae3e027c389642f7e037fa78b00a4c4b5a7
                      • Opcode Fuzzy Hash: 158399940e3a8f3e46d1f6551994ef9c088ab0a89a8f0bd60abf8eaa60d62b0c
                      • Instruction Fuzzy Hash: 680147F171460497E3449E2A9C80303FBAEBBCA210F64C13BDA1EC7612CB70990086D2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1b81a1f342179a36a8f8688436d706b935bbecdccaaa3478279e6004bc708ee1
                      • Instruction ID: 8b6b8e03269dd32e7a5946821826ca4db6ff7e6dd871fae4e99988a2aef693c7
                      • Opcode Fuzzy Hash: 1b81a1f342179a36a8f8688436d706b935bbecdccaaa3478279e6004bc708ee1
                      • Instruction Fuzzy Hash: B71109B1D006588BEB58DFABC80479EFAF7AFC9300F14C47A940D66254DB7409468F90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cc24b5fb77dc6cf2581c0df7439b592fbc839b11e291ba44d874ec82af21a7bb
                      • Instruction ID: 3b556e5aab8cf7aac2c7f9a28400d74d794676b6e0445f60a5e02492b4bcc375
                      • Opcode Fuzzy Hash: cc24b5fb77dc6cf2581c0df7439b592fbc839b11e291ba44d874ec82af21a7bb
                      • Instruction Fuzzy Hash: 6F01F7B03163418FF385A738A5087997BE7DBD6240B4494A6E14BCB795CE30DC078740
                      Memory Dump Source
                      • Source File: 00000000.00000002.1383749404.000000000093D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0093D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_93d000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0b8cf538317f94519096a9c7a6d6cbcc0de172d124557bad07d365112216e7e0
                      • Instruction ID: c324640c5a472dc2c074d3f38a3035c91c47ad551cdda01330ea34faacddec80
                      • Opcode Fuzzy Hash: 0b8cf538317f94519096a9c7a6d6cbcc0de172d124557bad07d365112216e7e0
                      • Instruction Fuzzy Hash: 1B01A7B14053409FE7205A25EC94766BBDCEF51324F28C81AED0A0B286C2799840CE72
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f6bee8e2b952476cbd597a95239b5155a811de7c68a4f56567b1ec1bf51236ca
                      • Instruction ID: 921794bdbfc5711b9712fbb0bb39ae97e073b00058d4be764bfad83e84e2f5b0
                      • Opcode Fuzzy Hash: f6bee8e2b952476cbd597a95239b5155a811de7c68a4f56567b1ec1bf51236ca
                      • Instruction Fuzzy Hash: 2D0184353043409FDB15DB64E450E657BB6AFC6320B69C0AED48ACB666DBB1EC06CB90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 40574b5d6afc1f3ef1373996f66b9d63ae5fa296d45313210e1059e2625843bf
                      • Instruction ID: f7dac5cc988fe396f7acadb036930efe9769d46720b83c97ec9b464dedb7daf5
                      • Opcode Fuzzy Hash: 40574b5d6afc1f3ef1373996f66b9d63ae5fa296d45313210e1059e2625843bf
                      • Instruction Fuzzy Hash: B6018F36A11614CBD718AF36D81449ABBB7FFD8721B00453EE51783750DB79AC16CB90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0c8492eef473b2b131c41f7a849041827f26f69cae363d961758453ae07697fe
                      • Instruction ID: f6c40a2615e79ae70cce4eccc60e6609a15966da0e2ce5ced5f66cf8bc1baf8b
                      • Opcode Fuzzy Hash: 0c8492eef473b2b131c41f7a849041827f26f69cae363d961758453ae07697fe
                      • Instruction Fuzzy Hash: DD018FB4E1A208DFDB44DF64E040AACBBBAFB8E300F0090A9D80A97B45C7349E41DF40
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7b7a5d808cd50076a741d9182f75b5ee79a56db32336116b9767e9da0220de4c
                      • Instruction ID: f657175dc911b8d819db1ffa09e0901e20cded7ccf1c40dee1c9d7f3ecf82ee0
                      • Opcode Fuzzy Hash: 7b7a5d808cd50076a741d9182f75b5ee79a56db32336116b9767e9da0220de4c
                      • Instruction Fuzzy Hash: 24F0C8B1B083449FEB09EBB568141AE7FF6CFC1200714C0FED405C7285EA38E90283A5
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: db02d388b0139459b95bbe2edb544aff34507443e462220986aaf8e0829a5e89
                      • Instruction ID: 7f7b30959ebdc568d90f59b454b915ebe135eccd53ffbe6080dd582e83912802
                      • Opcode Fuzzy Hash: db02d388b0139459b95bbe2edb544aff34507443e462220986aaf8e0829a5e89
                      • Instruction Fuzzy Hash: D6F0B43634031417FB246279B855BEE328B97C5B15F04C03BE609DB6C4CEBAA84283D5
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 85c7a4e53ad1d68bb5250f5faac7a6c38d924e12b4ff5c3b8a4d011a28e30a69
                      • Instruction ID: cc143cc4623a64ec23b508505652f9352a1d2825dc5aa8c05ec9d8cc74a8663f
                      • Opcode Fuzzy Hash: 85c7a4e53ad1d68bb5250f5faac7a6c38d924e12b4ff5c3b8a4d011a28e30a69
                      • Instruction Fuzzy Hash: B9F028F171471597E3489E5B9C80203F7AFBBCA610764C13B9A1EC3611CF70E9508AD2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bdbbddb015e30898ae348bd87e960cfc12a9304d56c24c61fdb817411ef3f734
                      • Instruction ID: 23ed80b9397e0e2f3393c2ee6e12b5fc08142845eae1cb1047d476be9e941740
                      • Opcode Fuzzy Hash: bdbbddb015e30898ae348bd87e960cfc12a9304d56c24c61fdb817411ef3f734
                      • Instruction Fuzzy Hash: CE01E8B4A45208EFDB44EFA4C548AADBBF9EF49200F669094E80D9B352D730AE00DB41
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: aaf89b31c790795b9478eecad3fef87df6b49c000be0ae767b286975063d18ef
                      • Instruction ID: b71dd03325fcb53016f58e7147a93f70e733f901a712c00a2acca0f6af5516e1
                      • Opcode Fuzzy Hash: aaf89b31c790795b9478eecad3fef87df6b49c000be0ae767b286975063d18ef
                      • Instruction Fuzzy Hash: 4D01A4B0711301CFE384AB38E54975576DBDBC9241F448465E50BDB755DE70DC128750
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 78c9b117f7369d08d692f743d0fcc9bf8dfdaff27c8e4d8f57da4ef7965de79a
                      • Instruction ID: a9e1d88f64da4a83b84f02af318ac24b800ef66c3f6f9fa96b00212496063547
                      • Opcode Fuzzy Hash: 78c9b117f7369d08d692f743d0fcc9bf8dfdaff27c8e4d8f57da4ef7965de79a
                      • Instruction Fuzzy Hash: 5701B0B0D05218CFDB88DFAAC9405EEBBFABF8D200F149169D809A7315E7349A41CF60
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fca4eb02f89a90a96bf8c58e1a3f2c0eb728fd566aca5f5e919468ed628c9ec2
                      • Instruction ID: 9cd8f1ef484871529357b238e048e00248ef3965a949e93e45c8990bf5645bcd
                      • Opcode Fuzzy Hash: fca4eb02f89a90a96bf8c58e1a3f2c0eb728fd566aca5f5e919468ed628c9ec2
                      • Instruction Fuzzy Hash: E3018174694A45CFE344DF15CC8AF947BA1EF06714F5AC0DAE11A8F2B2D675D801CB04
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0624cb3e8797811f8e1a16c82f4c05fe003fd275fa8bda13f7ae0c17e1bab1a9
                      • Instruction ID: 086b07986b153baebb7137aebedd87ea6f35b646c0e638ff41502ab03b560323
                      • Opcode Fuzzy Hash: 0624cb3e8797811f8e1a16c82f4c05fe003fd275fa8bda13f7ae0c17e1bab1a9
                      • Instruction Fuzzy Hash: 110181303507104BE714AFB9D01479B7AD6AB84B08F10816DE14A9B7E5CFF6F8468790
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 09dba8b54d8311922be220390f33488605443a8acd3d9835f06bdc897849d3b4
                      • Instruction ID: 39b3ccdbbc9f549a8d70a2415e755c566de239e5eda8f5c461b382e1a235f8d3
                      • Opcode Fuzzy Hash: 09dba8b54d8311922be220390f33488605443a8acd3d9835f06bdc897849d3b4
                      • Instruction Fuzzy Hash: 41016D353002018FC714DB69E840E26B3EAEFC6360B64C469D40ACB765DBB1EC02CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 53a4bba83e79fabe006111d53fd2fd77962dc871bedd697fde9bca5703f406d6
                      • Instruction ID: 2e0a4fc8d2202b254f6d1aeabf75067a1508d0fee0dcd555a31f129d20ead1e6
                      • Opcode Fuzzy Hash: 53a4bba83e79fabe006111d53fd2fd77962dc871bedd697fde9bca5703f406d6
                      • Instruction Fuzzy Hash: 60F02B75B001149BAF15BBA8A9505BEBBBAEFC8754F40403CE505B33C0CE352E0587E9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cb1f152a8f3ae4a5669ec2863ae9ebd9762c888b77af95ec7736c9c1e4ba4d92
                      • Instruction ID: f4131bea2ba9bedec35bc58b9ca534f7c7d78c72f200c9e4355cc040f9dcbf74
                      • Opcode Fuzzy Hash: cb1f152a8f3ae4a5669ec2863ae9ebd9762c888b77af95ec7736c9c1e4ba4d92
                      • Instruction Fuzzy Hash: 47F046B17157950BE3558A2AD81001EBFEBEBCB691709C83FD04ECB261D634D9068381
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: eee09f11930093174f41ca9559e66b977527e2461cae0f31f7a0fdcbe58e36c9
                      • Instruction ID: 6ae5f0e4e2a15925ec6f3276ae42b96965d8bfad4855a3cf75d62ea16f8812d4
                      • Opcode Fuzzy Hash: eee09f11930093174f41ca9559e66b977527e2461cae0f31f7a0fdcbe58e36c9
                      • Instruction Fuzzy Hash: CB01C8F190021ADEEB24DF69C8043EE7BB1AB49314F14C269E429AB290D7755A45CB92
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bbaf4fe6c867fd118fd63799b0a32fe3f49bca80b552433c61ac795517f8f928
                      • Instruction ID: 45c12b7d814245ac169a79ee114940dd8944be1ab10b64cdc598263d397e8b81
                      • Opcode Fuzzy Hash: bbaf4fe6c867fd118fd63799b0a32fe3f49bca80b552433c61ac795517f8f928
                      • Instruction Fuzzy Hash: 18F081F095E309DBE744EF55C5005B8B7BDAF5A300F8691A4D40D5B111D7709B01DB90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ba8e8f0f6e1b28d0d074e978f51c0341c7d27c8f1c3daa980aec95bedff4e471
                      • Instruction ID: 1ebb183a05d525d4cbe0e8d308267e932e1d163f980deac461f80d4ec9cf7e7c
                      • Opcode Fuzzy Hash: ba8e8f0f6e1b28d0d074e978f51c0341c7d27c8f1c3daa980aec95bedff4e471
                      • Instruction Fuzzy Hash: 93F09A353022459FE715AF78D840AA93BAAEF9625131544AAF101CF324CAB19C02CB90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1383749404.000000000093D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0093D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_93d000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3e98a41bad16c9e2bc043d3111c9b85c650407f103ee82c94709cbdfe2316366
                      • Instruction ID: c134b8146f07133f8771fc963039cdabc2e48dfa5aa6c69b05a052eb240e6a6c
                      • Opcode Fuzzy Hash: 3e98a41bad16c9e2bc043d3111c9b85c650407f103ee82c94709cbdfe2316366
                      • Instruction Fuzzy Hash: 95F062B54053449FE7248A16DD84BA2FBECEF51724F28C45AED494F286C2799844CEB1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ff8bb641143f58cb9fe164d4990e2034903d173d8786ecf6b79702f32a6647dc
                      • Instruction ID: 73e57dd745e4d650ba80421ef300e66628b4fce1772a2c249d20570dad39a829
                      • Opcode Fuzzy Hash: ff8bb641143f58cb9fe164d4990e2034903d173d8786ecf6b79702f32a6647dc
                      • Instruction Fuzzy Hash: 31F0E933601348AFAF119F98AC101DD3B70EF07328F188162E9A9DB181D334E9229B92
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 56d25249514a8912d6b2eff13a66c23eeb18dcaddbd5d824ce21c8fea51dc545
                      • Instruction ID: 2ea4503f953e2b1f42d6f28baeb46bf52f117bea9fe2bb5135c21a31dbb0ceff
                      • Opcode Fuzzy Hash: 56d25249514a8912d6b2eff13a66c23eeb18dcaddbd5d824ce21c8fea51dc545
                      • Instruction Fuzzy Hash: DFF02EB6B113004FEB58AB38A03409A37EAAF8A60031584B7D14ACB762DE34DC02CB90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7af44f70f1fd95f8f90e9d561e77f7f3bf6b041a88cd33971ffc02f0400409a6
                      • Instruction ID: 3dac2e0b0c1b9cf960e3c204baab8a145deefe9566eedc0a7feebbd2d1763bde
                      • Opcode Fuzzy Hash: 7af44f70f1fd95f8f90e9d561e77f7f3bf6b041a88cd33971ffc02f0400409a6
                      • Instruction Fuzzy Hash: 12F0B472604204AFEF48DF64DC408DE7FB6EF55254B1980BBE009DB360D631E9048750
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: eb57476f67023bf18e4078c2d01b1bfe808a2373078a35e5485eec456d221d0d
                      • Instruction ID: 97b5931a07fe7430760d595e7e3cbccab9841e128a039e176da529c0903a8a57
                      • Opcode Fuzzy Hash: eb57476f67023bf18e4078c2d01b1bfe808a2373078a35e5485eec456d221d0d
                      • Instruction Fuzzy Hash: 15F0ECB9B102008FAB94AB7DA42895B32EBABC9A10360407AE20BC7310DE30DC028791
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b9e4e006ab545db8d64f96b7b9abb34aa624c0b8f967c0733e0c7c6898afe88b
                      • Instruction ID: d0d504d28d652fbd2714668c6b8d4821b7876292f7160d39caf70703490926fc
                      • Opcode Fuzzy Hash: b9e4e006ab545db8d64f96b7b9abb34aa624c0b8f967c0733e0c7c6898afe88b
                      • Instruction Fuzzy Hash: 7E01E8F0900319DFEB14DF6AC8043AEBAF5AF49360F108265E828AB290D7755A44CBD2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4acca8449cad76d877949e31929659ff8242ad297069d933539214f230baca61
                      • Instruction ID: 81c41c32c177005e57ccd708913050837af0a04b6fc1e3bb53d9eef0f44bd50f
                      • Opcode Fuzzy Hash: 4acca8449cad76d877949e31929659ff8242ad297069d933539214f230baca61
                      • Instruction Fuzzy Hash: 5BF03076B041246FA3149A6AE884D6BBBE9EBCC6703218079F91CC7311D9319D0287E0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7e7b87ad6a17fc0d70a872877ed59db3a6541c6a2148b11ad8bdff3336cddeeb
                      • Instruction ID: 2e2d37c4c96f49e9b449106b536f25ba4b0b13cbf45efe9d57e15ac543f6bbe0
                      • Opcode Fuzzy Hash: 7e7b87ad6a17fc0d70a872877ed59db3a6541c6a2148b11ad8bdff3336cddeeb
                      • Instruction Fuzzy Hash: D8F0A0B2B042046FE705EBB5A8415DB7BFADF81210B05C0BAC409DB285E934A9428391
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 38c88650eccb565b11703b63b312a2f015e51aafb82ce9a98ee62fa8c8b39759
                      • Instruction ID: 35a5d08df313c5b79dc702878b1a433043fd2498dba41e59444d8ba57cda457e
                      • Opcode Fuzzy Hash: 38c88650eccb565b11703b63b312a2f015e51aafb82ce9a98ee62fa8c8b39759
                      • Instruction Fuzzy Hash: D4F02471A103144FD70A4A3A881459BBEFBBFD9610F06447AE402C3265EAB09C1987C0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3d64bd2a709541e81231fe0b037f3fdde4729992f23c049cc99186d6b1798135
                      • Instruction ID: e279d9fdeee8b6114238f1b6bec525c9dcafab74fea8d3ec4a08160f8ac5ae4c
                      • Opcode Fuzzy Hash: 3d64bd2a709541e81231fe0b037f3fdde4729992f23c049cc99186d6b1798135
                      • Instruction Fuzzy Hash: 9EF027B171071547E3989A2BDC0051FB7DFEBC5A91705C83FD10EC7220DB74E9468690
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2712939706b058ea5b632b348bc6bd9ec5ba289cf1e49d1efe1aed9397c96a2b
                      • Instruction ID: 6006360a77ab7c07a4fa4ec934fc131f9a592b76ab1d235aa236934cd4ce233d
                      • Opcode Fuzzy Hash: 2712939706b058ea5b632b348bc6bd9ec5ba289cf1e49d1efe1aed9397c96a2b
                      • Instruction Fuzzy Hash: A4F03C74A11209DFCB44EFB8E54859C7BF1FB98205F1040A8D406AB306EA345E469F91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 73a162a757301e9bf5bf9e3d9750b4c750b65a7935f211c9aa8fa5e5c0588eb2
                      • Instruction ID: 4bdf72f36c5badf1af83a8275b461a4d1982b5b5629a99cff2939254e90afaad
                      • Opcode Fuzzy Hash: 73a162a757301e9bf5bf9e3d9750b4c750b65a7935f211c9aa8fa5e5c0588eb2
                      • Instruction Fuzzy Hash: 6BE030767001146F5314966AD884D6BB7EDEBCC6603118079F918C7311D9319C0186A0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f27358e83bc2d0f4bbf05d2f00a6325e91b52826461cd52ab72a1564e06e0305
                      • Instruction ID: 4ba59a8af269cb645ef4886c8c54cfebd097740ef3e24c02b134ed9d55f456ea
                      • Opcode Fuzzy Hash: f27358e83bc2d0f4bbf05d2f00a6325e91b52826461cd52ab72a1564e06e0305
                      • Instruction Fuzzy Hash: E8F09EF88247008BDB084B74D0410CAFBE2FF46500F308317C4A98B551C6304A03DB01
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 33cf622511326dbf8d1d81132c2db62463bd013cbace46e76d2fbdf4ece12d36
                      • Instruction ID: a9ba2f6216397bd34923eaf58114dfa23ce10c356e19c49b3c9b3dd3b8b48c71
                      • Opcode Fuzzy Hash: 33cf622511326dbf8d1d81132c2db62463bd013cbace46e76d2fbdf4ece12d36
                      • Instruction Fuzzy Hash: 41F0E271A042549FCB10DBB8E8086CEBBB0EB89314F04896AC985DB351D734AA1ACF81
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 828d64439c5e0c389c1c6e57e551749fe06087ff029d39429c8f291a40af7125
                      • Instruction ID: 66ca6f500302c93364bf1e3f987971a843be83b96cec05a1f503901753b329b7
                      • Opcode Fuzzy Hash: 828d64439c5e0c389c1c6e57e551749fe06087ff029d39429c8f291a40af7125
                      • Instruction Fuzzy Hash: 63E02232B552401FE7245628E8145BE3BABEFCEB11B0D80F6E009CB7A2CC20DC029391
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 35b09bdaefb8385564d90bd615b3f6afcd3fccdaa774d35600d4b3407b2cb362
                      • Instruction ID: 625174b2019fb87e4bf677cfd48080e572e79385bb9c1ee61efd86426dcabebc
                      • Opcode Fuzzy Hash: 35b09bdaefb8385564d90bd615b3f6afcd3fccdaa774d35600d4b3407b2cb362
                      • Instruction Fuzzy Hash: 86F03C35A102189FCB00DB54D848ADCB3F1FF88721B158099D405BB364DB31AD45CF90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e5a6c61c866709917bf16e3943f0e2b09a51e1b6fd044a39ae171d64c979fc00
                      • Instruction ID: 7fe5bf57cf7c3d0007dbb150d33271631e3fc44a23bf1a24996a87e4d310bc5d
                      • Opcode Fuzzy Hash: e5a6c61c866709917bf16e3943f0e2b09a51e1b6fd044a39ae171d64c979fc00
                      • Instruction Fuzzy Hash: BBF06DF5D14349DFDB80EF98C491AADBBB8FB0A300F005026D81AABB02D37499458B54
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f1801a701677abc49d62877f0be40ba77853498bf0874ce564e3f1201688eceb
                      • Instruction ID: 1bf3b8955b8701f8b7b5407f9c794325ca26e42284e5d96ac8f0059c54cbd6a9
                      • Opcode Fuzzy Hash: f1801a701677abc49d62877f0be40ba77853498bf0874ce564e3f1201688eceb
                      • Instruction Fuzzy Hash: 7EF085A180E2C09FDB039B34ACA91603FB4AD4B30830981C6D4858E2ABE158A527D7A6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cd7fbb5bb91d179ea9a3783fcb27418d49e564d16ffd634e090d83b1418c169d
                      • Instruction ID: c20690a9676dd2211ffb10ddf893f23abd4772c823e8eb44ac212f86406ea4a8
                      • Opcode Fuzzy Hash: cd7fbb5bb91d179ea9a3783fcb27418d49e564d16ffd634e090d83b1418c169d
                      • Instruction Fuzzy Hash: C8F0A935A14106CFDF209F58F5497A833B1FB4432EF448465E005AA1E0D7B8A996DB51
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 55904faa1b9c1780955811f841d3510e72c7e0b16b9b859e27f2db3acf50d949
                      • Instruction ID: 94089f0c7d9067f09e5a5dd8197c67a13a1a9b80a700fae8629518c796800422
                      • Opcode Fuzzy Hash: 55904faa1b9c1780955811f841d3510e72c7e0b16b9b859e27f2db3acf50d949
                      • Instruction Fuzzy Hash: C2F01C353012059BD714AF79D840EAA7BAAEB853513114469F5048F224DAB59C428B90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fae087e59601fc9255a9da8357d06638540ccd237d7ada58416e06ac24909011
                      • Instruction ID: 6b755c74f1ef1ff2377abeb394bc5c01807cf6e64adfaa21fcf69675932c21d3
                      • Opcode Fuzzy Hash: fae087e59601fc9255a9da8357d06638540ccd237d7ada58416e06ac24909011
                      • Instruction Fuzzy Hash: CCF05470E40209CFEB28EF75E4157AD7AB2EF84304F54C839D006AA2D4DF7898558FA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b63154d6717eb985ea86c607016619b2cd9c875220e0b980374b0be36e4b6436
                      • Instruction ID: de99eb2cc1868198894dcddfc9d0758f4aee9665999e4e26df4c2f256ec75b1c
                      • Opcode Fuzzy Hash: b63154d6717eb985ea86c607016619b2cd9c875220e0b980374b0be36e4b6436
                      • Instruction Fuzzy Hash: 7CE0D8717025104FD3419B79E0449963BF6DB8E121320C1A5E90BCB3A6DE38DC034B91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 64fd341e3c73313efafcfc23f797c8ec138c584b40c7f53f903c091109840ee4
                      • Instruction ID: 8ad9223a162865e82a183b907bdf6d9b41e15bdb81e9e4c8c0ddf64a406dd3a3
                      • Opcode Fuzzy Hash: 64fd341e3c73313efafcfc23f797c8ec138c584b40c7f53f903c091109840ee4
                      • Instruction Fuzzy Hash: 96E01AA140E7C0AFDB439B70ECE65903FB4AD1720870941C6D8818E6ABD1185A17CB67
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 990e6320304700206274c45672d881467d88d2c212dc802087d7fb391eff37f4
                      • Instruction ID: 796d85956037a4abcbba7b7b6727db9994d2b646b901141a5c100a47f05b020d
                      • Opcode Fuzzy Hash: 990e6320304700206274c45672d881467d88d2c212dc802087d7fb391eff37f4
                      • Instruction Fuzzy Hash: B6F02BB0906104EFC701EFB0F89145D7FB2EB41204710C5A9D400AB702D6321F12CB21
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2c899f5808ce38e51d351cd73b330d0e9886b35e090f94c477516a67be2f9ba0
                      • Instruction ID: af60abe987d24b08acec00ed37c7741720050509a5a3200c5494aedb8aed12e2
                      • Opcode Fuzzy Hash: 2c899f5808ce38e51d351cd73b330d0e9886b35e090f94c477516a67be2f9ba0
                      • Instruction Fuzzy Hash: 90F01571E02249EFDB42EFA0D8544CDBFB4EB59300F1482EAD806E3200E6306B06DF40
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 038f0a8cbfeabca81609491c1f942202242808e02945cfb6d43351761be46bb4
                      • Instruction ID: a61a9c962005ef7a9c71e8437ac406c25d2f528417681e578a36a3ea0f79725f
                      • Opcode Fuzzy Hash: 038f0a8cbfeabca81609491c1f942202242808e02945cfb6d43351761be46bb4
                      • Instruction Fuzzy Hash: 8AE04F3A1092546FD7025B94D885CC5BFA6EB0A220309C0A6E28A4B273C6568512EB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 23366b6e53510fbb85df3e3a47aa2cce0e9d4f67a9938bad1cf8821f488f76e0
                      • Instruction ID: e32cf4905682a6baf132cc37d53efa0358ad6823a27cd2b67c13cb5a9628ca2a
                      • Opcode Fuzzy Hash: 23366b6e53510fbb85df3e3a47aa2cce0e9d4f67a9938bad1cf8821f488f76e0
                      • Instruction Fuzzy Hash: EEE0D87540D6A09FD7015BA9F0913C07F96D701324F07C061E4455B551C7ECEC668F92
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 551bd18b83a016a6c3c1d376c7761a4063994a75f55ed79969483d78fea6c202
                      • Instruction ID: 0750de49f6a57d5c786c5dc687caa1b48b05bb1a248a0a00226d60a4b6fe1a4f
                      • Opcode Fuzzy Hash: 551bd18b83a016a6c3c1d376c7761a4063994a75f55ed79969483d78fea6c202
                      • Instruction Fuzzy Hash: F3E06D35A002199FCB10EBADE8086DEBBF4EB88315F008929D945D7340D774BA19CF90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 313d1086b90ce33a6c52d01f8f2288740f34afd9ad6cf61fc8405367f70d4df3
                      • Instruction ID: 3b4b141a11be866edee7b5d4e99d17c9fe71a3da5642c82949997d6c6327eb82
                      • Opcode Fuzzy Hash: 313d1086b90ce33a6c52d01f8f2288740f34afd9ad6cf61fc8405367f70d4df3
                      • Instruction Fuzzy Hash: 03E08635700A1427D314666B5804B67B6DEEFC9720B14C02DE919D3744DD64BC018AE4
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3681a452e0ffc4cdc22cf1e5b17b56c6d44c49acbd992671750604130b49b7f4
                      • Instruction ID: cb19dffda7ab243a837a68d2672dce0dc238de2d3a21650092a363f6be9c277f
                      • Opcode Fuzzy Hash: 3681a452e0ffc4cdc22cf1e5b17b56c6d44c49acbd992671750604130b49b7f4
                      • Instruction Fuzzy Hash: 52E026B325470007D302A6BDE4A059AF796AFE56207458F3BE185CB215EBA0EC4A47E5
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 536188bcbfc9d83492cb7f910ba9c22a7e530c977fa6a86959bcb229be986f98
                      • Instruction ID: 47bfdb0eba9f2a300fca16ce58144c6b5f99f0f4da29a672b00fd5130ba8b72f
                      • Opcode Fuzzy Hash: 536188bcbfc9d83492cb7f910ba9c22a7e530c977fa6a86959bcb229be986f98
                      • Instruction Fuzzy Hash: 6CE0C236B505154BCB28AA5DF80497E379BEFCCB21B1884BAE409CB7A6DD21DC019790
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3d19723b8abc3afd381d370be50d59e48856595367fa388c9fda289c27a3708b
                      • Instruction ID: aa7d03b94f18e4efd0464e0153b96d6eca6e40a441d10d0d8999959f119aee97
                      • Opcode Fuzzy Hash: 3d19723b8abc3afd381d370be50d59e48856595367fa388c9fda289c27a3708b
                      • Instruction Fuzzy Hash: A3E026317093144BDB2A2B64A2203CA7FD58FE9740F09C0BFE5098F3C2C9A4A80183D5
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2a903179918a6aa4dd34e01bb0fc40c58d537fb5e04cb16d97bbc365404ec338
                      • Instruction ID: 5b576955845ea836be4bd60926c269e128cdd7ef03cc33d0130cb80f9dcd8d77
                      • Opcode Fuzzy Hash: 2a903179918a6aa4dd34e01bb0fc40c58d537fb5e04cb16d97bbc365404ec338
                      • Instruction Fuzzy Hash: 33F08C746107108FD714EF38E18595A3BE2EF94200B508929D003AF660DBB1FD498FA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4e69254007b7c67920487220058860f446ff02a14bb6414ef0410949476eefed
                      • Instruction ID: 262fdd25c1a4192f555ed1959195f7ba383954852b3a25cabaaaa32852155e4d
                      • Opcode Fuzzy Hash: 4e69254007b7c67920487220058860f446ff02a14bb6414ef0410949476eefed
                      • Instruction Fuzzy Hash: E1E0C2B2D010389BDB20AFE898440DEFF35EB16710F458122E915AB700D3304612CBC0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c528d7ce15effc0abf58217ff9caf059a464b911c04dcf0e0fd89726870f5275
                      • Instruction ID: 71567fab99c916ab678fe9b2ae1365ee7c7e255a2a8367523965e4fdc87aae4a
                      • Opcode Fuzzy Hash: c528d7ce15effc0abf58217ff9caf059a464b911c04dcf0e0fd89726870f5275
                      • Instruction Fuzzy Hash: 7FE04F322402048FC725EB18D888BD933A8EB4A354F9985F2F509EB315CA75BC818781
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4e228e61e44b3ab9af963d83e213deac7eefe10ad6426dad0859064f5d98d900
                      • Instruction ID: 89b6944cf4f8ec3939b1d87683c9840ed940dcf5c6f709b60b40c932afae98fe
                      • Opcode Fuzzy Hash: 4e228e61e44b3ab9af963d83e213deac7eefe10ad6426dad0859064f5d98d900
                      • Instruction Fuzzy Hash: D2E086A180DF486AD7027BB875410DDFF30DE53204F4616E6D9C466195ED3649BAC353
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 74bb5505148912509020b09e2e368486d8c9b2865a4c52a41c7fc818833776e7
                      • Instruction ID: 6438a86f327cd58ccbc4802aca1c9e9da869975c41948ab05ac1c17647cf6a4b
                      • Opcode Fuzzy Hash: 74bb5505148912509020b09e2e368486d8c9b2865a4c52a41c7fc818833776e7
                      • Instruction Fuzzy Hash: EAE0C2757021244F8344EBA9F448A5737FAEB8D521320C064F90AC7364EE34EC028B90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a4eefff24e147cf9e421dc2aa87324e70abdd42a0a1b462bdd14841c480d80b8
                      • Instruction ID: 45954f1b52847607d67f73f8b4706720c77212d1a8bf35dafb2ef3a52fc13788
                      • Opcode Fuzzy Hash: a4eefff24e147cf9e421dc2aa87324e70abdd42a0a1b462bdd14841c480d80b8
                      • Instruction Fuzzy Hash: 10E0E5356100168FCB10EF68F448BEC33B1FB4832AF4480A4E005AB1A0CB78A996CB50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 09de9b49215a4f3a30b795bc525947a0b9751fffd29695662a9cdf5f47adf47b
                      • Instruction ID: 82fdf107880811abeacc452ea182afd467bc2d6c3f4e31ab0438b7c1e5c0eb72
                      • Opcode Fuzzy Hash: 09de9b49215a4f3a30b795bc525947a0b9751fffd29695662a9cdf5f47adf47b
                      • Instruction Fuzzy Hash: A9E09A75D0120CEFCB40DFE4D5448DDBBB5EB48200F1081AAD806A3200EB356B56DF80
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 22b069874a319ebdc627fcbb3f829715f180996432bb8d4bef1b6d002d6f9305
                      • Instruction ID: 50514f51e1b33df830c6035a343cd176d9b019765604c608c418bb44dd127f07
                      • Opcode Fuzzy Hash: 22b069874a319ebdc627fcbb3f829715f180996432bb8d4bef1b6d002d6f9305
                      • Instruction Fuzzy Hash: 4FE08C74A01209EFCB04EFA0E84095DBBFAEB45214B6086A8D805AB305DA726F009F61
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a97648ba65ad375b525d7ad0c0871c06d49c41e214bb76b80e66279f751fc57b
                      • Instruction ID: 434baa48ae023f02f2a629abc4baa8b273f755e0e943f6e91bd7a229a6fc5294
                      • Opcode Fuzzy Hash: a97648ba65ad375b525d7ad0c0871c06d49c41e214bb76b80e66279f751fc57b
                      • Instruction Fuzzy Hash: 6ED01271D08A0C92D7127BF8A65516DFF34DF41315F404AD1A88471184EE32A9B882A6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ebf00d13b20b0f42d00c36817ca76c2248aec1085bbd91e46f80f8392dddb2c1
                      • Instruction ID: 09393a7f61676db7e68cab8228acb6fae0139ff8085cade1eb6802a471d8f338
                      • Opcode Fuzzy Hash: ebf00d13b20b0f42d00c36817ca76c2248aec1085bbd91e46f80f8392dddb2c1
                      • Instruction Fuzzy Hash: 69D0A7F2E05108CBCB40EBE4E4454EDF734E79A311F004422C51BE7905D3301D29C614
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5196c93f7d5bb20ecc64e0b5027cad1d0a743b990d0964e101343921b68fb5a0
                      • Instruction ID: 400f4c05ec074395c8ea7f06660203f6b0a3bc1f9c151ec5dcc036692321e08a
                      • Opcode Fuzzy Hash: 5196c93f7d5bb20ecc64e0b5027cad1d0a743b990d0964e101343921b68fb5a0
                      • Instruction Fuzzy Hash: CAE0C275A11208DFCB69DFA5C68489EBBB6FF4D201B60052DE406A3654CB35A942CF10
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d39855d94c257a2e5c10316883d44f24b24b39906578ce25114b6555f6265c3e
                      • Instruction ID: 2d4a493172cedce3c877721b7c0a8a07c7da137abb44dd09254b90243a04f3f1
                      • Opcode Fuzzy Hash: d39855d94c257a2e5c10316883d44f24b24b39906578ce25114b6555f6265c3e
                      • Instruction Fuzzy Hash: 57D05B371051147F87025BC5DC44CC5BFD9EB4D270309C056F20E47132C7529410EB94
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dccacacf2e3611816eb96aaf35d7e27f22992759c9521e74e748f3742d9f9762
                      • Instruction ID: b0eb6c27bf392283b1b75ff177c3b90d893736f6bd17848449b83b647d1df9fe
                      • Opcode Fuzzy Hash: dccacacf2e3611816eb96aaf35d7e27f22992759c9521e74e748f3742d9f9762
                      • Instruction Fuzzy Hash: E3D05E313443140BD70D6A89A21079B76DA8FD9751F15806EE5098B390C9A5AC0146D5
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4a956455c71b655719322bdffc85c33628308970bbb75754a59cbea97b99930a
                      • Instruction ID: 7078553ad6ee690131d46003a08ab469907274012f765b2b75f93e230fc605a3
                      • Opcode Fuzzy Hash: 4a956455c71b655719322bdffc85c33628308970bbb75754a59cbea97b99930a
                      • Instruction Fuzzy Hash: A9E0127550A3805FD346DF39490468A7FE59A67104F0D84BFD0C5C7142E5304505C762
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fcc788c89ca91730e34b729ea8219a5e8389f3dd18a4f57a8284d2c23dda9339
                      • Instruction ID: 132e2056100de780f07b6afa5770d3e9517cccf02538cad8dbc24ee1aafa030e
                      • Opcode Fuzzy Hash: fcc788c89ca91730e34b729ea8219a5e8389f3dd18a4f57a8284d2c23dda9339
                      • Instruction Fuzzy Hash: CAD05EB2C00138978B10AFE99C044DFFF78EF15650F418122E914A7100D3700A20CBC0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4d0df60265da53ad2f96b164e2135dd9a39c8c8bd5749da62d6941ce578701fc
                      • Instruction ID: 0fe9e1effbb2fc882ed02d3b9f40947a68af586f920dc8bd710496c067a1b398
                      • Opcode Fuzzy Hash: 4d0df60265da53ad2f96b164e2135dd9a39c8c8bd5749da62d6941ce578701fc
                      • Instruction Fuzzy Hash: 3CE05B762467406FE7425B708800DC93F34AF17324F4491C7F5458F1B2C6329527D751
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 200018af14730a9956541fd8ee7540beaea21d7f851241258eea90538796c0b6
                      • Instruction ID: e309ace55000096ca41fe975b35e156f90fce82fe0ca7b070ab3a334b84c83be
                      • Opcode Fuzzy Hash: 200018af14730a9956541fd8ee7540beaea21d7f851241258eea90538796c0b6
                      • Instruction Fuzzy Hash: F8D0C9B680A7918BD725AB7479511C5BBB1DBA1600B45CCABC0D84B5A3E03A5907D351
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 51ddf118066316f361e260d5936aa4d220fa83c491a9d8c6ffd31bffa745b66b
                      • Instruction ID: 54947c4d0989fc83be26e8d9293a7421128b384715b41f6ed297fd2a1918b4a2
                      • Opcode Fuzzy Hash: 51ddf118066316f361e260d5936aa4d220fa83c491a9d8c6ffd31bffa745b66b
                      • Instruction Fuzzy Hash: 08E0E275A4010ADFC710CF64E198AEDBBB0FB0C304F20C059D402AB2A0CB34A808CF50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 629c593d898dece078100f1b77416313e770cd76fda66f8684f2e268a2ef8e0c
                      • Instruction ID: 85fdf509a233ab9a8e3e9b3ed0eff819bc9a49a374ced3b4950cd9234aa641ca
                      • Opcode Fuzzy Hash: 629c593d898dece078100f1b77416313e770cd76fda66f8684f2e268a2ef8e0c
                      • Instruction Fuzzy Hash: 28C080332001147FD50135C45C01DD67B1DEB45758B14408DF3040F142D553EC1387D1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2edf212cd15dcde46fd17633b7600ddf8e73c9f11de26730996bd3ac5b9adf8a
                      • Instruction ID: 58dbf4bc8ce2bb6b0f16d6e9e47fc9cad93229384e1b36d9d8179048c38bc4c4
                      • Opcode Fuzzy Hash: 2edf212cd15dcde46fd17633b7600ddf8e73c9f11de26730996bd3ac5b9adf8a
                      • Instruction Fuzzy Hash: A6D012AAA4F3C15DF70327308804D847F216E3351C30E84EFC1824E173E412981CC795
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0c9ec222d356b3fea2cd7b1d738a9ec88eab0daa887715db344c4636a51927cf
                      • Instruction ID: 7a6f3c3dc5920b65b2e6332902064638d90b5476b32785c9934dbd625597db96
                      • Opcode Fuzzy Hash: 0c9ec222d356b3fea2cd7b1d738a9ec88eab0daa887715db344c4636a51927cf
                      • Instruction Fuzzy Hash: 2BC08C37300410AEC2019B9CF814AEEBB58DBE46223008016F699C1040C628C7A38BA0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8caafdbebf88f638d8d0174eafee44915485036588ebd800ffb50c39e36a2490
                      • Instruction ID: 7311e8ab51df2814fa4b726cc4fc05f0a27f00d9009242aae14715701e45a370
                      • Opcode Fuzzy Hash: 8caafdbebf88f638d8d0174eafee44915485036588ebd800ffb50c39e36a2490
                      • Instruction Fuzzy Hash: FFC0928981AB842FDB4303B09CE71896F11F4034083CA81CAE8C28AA97D10A42139293
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 021c4efe8e0102b5ce3247077059b9f61b86adde0fd673e0cccf37f7084bcde3
                      • Instruction ID: 3b2ff4bcdc338cb4548046b2c1a62282941dbd5be5326148ab163c66a0e3b076
                      • Opcode Fuzzy Hash: 021c4efe8e0102b5ce3247077059b9f61b86adde0fd673e0cccf37f7084bcde3
                      • Instruction Fuzzy Hash: D3D0227342020C0BF344A360C12298B22877BCA310F69C8208806BB7A2CAF09D868692
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 20e90c97cd988f2011bb8bd77418f0a0bb624db7a9e67db6e5da392704038f5d
                      • Instruction ID: a3f98775030047f061e0f9dd756ceadc555cfed878b466d166c73c53b97c6e16
                      • Opcode Fuzzy Hash: 20e90c97cd988f2011bb8bd77418f0a0bb624db7a9e67db6e5da392704038f5d
                      • Instruction Fuzzy Hash: 04D0C9B1962600CFC799EF68C65052ABBB6FF05705750062CE45B92A50CB35AC42DB00
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 76cca652dc6c7473424a3448c7ad001671bc2eba2b852de42da797e3ba1e1f64
                      • Instruction ID: 4415b1b0de10c5f21dbc288741e350b5ee8c43a70987493934671c241eb53bbb
                      • Opcode Fuzzy Hash: 76cca652dc6c7473424a3448c7ad001671bc2eba2b852de42da797e3ba1e1f64
                      • Instruction Fuzzy Hash: B3C08C36200208BFEB80AFD8D800DD6776DEB08714F50D004FA080E241C673F862DBA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: be1511cb528a765ed0010d5c8e9bfa91e9980b50da7c8bb5b3049b4914b904c4
                      • Instruction ID: f42689035375885fa416f33c4596a726184c4e11fdb03dfbf538302b181534a2
                      • Opcode Fuzzy Hash: be1511cb528a765ed0010d5c8e9bfa91e9980b50da7c8bb5b3049b4914b904c4
                      • Instruction Fuzzy Hash: 17C08C700423098FE2402F90B40C32473B8EB05222F800021E20E018558BB81812CAB1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8a93184f1440f5606a3343d2e6a0676621f867ed2d167107e228e62578c510e8
                      • Instruction ID: 5c87dc849b505201a3dc0af2436f072b3bb3b302e8ad98545266877613fcb3a1
                      • Opcode Fuzzy Hash: 8a93184f1440f5606a3343d2e6a0676621f867ed2d167107e228e62578c510e8
                      • Instruction Fuzzy Hash: 32C08C966AD3C08EF3036F6198226D83F20963320831A00E2C1C3CB243C1106616C327
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 997a2f58c06a728ad366ddbbfe4b13abaeb3d1fe78f091cbf4a1bb50f1e86a28
                      • Instruction ID: e47100468b6532f18db45fe600a82cbcf81c18ca3105510866cf0e9da321151e
                      • Opcode Fuzzy Hash: 997a2f58c06a728ad366ddbbfe4b13abaeb3d1fe78f091cbf4a1bb50f1e86a28
                      • Instruction Fuzzy Hash: A1C0928682E7C81FEB830B740C602C53F20A82380C7CE50D6C8C1EB2ABE1449A07E722
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3d1036092f383d700fce1c5595a4e642282dbaf136b5ed93a91f7f5e68e8d5f2
                      • Instruction ID: 8b1f7dd59f9374d010acc9167c302006151d1be15e3f00cd2abc92b9d100a9b3
                      • Opcode Fuzzy Hash: 3d1036092f383d700fce1c5595a4e642282dbaf136b5ed93a91f7f5e68e8d5f2
                      • Instruction Fuzzy Hash: 56D0EAB4E19209CBDB80DFD4D5446ADB7BAEB4A301F205115D41AA2A40D7796E468F44
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c822f252884b360e2217b44e9347a8c699feee5deeb0992201d1d74becab57c9
                      • Instruction ID: fdf879a1e0f46c6c4b06c9f9dd2a3a6d3834b631c888041d9d942d27108def61
                      • Opcode Fuzzy Hash: c822f252884b360e2217b44e9347a8c699feee5deeb0992201d1d74becab57c9
                      • Instruction Fuzzy Hash: 21B012FA1BD700E2B18136E08850B3F9401ABA7700FC0CC12720F1000084B0F664D32F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 13faa11d2ef2371322cbc0c4c7a2119058db1ab62df6823ee947753f4e7ed035
                      • Instruction ID: 575d9dce77aca4d534793c41510d1cbb9d4a141659bdfb4e32ced51a0f6a2bbf
                      • Opcode Fuzzy Hash: 13faa11d2ef2371322cbc0c4c7a2119058db1ab62df6823ee947753f4e7ed035
                      • Instruction Fuzzy Hash: EDC02BF0C30339CAE1C0FF70C940D6C2BD9AB42A40780862808491A4E5C5701D086D12
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dbccf6d8da5bdd647aca6f309a4e46d64f794b3572a37d9f14bbfa5c23cb92ab
                      • Instruction ID: 626f597fac2c84c9e7f1c8c76780cd48c3b2476e15fae10d1912c4b2317442f4
                      • Opcode Fuzzy Hash: dbccf6d8da5bdd647aca6f309a4e46d64f794b3572a37d9f14bbfa5c23cb92ab
                      • Instruction Fuzzy Hash: 0BA012350021088F8A442768B50D0183B5CDA5410234000A0B40F400144A181D118551
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 955b92a520f27a163c7cab5b2f1c11c898b89de7efbf2e85f38ef03b62bfd8f5
                      • Instruction ID: b4b00b945a2a7ec27d8d5589dfea6f41e4c50c045a90186951c1f8e0dcc74c06
                      • Opcode Fuzzy Hash: 955b92a520f27a163c7cab5b2f1c11c898b89de7efbf2e85f38ef03b62bfd8f5
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388943842.0000000004A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4a00000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6517afa5951aa2e59ba477ce52d701170f00f948e89d497569d12f37cd8abac6
                      • Instruction ID: 199121062302130d35f86bc682c03ff18b726fc8b6265f72643772b8cb69d463
                      • Opcode Fuzzy Hash: 6517afa5951aa2e59ba477ce52d701170f00f948e89d497569d12f37cd8abac6
                      • Instruction Fuzzy Hash:
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID: ax^
                      • API String ID: 0-994873808
                      • Opcode ID: e22ca79dae661c7e0926789c9be157ee9768f5a0dfc16affc5cecc8348dd0c90
                      • Instruction ID: 04acc6ff44832de6881246712ceacc25328c0f428a9a798bd0ac87edabca8d42
                      • Opcode Fuzzy Hash: e22ca79dae661c7e0926789c9be157ee9768f5a0dfc16affc5cecc8348dd0c90
                      • Instruction Fuzzy Hash: 3241C4B1F2835B8FDB80DF99C8805AEFBF9BB99200F068136D409EBB51C234C9018B51
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID: ax^
                      • API String ID: 0-994873808
                      • Opcode ID: 449a79f2671e8716a4a8b63e2e116b0180b880f529488daefc3b979deb5a3e11
                      • Instruction ID: 35f02948d49a7a485ac3992a21a64d6897380f38d74fe03021c6e63757bc5b62
                      • Opcode Fuzzy Hash: 449a79f2671e8716a4a8b63e2e116b0180b880f529488daefc3b979deb5a3e11
                      • Instruction Fuzzy Hash: BB4193B1F2835A8FDB84DF99C8815AEF7FABB99200F168026D409E7B50C274D9018B91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7e7fd6afc2c6b2d61424fb4d85a8bdd6e3c422d894032fa1f8263055ed96e9f3
                      • Instruction ID: e00798083f870437ad743c05ae3c81453985c50864b9cf8d64cfcc1ee7c2493b
                      • Opcode Fuzzy Hash: 7e7fd6afc2c6b2d61424fb4d85a8bdd6e3c422d894032fa1f8263055ed96e9f3
                      • Instruction Fuzzy Hash: 86C197B17017448FEF29EB66C4607ABBBE6AF89704F24446EC1469B394DB38EC01DB51
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fcb939c34bb72f1cf50dc9c6d3941bb71bccc99bd2be9bd0db6a79606bee5f66
                      • Instruction ID: 8521fb18910a4193e03b8046837919ad18caf0e49cccb07b3c69cfa710a87358
                      • Opcode Fuzzy Hash: fcb939c34bb72f1cf50dc9c6d3941bb71bccc99bd2be9bd0db6a79606bee5f66
                      • Instruction Fuzzy Hash: 72E1D774E002198FDF14DFA9C580AAEBBF2BF89304F24826AD414AB359D771AD41DF61
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 95e5f9e11919e824e819a98c39e6618c19835e91b348c0ac51879e03cb113c68
                      • Instruction ID: 74996443a31518629e00a97c486c76d535a99916b1dc230fdb4ca0480e0f17f1
                      • Opcode Fuzzy Hash: 95e5f9e11919e824e819a98c39e6618c19835e91b348c0ac51879e03cb113c68
                      • Instruction Fuzzy Hash: 45E1E874E002198FDF14DFA9C580AAEBBF2BF89314F24826AD814AB355D770AD41DF61
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a481b1c448f2051d45a63b63d12f0b76ee0337512365b46fbf23acb89cf4c0bc
                      • Instruction ID: dcf60c38b024c3e0b490e4fa658e14cf0b2483e201cd4d6355bf4f1507e607ee
                      • Opcode Fuzzy Hash: a481b1c448f2051d45a63b63d12f0b76ee0337512365b46fbf23acb89cf4c0bc
                      • Instruction Fuzzy Hash: EEE1E874E002198FDB14DFA9C580AAEFBF2BF89304F24826AD454AB359D771AD41DF60
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 82ca8d34af29271d6494b1d1bfc78c502e2c1caa30ceb287604b1cad814b998e
                      • Instruction ID: e3bfc9132690e624f3eba0f0885dcecd33a9a52052a01ed5640f96c785d37ae5
                      • Opcode Fuzzy Hash: 82ca8d34af29271d6494b1d1bfc78c502e2c1caa30ceb287604b1cad814b998e
                      • Instruction Fuzzy Hash: 32E1E574E002598FDF14DFA9C580AAEBBF2BF89304F24826AD414AB359D731AD41DF60
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 36c54e8bdbb1e9c2bc3afceafc9076ae92f2bc3a26ee489af6a307b16d621a01
                      • Instruction ID: 80100e8210b612b1a3f0d53096669ec9d2ec0a38a5764c9bac045d35bd833deb
                      • Opcode Fuzzy Hash: 36c54e8bdbb1e9c2bc3afceafc9076ae92f2bc3a26ee489af6a307b16d621a01
                      • Instruction Fuzzy Hash: F4E1E874E002198FDF14DFA9C580AAEBBF2BF89304F24826AD415AB355D771AD41DF60
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5fe91cfc709da790e0ee442a62c3b28128fd84fc04ebaa84d8a5cfec705876a8
                      • Instruction ID: 249ffa14167c2df4b208e2602c04c1706120d1c9b223aceb18e8cf67d0e68660
                      • Opcode Fuzzy Hash: 5fe91cfc709da790e0ee442a62c3b28128fd84fc04ebaa84d8a5cfec705876a8
                      • Instruction Fuzzy Hash: 3ED1C474A00644CFDB04DF69C598AAABBF1BF8D701F2580A9E506AB371DB31AD41DF60
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e24cc2658a97aca423cf9b6e5b2d3c592fb7084929399493f635c7de4d662cb1
                      • Instruction ID: bb957dc6a2791977b77aae154de3e58685231fd61f7d5ee05de8efc213c93a4a
                      • Opcode Fuzzy Hash: e24cc2658a97aca423cf9b6e5b2d3c592fb7084929399493f635c7de4d662cb1
                      • Instruction Fuzzy Hash: F0D1E53592075ACADB10EB64D99069DB7B1FF9A300F11C79AD04A7B210EF706AC5CF51
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6452e29ba20fa059f5d82c997a70273adaadc8263acb8dd4f9e94962ee5f8b12
                      • Instruction ID: b8c33ed11815ec524f778a5ebb97ee9078ecaa2f6e3b00b5562e68911fb02ceb
                      • Opcode Fuzzy Hash: 6452e29ba20fa059f5d82c997a70273adaadc8263acb8dd4f9e94962ee5f8b12
                      • Instruction Fuzzy Hash: 2DD1F43592075ACADB10EB64D99069DB3B1FF9A300F11C79AE04A3B210EF706AC5CF91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1384344681.00000000022C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_22c0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4a4866c33bb64546a3fe7f2dce9e2ad6d6a37e3b2b50c20188ce4f5efb1ee1e8
                      • Instruction ID: 855d3bd538f1cc83a612acc91a64af39fb7f8f560f87d02e64e9a276ecda10ae
                      • Opcode Fuzzy Hash: 4a4866c33bb64546a3fe7f2dce9e2ad6d6a37e3b2b50c20188ce4f5efb1ee1e8
                      • Instruction Fuzzy Hash: EEA16C32E102098FCF15DFA4D94459EBBB3FF85304B25866EE805AB269DB71E916CF40
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0ab91cb8cce1c03b572755ea78634c2784cc28c45ce71568d98cef03a6db5426
                      • Instruction ID: 90de5a84a30c8e26f49ff15d85c88520290cea3bce9719346b1bc46eb6c9841e
                      • Opcode Fuzzy Hash: 0ab91cb8cce1c03b572755ea78634c2784cc28c45ce71568d98cef03a6db5426
                      • Instruction Fuzzy Hash: BA510970E046198FDF14DFA9C9805AEBBF2BF89304F24816AD418AB316D731AD42CF61
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 016f022d6fa5df24e7d259ef63daad07621a7e6bf6df426a70cd41c41d687f6d
                      • Instruction ID: 749397fd8927da98bc2beb3343aee0a3281386165a4d7ecde0f4ae88cdecac54
                      • Opcode Fuzzy Hash: 016f022d6fa5df24e7d259ef63daad07621a7e6bf6df426a70cd41c41d687f6d
                      • Instruction Fuzzy Hash: 64511B74E042198BDB14CFA9C5805AEFBF2BF89300F2481AAD418AB316D7319D42CFA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1388336132.0000000004490000.00000040.00000800.00020000.00000000.sdmp, Offset: 04490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4490000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c5fb841e17fb775f160ac0792b0b7d4c2a32e3d0caddb03ee935923b9820c9c9
                      • Instruction ID: 598c6926c2ecc97941200c0bc005bf4d6581227ac2e3d89e5a11c2ab05f0a218
                      • Opcode Fuzzy Hash: c5fb841e17fb775f160ac0792b0b7d4c2a32e3d0caddb03ee935923b9820c9c9
                      • Instruction Fuzzy Hash: C9510970E042598BDB14CFA9C9815AEFBF2FF89304F2481AAD458AB316D7359D42CF61
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 706121f4e2301c4fcf5f22ae1e9e2093e5bdf0823e2deb3294e90ca5b5a47428
                      • Instruction ID: c3886b1220f52033ce6b18462aa2c879c091fbeb352b75ff928c3e2e0af603dd
                      • Opcode Fuzzy Hash: 706121f4e2301c4fcf5f22ae1e9e2093e5bdf0823e2deb3294e90ca5b5a47428
                      • Instruction Fuzzy Hash: BF41DFB1A28702CFD750DB39D884A5ABBF5EF86751F04882AE05ECBB60D234E945CF41
                      Memory Dump Source
                      • Source File: 00000000.00000002.1390344477.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7380000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1adc627a38c7c7d56a0bef3e9ac6f4ad4251f3bd05f607d441d26252590ca75a
                      • Instruction ID: deda5ce9499a99543b982cd9d107a4a807f163fcec90771fa21fbce9a7cb5201
                      • Opcode Fuzzy Hash: 1adc627a38c7c7d56a0bef3e9ac6f4ad4251f3bd05f607d441d26252590ca75a
                      • Instruction Fuzzy Hash: B041E2B1A28706CFD750CB39D48491AB7F6EF86751F04882AE05ECBB60D234E944CF01
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 39e2148a97622e3d5ac966fe459996ec7bdc08997cc1f9c152b81c73eae6ea18
                      • Instruction ID: 114ff31cf353b2f5dc63d7420a18e2c967170b1c5f492bd6a174233a6c54746a
                      • Opcode Fuzzy Hash: 39e2148a97622e3d5ac966fe459996ec7bdc08997cc1f9c152b81c73eae6ea18
                      • Instruction Fuzzy Hash: 61826074E012288FEB64DF69CD98BDDBBB2BB89300F1481E9995DA7255DB305E81CF40
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 70a36c0e5ff7d495e0b91ed81cee4b4d3ce1ac265f89493da8b0b5ab58d13e4e
                      • Instruction ID: 92420e2a2f35d65861ac4f79e1244dc4c9383b06a8b5a735ce55712e79a8e027
                      • Opcode Fuzzy Hash: 70a36c0e5ff7d495e0b91ed81cee4b4d3ce1ac265f89493da8b0b5ab58d13e4e
                      • Instruction Fuzzy Hash: 3F72D174E002288FDB64DF29C984BEDBBB2BB49304F1491EAD549A7361D734AE81CF50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ec3c6c81bbd6f28f94c9aa0aebd3e7986622c62bda94729b6d694b9756ed1405
                      • Instruction ID: d658925f221a91a6deb1fe076971c64bd4c8c0994617f9e315db922bdee89f2b
                      • Opcode Fuzzy Hash: ec3c6c81bbd6f28f94c9aa0aebd3e7986622c62bda94729b6d694b9756ed1405
                      • Instruction Fuzzy Hash: 2EE1C2B4E00218CFEB54DFA5C944B9DBBB2BF89304F2081AAD809B7395DB755A85CF14
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 05eb3f51f618ddf5c7bdabf2b38adb09759f733fa0919143e3d0047334628d68
                      • Instruction ID: a5229cb69ea403a8e522743efa55928fa5e72f88cb126f2267d60336310aeb73
                      • Opcode Fuzzy Hash: 05eb3f51f618ddf5c7bdabf2b38adb09759f733fa0919143e3d0047334628d68
                      • Instruction Fuzzy Hash: 6CD1B274E00218CFDB14DFA5D954BADBBB2BF89304F2081AAD809A7355DB359E85CF50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 51e00704b44886e49000ee967155be27988ba3b3272cb4c2e8cd2d75e2a1f756
                      • Instruction ID: dc0fd729b2bfae03091e38965f70d52ffecd8d20d8bfc6b056be440cebb836db
                      • Opcode Fuzzy Hash: 51e00704b44886e49000ee967155be27988ba3b3272cb4c2e8cd2d75e2a1f756
                      • Instruction Fuzzy Hash: 51A19475E016188FEB68CF6AC944B9DBBF2BF89300F14C0AAD90DA7255DB345A85CF50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c41c6aa071478bb4dd5195bb2eaa3bb5aa0b28dda518031bbcbf9e08e45f418c
                      • Instruction ID: 8ec65712792c678a0fca700e26ebd0f106981790b96a21111bc97b92070c90ea
                      • Opcode Fuzzy Hash: c41c6aa071478bb4dd5195bb2eaa3bb5aa0b28dda518031bbcbf9e08e45f418c
                      • Instruction Fuzzy Hash: 41A19175E016288FEB68CF6AD944B9DBBF2BF89300F14C0AAD50CA7251DB345A85CF50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 69e6b8b05383aad0e5350a39f4f312d3a7c7ebc442933988978b6ec70db5ad42
                      • Instruction ID: fd9de4f3dad689ffbc7ca4251c6c1490760794918769a3246021a29a8194cd92
                      • Opcode Fuzzy Hash: 69e6b8b05383aad0e5350a39f4f312d3a7c7ebc442933988978b6ec70db5ad42
                      • Instruction Fuzzy Hash: 11A1A275E016288FEB68CF6AD944B9DBBF2BF89300F14C1AAD50CA7251DB345A85CF50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b22fbe53cfd8d1cc399cf646513fcebe11278c8048e23fd3b42abaca30baee8a
                      • Instruction ID: f2ffc8a5c160b6a4fa6524e897492dda057c9a7e23be2dd2a3750c5186a6b7ba
                      • Opcode Fuzzy Hash: b22fbe53cfd8d1cc399cf646513fcebe11278c8048e23fd3b42abaca30baee8a
                      • Instruction Fuzzy Hash: 2DA1A175E01228CFEB68CF6AD944B9DBBF2BF89300F14C1AAD508A7251DB745A85CF50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 54d5d5cc5067c5eb56be915096136aadecc9e98f60baacafacc0ea40a4b7adc8
                      • Instruction ID: 5d02320f64e2c7a80e00b773781fa018bda41d3eb51ee540987ac09c872891cf
                      • Opcode Fuzzy Hash: 54d5d5cc5067c5eb56be915096136aadecc9e98f60baacafacc0ea40a4b7adc8
                      • Instruction Fuzzy Hash: 5BA1A275E016288FEB68CF6AD944B9DBBF2BF89300F14C0AAD508A7251DB345A85CF50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 249e66dd1e8ca00f8a0b6529d0d1f43ea25978bb4ff6026b4a03f7207e3fb20a
                      • Instruction ID: 97f32b3702e5639ed911c8f6e724da35ba0167827ce67c2c2a0f810d37f840ea
                      • Opcode Fuzzy Hash: 249e66dd1e8ca00f8a0b6529d0d1f43ea25978bb4ff6026b4a03f7207e3fb20a
                      • Instruction Fuzzy Hash: D8A1B374E012188FEB68CF6AD944B9DBBF2BF89300F14C0AAD908B7250DB745A85CF50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fbe95c176e7145b1b21dbe547af6abd222a60e6f3c9e15d8db6a987b44a9f6d0
                      • Instruction ID: 495f83c1858508cad4ac0cd6c5ab72d9f6cb98291bb009ff52ea03e8e394897b
                      • Opcode Fuzzy Hash: fbe95c176e7145b1b21dbe547af6abd222a60e6f3c9e15d8db6a987b44a9f6d0
                      • Instruction Fuzzy Hash: B6A1A175E012288FEB68CF6AC944B9DBBF2AF89300F14C0AAD508B7255DB345A85CF50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0b144c9c94fcae3aa9efecd7d9a974a87983a4380c3fd45b44bdeeb11275ac6d
                      • Instruction ID: 6c48fda33ebf87a6c7037c3bb939a897775b271caee863391cf7eeaf66dc8214
                      • Opcode Fuzzy Hash: 0b144c9c94fcae3aa9efecd7d9a974a87983a4380c3fd45b44bdeeb11275ac6d
                      • Instruction Fuzzy Hash: 16A19375E016188FEB68CF6AD944B9DFBF2BF89300F14C0AAD908A7251DB745A85CF50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 325e62ca282ecefbc7b1f58ec3ebe47d4a0d44b795df38cd78d0bbd649183934
                      • Instruction ID: 9b728ad13990efc3f9f413ee447332209114ada832a9ef4f81647ee85cfda233
                      • Opcode Fuzzy Hash: 325e62ca282ecefbc7b1f58ec3ebe47d4a0d44b795df38cd78d0bbd649183934
                      • Instruction Fuzzy Hash: EEA1A175E016288FEB68CF6AD944B9DBBF2AF89300F14C0AAD508A7251DB745A85CF50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 34ec1f45e4dcb779b62fea09ed3e56e7f03d1a338b48813d6147b0c230ede7c7
                      • Instruction ID: d3c4e015aabf437f29b0bffbc6674052508bb8447af6b02505c5c13fcef75def
                      • Opcode Fuzzy Hash: 34ec1f45e4dcb779b62fea09ed3e56e7f03d1a338b48813d6147b0c230ede7c7
                      • Instruction Fuzzy Hash: 1891D7B0D00618CFEB68CF6AC844B9DBBF2AF89304F14C1AAD409B7255DB744A85CF50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7397ec6ccaf7f13e11077b7dc3418148b959011003028ad7fcb92bbce0fdd5e2
                      • Instruction ID: fca92a77c65b03898536b44187dc5672346f2cf1bf17a360e4c633d4a0ec7e80
                      • Opcode Fuzzy Hash: 7397ec6ccaf7f13e11077b7dc3418148b959011003028ad7fcb92bbce0fdd5e2
                      • Instruction Fuzzy Hash: 0691D374E00218CFDB14DFAAD884AADBBF2BF89304F149069E919BB365DB309945CF51
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2145b66206206be93e671023db4f499f5d1800735ef98d925a265fcdc78a0516
                      • Instruction ID: bc33eb78f0f6dcab49cf0c04d9fc951fac68eb733aa3fb86075beb4f4b23408a
                      • Opcode Fuzzy Hash: 2145b66206206be93e671023db4f499f5d1800735ef98d925a265fcdc78a0516
                      • Instruction Fuzzy Hash: 40819174E00218CFDB14DFAAD984AADBBF2BF89304F249069E919BB365DB305945CF50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0e0aa890fe8c15aea89fda4e79f34bd4b83b6d40bf4e310663022b63adbfcdac
                      • Instruction ID: 8193e735c6077d14f4d7f13e64a869450a4505ec0920f74b63b1c83ae34d7e97
                      • Opcode Fuzzy Hash: 0e0aa890fe8c15aea89fda4e79f34bd4b83b6d40bf4e310663022b63adbfcdac
                      • Instruction Fuzzy Hash: 5881B0B4E00218CFEB58DFAAD9547ADBBF2BF89304F20816AD819AB354DB345945CF50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 32daa81e19918e59446c4bbbb5bc8ad5796ea3f3d389011b5b2e584d63a53667
                      • Instruction ID: 041842114571ee159419f976c833d3dfe97fc27173a7d9b782a2a64f2b4f3c2c
                      • Opcode Fuzzy Hash: 32daa81e19918e59446c4bbbb5bc8ad5796ea3f3d389011b5b2e584d63a53667
                      • Instruction Fuzzy Hash: A281A274E00218CFDB18DFAAD984AADBBF2BF89304F159069E519BB365DB349941CF10
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 73c445be15bb02c1020771e6d957ded2980b8efabc5b9bfe224de999a7fe1812
                      • Instruction ID: 9c694afd55279ad96fa8ce6b7b4bc9961d85df401569f9ed1e165094adff733e
                      • Opcode Fuzzy Hash: 73c445be15bb02c1020771e6d957ded2980b8efabc5b9bfe224de999a7fe1812
                      • Instruction Fuzzy Hash: A481A074E0021C8FDB14DFAAD984A9DBBF2BF88304F249069E919BB365DB349941DF10
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6440d884c7a46d444440e6428646a86b131a3f242837bfa087af7a18a6b1521e
                      • Instruction ID: 6d49884b1ecfab51ab6b0c4f7a5aea23bffcaac95242360fde00c6b1e2c6b63e
                      • Opcode Fuzzy Hash: 6440d884c7a46d444440e6428646a86b131a3f242837bfa087af7a18a6b1521e
                      • Instruction Fuzzy Hash: D381B3B4E0421C8FDB14DFAAD984AADBBF2BF88304F249069E519BB365DB305945CF10
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d43244697920c1d08e9cc17f470c3f560cec31ed9ff3618c9dacb3c4dced8fb4
                      • Instruction ID: 02e3a48c9e7ffb9373efd0738b6cbb3c485b3d6a6830ce45ecef4c5517e4cb79
                      • Opcode Fuzzy Hash: d43244697920c1d08e9cc17f470c3f560cec31ed9ff3618c9dacb3c4dced8fb4
                      • Instruction Fuzzy Hash: C081A274E0021C9FDB14DFAAD984AADBBF2BF89300F249069E519BB365DB709945CF10
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e3eb9bbaae8e641eba17dedbe509622e8e4f9443eff207b667147ee2baa3247f
                      • Instruction ID: 31b62301ca1135a98aee809dc6be820b2027e9008b3fbffa794c0c1b9b6ff6d3
                      • Opcode Fuzzy Hash: e3eb9bbaae8e641eba17dedbe509622e8e4f9443eff207b667147ee2baa3247f
                      • Instruction Fuzzy Hash: 3A819074E002188FDB14DFAAD984AADBBF2BF89304F24D069E519BB365DB309941CF50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cef80b04d7fb19903532281c7e9b63d52414d2954a6cd46d46f30df090299f54
                      • Instruction ID: e2b3f74946aa32b306245a7e33a91ccf51faa0d86b6d2b7f1fbfa0a40e2b2d2e
                      • Opcode Fuzzy Hash: cef80b04d7fb19903532281c7e9b63d52414d2954a6cd46d46f30df090299f54
                      • Instruction Fuzzy Hash: 598195B4E01218CFEB14DFAAD944A9EBBF2BF88300F149069E519BB365DB345941CF10
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5055ea326113ad581ca0eac5576634bd293d8cd80eb029cf12b990b272ab8070
                      • Instruction ID: 878faef709366e59bbdeaaf61fd268fe42b7102b2ca3fa49703079cfaf42cca6
                      • Opcode Fuzzy Hash: 5055ea326113ad581ca0eac5576634bd293d8cd80eb029cf12b990b272ab8070
                      • Instruction Fuzzy Hash: D181BF74E412289FEB64DF69DD45BEDBBB2BB89300F1081EAD858A7250DB305E81CF40
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a0c724cbd8fe4e40dbf7e941564ff4bd4ca9f32c62ef21d4f468a698a0c76dc6
                      • Instruction ID: 5a1339cf3eea1d18c380793025a746ab85fba1ab6c80a464471cfe6be3dd32b3
                      • Opcode Fuzzy Hash: a0c724cbd8fe4e40dbf7e941564ff4bd4ca9f32c62ef21d4f468a698a0c76dc6
                      • Instruction Fuzzy Hash: 57818371E006288FEB68CF6AC945B9DFBF2AF89300F14C1AAD50DA7255DB744A85CF50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5a3a0cd8171e1bcd325483d3b137ac4472da7763afe76eba25cff40d7fe53098
                      • Instruction ID: be51d731cf0e493e22679ace23d38632eae7f8b4ff8d771ae110ef58e8fad789
                      • Opcode Fuzzy Hash: 5a3a0cd8171e1bcd325483d3b137ac4472da7763afe76eba25cff40d7fe53098
                      • Instruction Fuzzy Hash: 38718571E006288FEB68CF6AC94579DBBF2AF89300F14C1AAD50DA7255DB354A85CF50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e6de6870f8770b015e773a736c903a5abb9a5bd46e6158c311b71ebca3c1e8a6
                      • Instruction ID: 1a24ca3d6105fd7954039eedba4404b87cbaea82c2c895951115d288e3292d6e
                      • Opcode Fuzzy Hash: e6de6870f8770b015e773a736c903a5abb9a5bd46e6158c311b71ebca3c1e8a6
                      • Instruction Fuzzy Hash: 2D5198B1D016188FEB58CF6BC945789FAF3AFC9304F14C0AAD54CA7265DB740A868F50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5ba774295ade1069e6cccc2fa56d52ffe123a8feb49ec214785777f33a4f8a8b
                      • Instruction ID: 5e96310b83aafa35fbe9c5eccdd2da0b290845d0c840660a833ede6e4a387233
                      • Opcode Fuzzy Hash: 5ba774295ade1069e6cccc2fa56d52ffe123a8feb49ec214785777f33a4f8a8b
                      • Instruction Fuzzy Hash: D75186B1E016188BEB58CF6BD9457DDFAF3AFC9314F14C1AAC50CA6264DB740A868F50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c3897d4df535c2d8356820ad357f6bf87afac69b6831fef2326e17d55a73ba5d
                      • Instruction ID: 8fd47d50f5c6e6d153491f893c1fb735c521afbc9db368db0582a8b5f0178cbe
                      • Opcode Fuzzy Hash: c3897d4df535c2d8356820ad357f6bf87afac69b6831fef2326e17d55a73ba5d
                      • Instruction Fuzzy Hash: 9541B2B0D006088BEB58DFAAC8447DDFBF2AF88304F14D16AC418BB254DB755946CF64
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 13663e4427a473d853c486eea9ba5f1f5a7759938504db87bcd6baa370ee708a
                      • Instruction ID: b0f734f5269f1fe9d4529b761a9be59f9b72ae53b853adce7b2bb73bb4d2220d
                      • Opcode Fuzzy Hash: 13663e4427a473d853c486eea9ba5f1f5a7759938504db87bcd6baa370ee708a
                      • Instruction Fuzzy Hash: 8D4168B1D016188FEB58CF6BC9457D9FAF3AFC9300F14C1AAC54CA6264EB7409868F50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3d6b17cd375b24f85865219e6c809c48a9a3e8c3794591cf6ba8072b13c9fb15
                      • Instruction ID: d812e0ac54d466e91c486d2be3ce36efb3ecd8ea944481ea3388ed9f7c5cb777
                      • Opcode Fuzzy Hash: 3d6b17cd375b24f85865219e6c809c48a9a3e8c3794591cf6ba8072b13c9fb15
                      • Instruction Fuzzy Hash: 424167B1E016188FEB58CF6BC9457DAFAF3AFC8314F14C1AAD50CA6264DB740A858F50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 30c2cea3288ccbf871fe8b8a4d3eddc351e61967fd8a09b822a9a556fd8dfdb1
                      • Instruction ID: 96d674fec9434879c765ee41cfca990d178b91038378d3ef9eb40e3ffe8a78a9
                      • Opcode Fuzzy Hash: 30c2cea3288ccbf871fe8b8a4d3eddc351e61967fd8a09b822a9a556fd8dfdb1
                      • Instruction Fuzzy Hash: EE4145B1D016188BEB58CF6BC9457DDFAF3AFC9300F14C1AAC54CA6265EB740A858F50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cc61c738a5d80b47a3f12dfe56a51d74ac9b8809fddd48e4659ed0e3c4dae49b
                      • Instruction ID: 7111916049a4d150571c8c1e1457ed2735e65f7b58a55d538b853fce0cb1a3b4
                      • Opcode Fuzzy Hash: cc61c738a5d80b47a3f12dfe56a51d74ac9b8809fddd48e4659ed0e3c4dae49b
                      • Instruction Fuzzy Hash: 924157B1E016188FEB58CF6BC945799FAF3AFC9304F14C0AAD54CA6264EB740A858F50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 794f66ccae5d4fb02f5fa54d30265ffac76ab8e99c22662fb88f59fb48abba00
                      • Instruction ID: 41b97b7590cd7988206471c0d2730b1f501cc3991691d088057b579732fba6a1
                      • Opcode Fuzzy Hash: 794f66ccae5d4fb02f5fa54d30265ffac76ab8e99c22662fb88f59fb48abba00
                      • Instruction Fuzzy Hash: A8225EB5600209DFCB14CF64C984ABAB7F2FF88305F1A9565E949EB292D730EC41DB61
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0af6877c67b1390848ddc9dca23848ef37944b1a22edaad7a43945ea9f060fb0
                      • Instruction ID: 6fc1bb72430566455dbef466b02835542bfa5b65f2bb09628c01156e6b927dfa
                      • Opcode Fuzzy Hash: 0af6877c67b1390848ddc9dca23848ef37944b1a22edaad7a43945ea9f060fb0
                      • Instruction Fuzzy Hash: 2922F878900219CFCB54EF64E984B9DBBB1FF89304F1085A9E80AAB715DB306E85CF55
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 23a90f7dda022c115be6577821b68d9e0de63cd3b7e16f1537541d661b111e76
                      • Instruction ID: 08abe111274d7201f66b48b80df9626ea75c6b3ed5a9ec4b7c3bba66a3aefaf4
                      • Opcode Fuzzy Hash: 23a90f7dda022c115be6577821b68d9e0de63cd3b7e16f1537541d661b111e76
                      • Instruction Fuzzy Hash: 6922F878900219CFCB54EF64E984B9DBBB1FF89304F1085A9E80AAB715DB306E85CF55
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ae2b330c33cbe031e8fd4c414632d380a53b24505b52668fb5380a160d724532
                      • Instruction ID: 88b7f7b786f1b8d6b75cc7fa910bd4a51a71e4d11bc254583209c575734d4bb4
                      • Opcode Fuzzy Hash: ae2b330c33cbe031e8fd4c414632d380a53b24505b52668fb5380a160d724532
                      • Instruction Fuzzy Hash: 93D11DB5A40519CFCB14CF9CD584AADB7F2FF88315B1A9069E609AB361CB31EC81CB51
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a9f6848ea805efc9643ec0b9e6183c242f0d98edce697aac5c20478940ca51cc
                      • Instruction ID: a46f780d5ca5423ef2e7848a8052ede772154233b49ec65fbbcce3585b7a1a0c
                      • Opcode Fuzzy Hash: a9f6848ea805efc9643ec0b9e6183c242f0d98edce697aac5c20478940ca51cc
                      • Instruction Fuzzy Hash: B7D18E71A04208DFDB15CF68C880EAEBBF2FF49314F159599E989AB261DB30ED41CB50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 638a030455583e14e8655843d697be237bd84816822546cdb1ce66c6def2b1c9
                      • Instruction ID: 77db7395d987750d4d8a712743711dec6cb73152fc5d8b8700acb50446008018
                      • Opcode Fuzzy Hash: 638a030455583e14e8655843d697be237bd84816822546cdb1ce66c6def2b1c9
                      • Instruction Fuzzy Hash: 88B11F32704A188FDB159F78C844B7E7BE2BB99314F249929E646EB391DB74CC01C790
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 718ebd8d13d44bf90c67d0398ff8245f9db6d7e615399f4c47a34f1f51597abc
                      • Instruction ID: 8406d360ee35e3df7a6d3916d82d0bd7a7243d035406b01ed193949259b452a2
                      • Opcode Fuzzy Hash: 718ebd8d13d44bf90c67d0398ff8245f9db6d7e615399f4c47a34f1f51597abc
                      • Instruction Fuzzy Hash: 24A19F743145098FEB299B29CB68B3936A6EFC5B44F24146AE702EF3A1EE64CC41D741
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a4530a7b7b627a06580b6563efba929d4d0e0b41eaf914ecf30541fceaac825c
                      • Instruction ID: 9523b012eb6151c8457b226d06c6ef90ca1eb7b1d24f214ce45571dc9e2d9782
                      • Opcode Fuzzy Hash: a4530a7b7b627a06580b6563efba929d4d0e0b41eaf914ecf30541fceaac825c
                      • Instruction Fuzzy Hash: A9C10471A001099FCB14CFA9D988ABDBBB2FF89344F659065EA55FB2A1D730EC41CB50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 02df313750769e30399493e319eacad1d162b1f436a685a8353bfda42d27acf2
                      • Instruction ID: 6d9f03351423f1223bffa5b94c7b3dcf1df6d65cfcc58f385b51ae2394a55f1a
                      • Opcode Fuzzy Hash: 02df313750769e30399493e319eacad1d162b1f436a685a8353bfda42d27acf2
                      • Instruction Fuzzy Hash: ED81C534B002058FDB64DF78D864A6E7BF2BF89644B15416AEA05DB3A1DB31ED01CB91
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 914549e05dffa00a30aaa058b7307f6df8adc3b5851d61d8bf6381feee7ae293
                      • Instruction ID: 2f5e3b7d72c19c7577fdf53691c0295d0fee4c3a6171c2f2dd9df2b9d7ad504b
                      • Opcode Fuzzy Hash: 914549e05dffa00a30aaa058b7307f6df8adc3b5851d61d8bf6381feee7ae293
                      • Instruction Fuzzy Hash: 17718D31F102185BDF15DBA8C8506AEBBB6AF88300F148129E505FB380EF349E42CBA1
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ce57051ab8c3fea3a9373d47f8a3ef2c85b9e740a077d63d442196333c726960
                      • Instruction ID: 645d492687f46be42eb568786de496c1862038ba6b9f402c62b59903c291d188
                      • Opcode Fuzzy Hash: ce57051ab8c3fea3a9373d47f8a3ef2c85b9e740a077d63d442196333c726960
                      • Instruction Fuzzy Hash: F4711A347086098FCB55DF2CC898AB97BE6AF49704F1510A9EA52EB3B1DB70DC51CB90
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8955459c6e20cf9ed9ef793cb7c4dd23cb133f2506c46d56b1913307399e6e40
                      • Instruction ID: d741dafa4f04fb567db518f89007966cb9dcedf1570f77ddced0da45297aa959
                      • Opcode Fuzzy Hash: 8955459c6e20cf9ed9ef793cb7c4dd23cb133f2506c46d56b1913307399e6e40
                      • Instruction Fuzzy Hash: F6616E76A01A09CFCB14CF68C488ABABBB2BF99304B259165D702BB361D731DD41CB51
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 56862e2373d69523a0927649b520140e4804f05fd5112b684272d945ab1ab3e6
                      • Instruction ID: e6a3d8871b8aadef55bd7b4754389dd25184aa2fde7db4279e6551369641adc6
                      • Opcode Fuzzy Hash: 56862e2373d69523a0927649b520140e4804f05fd5112b684272d945ab1ab3e6
                      • Instruction Fuzzy Hash: 7451AD328A97479FD3082B31A9BC17EBBB5FB4F72B7406D14B01E91065CB346869CA61
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 26729bf7cdd2f66d866620e8d6c083cea4e482dec846fed2acf66e05c65c2a1d
                      • Instruction ID: a7cf14c5713b2eaaeea2bbafa5d643ded22a5440b476d1120f5f805926f9b99f
                      • Opcode Fuzzy Hash: 26729bf7cdd2f66d866620e8d6c083cea4e482dec846fed2acf66e05c65c2a1d
                      • Instruction Fuzzy Hash: 8F51AD328A97078FC3082B31A9BC17EBBB5FB4F32B7406C14B01E91065CB3468698A60
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c361c638258231b68e51408780cc7862f88a7f65ed5057514dd82b20c8c4ca5f
                      • Instruction ID: c22820f462d01fc32ee91260f4447da033c25c1790cae38d602ac4e14de403e1
                      • Opcode Fuzzy Hash: c361c638258231b68e51408780cc7862f88a7f65ed5057514dd82b20c8c4ca5f
                      • Instruction Fuzzy Hash: 29515471E0064DDFCF15CFA4C844AEDBBB2BF88300F10852AE945BB265E7759955CB50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fb4be5b100b0e724801bff5715d614faaad2bdd7862f9b5438f22e04fbbe0f36
                      • Instruction ID: 10b3bb20a7bb262a4cd404a536d188f934af0d546a143924a82c80fe5f36fb27
                      • Opcode Fuzzy Hash: fb4be5b100b0e724801bff5715d614faaad2bdd7862f9b5438f22e04fbbe0f36
                      • Instruction Fuzzy Hash: BD514D78B44A54CFE798DF28D98997E73F1BB48358B410868EA42DB764CB70EC41CB90
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: acd17c7b908aa1cd0d93d8a1c43fb0cf810fab1c8031031d03adba13c9f0c68b
                      • Instruction ID: a10d7687dfecf770f477663c073c5af26ff03d5e9cb2d5f941d31ef071cca833
                      • Opcode Fuzzy Hash: acd17c7b908aa1cd0d93d8a1c43fb0cf810fab1c8031031d03adba13c9f0c68b
                      • Instruction Fuzzy Hash: B5511174D00318CFDB25EFA5D854BAEBBB2FF89304F608529E809AB294DB745945CF40
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d437ef78a8ce42b9d05a5ba4b5ce4afa80fadd3afda91bcefb18133f42187392
                      • Instruction ID: 3429e550c6f77f78439fa21a250217db9c7a0ea9bab8e8ba8ba074194419e2d9
                      • Opcode Fuzzy Hash: d437ef78a8ce42b9d05a5ba4b5ce4afa80fadd3afda91bcefb18133f42187392
                      • Instruction Fuzzy Hash: 6541AC36845319CFD704AFA5D55C7FEBBB1FB8A316F105828D211B72A0CBB81A48CB60
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fe1a8e18156cc5277085030e797250d9366988dc0dec43f7f58bbf6e22010884
                      • Instruction ID: 2fe20ca960a6535b946484340bb93b4e2282706ffa8a1c3ecdb72bb7a50a1adb
                      • Opcode Fuzzy Hash: fe1a8e18156cc5277085030e797250d9366988dc0dec43f7f58bbf6e22010884
                      • Instruction Fuzzy Hash: 4B519F78E01208DFCB08DFA9D59499DBBF2FF89304B209469E805BB325DB31A945CF54
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4b4e259b5f5e752e7871557d1105579d3158af73eb54f3ad626ba47cb2050419
                      • Instruction ID: 10dff5a832dacf0f552507e6e2e888bdf3ce67ba646fa683946f32ca36b392b2
                      • Opcode Fuzzy Hash: 4b4e259b5f5e752e7871557d1105579d3158af73eb54f3ad626ba47cb2050419
                      • Instruction Fuzzy Hash: 17516274E01218DFDB48DFA9D58499DBBF2BF89300F24916AE919BB365DB31A905CF00
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5b0a053a8149ff7998181fdafcca7ea077973946d736cb4692ac1e6625d9876b
                      • Instruction ID: 5de506b98ec3b690113af1e8224757408e18e2bf94a63fe370d385ae888fc784
                      • Opcode Fuzzy Hash: 5b0a053a8149ff7998181fdafcca7ea077973946d736cb4692ac1e6625d9876b
                      • Instruction Fuzzy Hash: 5051F1B9E14218CFDB14DFA9D5946EDBBF2BF88314F20802AD815B7294DB346A46CF50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f75e22799b6b44e0a2efb1ca9587e90ca20edb372fbfcf5436a2085b6d7da9bf
                      • Instruction ID: afd5879188f3b5f653f7a561f0812226a471eacb5c18575d5ba3c97a6880c007
                      • Opcode Fuzzy Hash: f75e22799b6b44e0a2efb1ca9587e90ca20edb372fbfcf5436a2085b6d7da9bf
                      • Instruction Fuzzy Hash: 6541D031B042089FCB159B75D854ABE7BF2EBC8310F184579E906EB391CE319C16CB91
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 906b12242b51666df79d42905bb979683c2d128b7ae97806d0439f94bd0a05dc
                      • Instruction ID: e5075e53f9c5cb07879060797d2e0cbd2f9ab1058cb4ff3b9787915ba4208b8c
                      • Opcode Fuzzy Hash: 906b12242b51666df79d42905bb979683c2d128b7ae97806d0439f94bd0a05dc
                      • Instruction Fuzzy Hash: A5413031E103199BEF15CFA5C890ADEBBF5BF88710F248129E915B7340EB70A945CB90
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 71b4e9e2acafb43c00b7507e3a4d9af8b4116bf63a139ec867b5d17938920a16
                      • Instruction ID: b68b9f313ba11dec475303beae254f6ad143f1b221606b99a592bce748d381a4
                      • Opcode Fuzzy Hash: 71b4e9e2acafb43c00b7507e3a4d9af8b4116bf63a139ec867b5d17938920a16
                      • Instruction Fuzzy Hash: 3A310971B043298BDF195AB6499437E61A6BBC4314F245539DE26F3780DFB4CE4087A1
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d5cd3278bfca55bb7d2412fcb9fafee0822e409970ebc29c3853245ab1138cbf
                      • Instruction ID: a6b1bc59855a99824b6ef2f60981d77a8ccfb5c39afa397c93f081e6d22bb034
                      • Opcode Fuzzy Hash: d5cd3278bfca55bb7d2412fcb9fafee0822e409970ebc29c3853245ab1138cbf
                      • Instruction Fuzzy Hash: E341DFB4E04218CFDB54DFA9D9946EDBBF2BF88304F10912AD805B7294DB346A46CF54
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a5df0805a83cd30308d43ae98077b85751caa1c9ea1c73f59dfa197a115f0cc6
                      • Instruction ID: 52db308c382e0efbae3080fbb74a245163e7d7cd3b0a3eab21da090da16783ac
                      • Opcode Fuzzy Hash: a5df0805a83cd30308d43ae98077b85751caa1c9ea1c73f59dfa197a115f0cc6
                      • Instruction Fuzzy Hash: 0D4136B57001198FDB149F69D988ABE7BB6BF88314F140469FA09DB2B0C771DD90CB92
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d7d7e8fa3515ec318ad51491ab7a720c65f8b32e834d96e79ed536427c76e854
                      • Instruction ID: 21efaee4fa49e4e926808633e6cbba7cffebbe779d89efd9ad1b65d9512f6869
                      • Opcode Fuzzy Hash: d7d7e8fa3515ec318ad51491ab7a720c65f8b32e834d96e79ed536427c76e854
                      • Instruction Fuzzy Hash: A041DF30A00248DFDB149F65D904BBABBF6EF84308F04842EEA15AB281D775DD54DB91
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 97939b5118d03d5f86f9e1a493036b63cd401c23c518c5eb56acb0e45485025c
                      • Instruction ID: 3c554b5d24abc148abdc01dfd53aa06e763ebaeb9fd398db85e4ed2129ee8238
                      • Opcode Fuzzy Hash: 97939b5118d03d5f86f9e1a493036b63cd401c23c518c5eb56acb0e45485025c
                      • Instruction Fuzzy Hash: 94318D7160420E9FCF069FA4D854ABF3BA2FB88319F105424FA559B294CB35CD61DBA0
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bee383ba7aa40f7bb531bb1dd57f34d4cda92882c122305b277ba465e5b351e6
                      • Instruction ID: af3c8c00cb96451d465953e0c9ce1d9a851b6f316a9b67bcef8209e871763d77
                      • Opcode Fuzzy Hash: bee383ba7aa40f7bb531bb1dd57f34d4cda92882c122305b277ba465e5b351e6
                      • Instruction Fuzzy Hash: 0E31E4303042298FEB198B25DA9473E7765BB857147282856D51AFF361EF30DC808755
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7e43c9861a7ce3d6ae3eae8de5c2b1d49f7d925248ca6effdc25df83713af5b2
                      • Instruction ID: d161e22c0be9d520ebab004394ad7550d2db3a7efb4d351d8fed5d08b98eb345
                      • Opcode Fuzzy Hash: 7e43c9861a7ce3d6ae3eae8de5c2b1d49f7d925248ca6effdc25df83713af5b2
                      • Instruction Fuzzy Hash: 2F318D35845209CFD704AFA5D46C7FEBBB1FB8A315F148828D611A7291CB781648CF50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0250ab0cf5491b357bbe8e3559087249705aac325ff4b5530d94d477edb2412f
                      • Instruction ID: 25d688599ffaac9d16a183b91b5462620c7b49bbe56e1427e86801749c72578b
                      • Opcode Fuzzy Hash: 0250ab0cf5491b357bbe8e3559087249705aac325ff4b5530d94d477edb2412f
                      • Instruction Fuzzy Hash: 1321B63432C2184BEB252639889477E3597AFC871AF24507AE782DB7D4EE75CC419780
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5cecb8b30c2b7b78cbf79e5d9c57605ec2130280e21caf085cf6a0d535d7d5bb
                      • Instruction ID: f68d840fb6aec254bc4e39559d7186b4c18be424f4bc33c5a555b100b76c3a5e
                      • Opcode Fuzzy Hash: 5cecb8b30c2b7b78cbf79e5d9c57605ec2130280e21caf085cf6a0d535d7d5bb
                      • Instruction Fuzzy Hash: 0031F134648A88CFF794DB18E98A8BDB7F1B74535CB410459F982CB659C770ED41CB90
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8441e96bf2b3c6337c44286fe222efab90833f3a7ad6fc91574927f4aa93b8b5
                      • Instruction ID: ceee4f1ea14e93bac3422f5f28889dff3a190d39120185ff41ff3323a9f6ca47
                      • Opcode Fuzzy Hash: 8441e96bf2b3c6337c44286fe222efab90833f3a7ad6fc91574927f4aa93b8b5
                      • Instruction Fuzzy Hash: 28217730A043228FEB999B2885D843DBBB2AB82250F044976ECD1DB692DB248C41C391
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 21fc4692d5735934ae1ff357e9d096e46e85b4b32151ba534962deddfd965de8
                      • Instruction ID: 591706850907f004bf2e40a659df228f90a2a78f7f3f12e1212633eb76267afa
                      • Opcode Fuzzy Hash: 21fc4692d5735934ae1ff357e9d096e46e85b4b32151ba534962deddfd965de8
                      • Instruction Fuzzy Hash: 8F218135A40218AFCB14DB68D4409BE7BA6FF99364F60C46DEA099B240DF31EE41CBD1
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 429d279d27f0ea9e78e4c8d7976aa61ab05c4adb29239641d68c8554da29cc52
                      • Instruction ID: af27e7f2431b9a3de5903f8ed6f01690a6e987824c34a9a3d15b1043ca753b5f
                      • Opcode Fuzzy Hash: 429d279d27f0ea9e78e4c8d7976aa61ab05c4adb29239641d68c8554da29cc52
                      • Instruction Fuzzy Hash: A421DB71E006098FCB05CF79C4885BEBBB2FFC5350B198165D565AB361C7749C52CB91
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813565155.0000000000E9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E9D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_e9d000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4fba06bd1109142ecf1180ce293e9e2f6fdf119a17fc147b56478b21cf8bc74e
                      • Instruction ID: 6df056ee4c2aa18ebde843a71f5b3804a716cd43986ec0db2254f1f7b0467296
                      • Opcode Fuzzy Hash: 4fba06bd1109142ecf1180ce293e9e2f6fdf119a17fc147b56478b21cf8bc74e
                      • Instruction Fuzzy Hash: 262125B2508204DFDF15DF10DDC0B66BF65FB98328F24C569E80A1B246C336D856CBA2
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 43c817a4df3771ea74c7c4e447a83b2f81cdd25f24e6515ed4c405cd02378c2f
                      • Instruction ID: 9f97e91120581f16acd9a1e53e103dc2a6c1d7767cb06a183b4cfb424b297394
                      • Opcode Fuzzy Hash: 43c817a4df3771ea74c7c4e447a83b2f81cdd25f24e6515ed4c405cd02378c2f
                      • Instruction Fuzzy Hash: DB21D236704E158FC7299A29C89493FB7A6FF88765B154668EA06EB354CF30DC12CBC0
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813657866.0000000000EAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EAD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ead000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e5a6dc7cd4e7b9e439a89665f0c7aed2f1091b77d89028d3eab55beaebedddfb
                      • Instruction ID: bfed660df16cf90d671b212a41bda2dc831a39910724a270d52d3f60065d748c
                      • Opcode Fuzzy Hash: e5a6dc7cd4e7b9e439a89665f0c7aed2f1091b77d89028d3eab55beaebedddfb
                      • Instruction Fuzzy Hash: E9210775508304DFDB14DF10CDC4B26BBA6FB89318F24C56DE84A5F642C77AE846CA62
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e49c195728bcf7731e27252066638d5bc615ccc0275423e9b907f5f24b8dbc0c
                      • Instruction ID: ae89ff6ba6d9a04e9b38990b6a2cf1a540a3907d7f2c4c7a6e3fa6c184ea9561
                      • Opcode Fuzzy Hash: e49c195728bcf7731e27252066638d5bc615ccc0275423e9b907f5f24b8dbc0c
                      • Instruction Fuzzy Hash: BF11B436E5425D9FCB01DBB8D8005EEBB71FF89310B248756E615B7150EB3169068791
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8a23b7650822f7346e69df11d9f551ce62aff811c13f7da64cbd4251fbcdebbf
                      • Instruction ID: 5951a524e3a0ba9805b18dad764f5b4c0b27ecc256b3c72d88e825a9595f6a56
                      • Opcode Fuzzy Hash: 8a23b7650822f7346e69df11d9f551ce62aff811c13f7da64cbd4251fbcdebbf
                      • Instruction Fuzzy Hash: 65112B367043641FDF065E7858252BE3BE7EFC8350B04442AE405DB3C1DE384E1283A6
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a92d95bd935fe9ee955ebbd81aed1e4069c0790079db0da2840e404837af7417
                      • Instruction ID: a3892e6c4609b4f42e3e6abac6e7bad94d258306503722bcfae4a632a978b43e
                      • Opcode Fuzzy Hash: a92d95bd935fe9ee955ebbd81aed1e4069c0790079db0da2840e404837af7417
                      • Instruction Fuzzy Hash: 3921A27160420D9FCB159F64D445A7B3BE6FB48319F105424FA559F295CB34CD61CBE0
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3f0df2bfd9efa85daa5060e5fd45d988477cc9805d7e1231d4e7e84696b2c197
                      • Instruction ID: 5e2c7ac84ba2fad4da7c7473165464bd6cecd0ab7534bc136133e9267da8894e
                      • Opcode Fuzzy Hash: 3f0df2bfd9efa85daa5060e5fd45d988477cc9805d7e1231d4e7e84696b2c197
                      • Instruction Fuzzy Hash: 4F2113B4C0860DCFDB01EFA8D4545FEBBF0BF4A310F4055AAD941B6254EB301A49CBA2
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 665eb7e1e64919198f67ae91a24b34ea1dcd8a953069ce84567ea5386eed7388
                      • Instruction ID: 401e546c47feb53f500c66b50a4f03fadd8b3cb3ac31c54f223befeac42392b3
                      • Opcode Fuzzy Hash: 665eb7e1e64919198f67ae91a24b34ea1dcd8a953069ce84567ea5386eed7388
                      • Instruction Fuzzy Hash: 001108307082448FE7051E7A98542BBBBA7BFCA210B144977F946C7396CE748D068760
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813565155.0000000000E9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E9D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_e9d000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                      • Instruction ID: 9da3af245087f52dee073f9ba1ad4b292c225b839deddffa91366009e7f6703b
                      • Opcode Fuzzy Hash: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                      • Instruction Fuzzy Hash: 1111D376508240DFDF16CF10D9C4B56BF71FB94318F24C5A9D8091B656C33AD85ACBA1
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d78c3dfce1fea4bc30536aaed3d22c8bd5fa37dfc3175dea1380ce038a42323b
                      • Instruction ID: a788389658e603e545b19f1c1e0c355e61eaaa0c31178197ff40d3064313aa26
                      • Opcode Fuzzy Hash: d78c3dfce1fea4bc30536aaed3d22c8bd5fa37dfc3175dea1380ce038a42323b
                      • Instruction Fuzzy Hash: 8921AFB49002099FDB41EFB5D94079EBBF2FB89304F10D16AD058AB364EBB06A458F91
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5cdc59c19e830d8a41228b627718c7edf7c04f926aea7693627d258fbbfbd75d
                      • Instruction ID: eab46d725c53194cb7201cb62759f95f4af91de34ddcd19c3c1d44fb8c51ce6c
                      • Opcode Fuzzy Hash: 5cdc59c19e830d8a41228b627718c7edf7c04f926aea7693627d258fbbfbd75d
                      • Instruction Fuzzy Hash: E8116A7680430DEFDB10DF99C945BDEBBF5EB48320F148419EA14A7210C375A550CFA1
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5c7217d44429e3e338b730b126dcf29eae52765bab01d788734a687ae073754d
                      • Instruction ID: ee5c769644b233929bdbbacae51cd39b9b8a8c9281af82d0c607323716a5a4e1
                      • Opcode Fuzzy Hash: 5c7217d44429e3e338b730b126dcf29eae52765bab01d788734a687ae073754d
                      • Instruction Fuzzy Hash: 8311AFB49002098FDB40EFB5D94079EBBF2FB89304F10D16AD058AB364EBB02A458F91
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 53622a0fee8dc308dad51d568e261911938850d3a6781f7dd6f645cc65177707
                      • Instruction ID: 227699b1bdbd4b0c5ec1f717b4dedd203049011914698d0eb31ae440b79e57a9
                      • Opcode Fuzzy Hash: 53622a0fee8dc308dad51d568e261911938850d3a6781f7dd6f645cc65177707
                      • Instruction Fuzzy Hash: 2511FE74F406498FEF10DFF8E850B9EBBB5BB84315F409065E808EB345E73499418B65
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 43926bf0e31e170a7337a3241b8c6ae13bbc44799c3f121f06fd7443834958c6
                      • Instruction ID: 58420e503684dbd6add3ee8dd77cd1edc8812f91ab2e316addc95e78f3a1dab6
                      • Opcode Fuzzy Hash: 43926bf0e31e170a7337a3241b8c6ae13bbc44799c3f121f06fd7443834958c6
                      • Instruction Fuzzy Hash: 76118E71A142118FD7609F78E5086ADBBF1EF89215B1405AEE845DB312D771C906CBA1
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a4856eda89fb1ebf3932c2a16a2c705d0d0c7b697c4b6c8b51eca76bb6843979
                      • Instruction ID: 918126e2e3fde1108cd41ee9e3a009d30f492a078910952f4229b28fda02275b
                      • Opcode Fuzzy Hash: a4856eda89fb1ebf3932c2a16a2c705d0d0c7b697c4b6c8b51eca76bb6843979
                      • Instruction Fuzzy Hash: E71137B6800349EFDB10CF99C945BEEBBF5EF48320F148419EA58A7210C379A554DFA5
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813657866.0000000000EAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EAD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ead000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                      • Instruction ID: 123c38fd7d23e02b81f07ba9847761e1c1c232215a08bd6db3fb2a9198675049
                      • Opcode Fuzzy Hash: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                      • Instruction Fuzzy Hash: 7311BE75508244CFCB11CF10C9C4B16BBA2FB49318F24C6ADE84A4F656C33AE84ACF51
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f3d59ee773e34ddba42d1ce691114e2f936f1dbf080c6161126332aae603ba65
                      • Instruction ID: 065ae9fefba8d3ecd1967e928698e2e7964459379ce4c83c0316abb94a42e9a1
                      • Opcode Fuzzy Hash: f3d59ee773e34ddba42d1ce691114e2f936f1dbf080c6161126332aae603ba65
                      • Instruction Fuzzy Hash: 8F01A273B001186B8F069E659801ABF7BEBDBD8751B19802AF619E7240CE75CD1197A0
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f72f1971f33ffb65c44ec3d8f2a366bf26351c4f0efbbd134d221367e5c52876
                      • Instruction ID: 81cadc82084443aead0345ca746e4f87e3d6ebf4b05ef1d39df0db3c110055ef
                      • Opcode Fuzzy Hash: f72f1971f33ffb65c44ec3d8f2a366bf26351c4f0efbbd134d221367e5c52876
                      • Instruction Fuzzy Hash: F801E470E003198FDF54EFB9C9116AEBBF5BF48210F14852AD919E7250E7789A01CB90
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b29997b35a43e2f063463e5823e08ad439b68fa7454bfe8d3e7961be3fcc3bc4
                      • Instruction ID: 73c82954c494fb0eb05c76497301d00683311bdfa6f6a69c0b8915c14e21e816
                      • Opcode Fuzzy Hash: b29997b35a43e2f063463e5823e08ad439b68fa7454bfe8d3e7961be3fcc3bc4
                      • Instruction Fuzzy Hash: 14F0E2363002286F8F059E9CAC419BF7FEBEBC8360B00442AFA09C7340DE319D2097A5
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6cfd45a0550e2ea46ea365b98a2255969042bd5cf94702649a6afb00581fbbaa
                      • Instruction ID: 647bea18510c3a41178f37008ecccec05dbb589b63140447c15a94c7a6443fa7
                      • Opcode Fuzzy Hash: 6cfd45a0550e2ea46ea365b98a2255969042bd5cf94702649a6afb00581fbbaa
                      • Instruction Fuzzy Hash: D5F0BE357542408FE7589A29E85897A7BA6EFC5710B1A44AAEE45CB2B2DA60CC01C7A0
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f4789cefbb02bbfffef10342ef9d3ac944f3c2f365dc9ade3721a933ce590ae4
                      • Instruction ID: ba7ae13cd4884dc3ae8f1b39ff22d988066bbd0f920b542fad3c24b67c42d1a4
                      • Opcode Fuzzy Hash: f4789cefbb02bbfffef10342ef9d3ac944f3c2f365dc9ade3721a933ce590ae4
                      • Instruction Fuzzy Hash: 23F0A0357502048FE708AF2AE858A3AB7EAEFC5714B158469FA06CB361DF70DC01C790
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 91dfeeaa258fb4dace3ee53431d597a5e0a4d43259a58954f9685c99ef44663d
                      • Instruction ID: bbdc77c8f40e5ea455627cf2e508961352921678d525f22ec57d333e24cc4782
                      • Opcode Fuzzy Hash: 91dfeeaa258fb4dace3ee53431d597a5e0a4d43259a58954f9685c99ef44663d
                      • Instruction Fuzzy Hash: 80E0D875D213679BCB1197B0D8554DEBF31FE923107428596E0602B442E770164BC391
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3a173d587fdec89299304f0219a8c6a85bd592b80723f70a94fef85cacf4afd7
                      • Instruction ID: 7575c555999c5751dd42c298764ec0471084e92922679b7c8193e70e1e0ea7b7
                      • Opcode Fuzzy Hash: 3a173d587fdec89299304f0219a8c6a85bd592b80723f70a94fef85cacf4afd7
                      • Instruction Fuzzy Hash: B8D01231D6022A978B01AAA5DC044DEBB39FE95721B914666D51437140EB70265986E1
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b63b22b8117cee97d702657cd0b191a852f4ee5fa2f96cdfb44e31c4804f5bf5
                      • Instruction ID: db59fb1821e1a209ccda43ff401405ce53742d72cb974362cea68179103399e1
                      • Opcode Fuzzy Hash: b63b22b8117cee97d702657cd0b191a852f4ee5fa2f96cdfb44e31c4804f5bf5
                      • Instruction Fuzzy Hash: E9D0A73320D47556F735404D7C41BB2570CD7C07B8F1901BFF55CB7151C8425C504264
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fff2ed06bb52a64e423bd710822e9c193583e3d5c1e892ddbd10134bbfda0c0d
                      • Instruction ID: 4325e59532e16f1908c90ad4d60968ba19855ee5f73d8592abc22dd9bf5de6ee
                      • Opcode Fuzzy Hash: fff2ed06bb52a64e423bd710822e9c193583e3d5c1e892ddbd10134bbfda0c0d
                      • Instruction Fuzzy Hash: 12D0677BB510089FCB149F98E8409DDB7B6FB9C222B048526E915E3260C6319921DB50
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c617306740f34ae0b6c1722a27405e8e874dfedcdde1d9e62bc442b6e06ce68a
                      • Instruction ID: 9fc3412f3f6d5022c213712d78b1e5f274192ed3833561f3e072584863a13754
                      • Opcode Fuzzy Hash: c617306740f34ae0b6c1722a27405e8e874dfedcdde1d9e62bc442b6e06ce68a
                      • Instruction Fuzzy Hash: 1CE0C2749583820BC712E331A9929983B257A92218B8445A4A8914B81BEFA9084FCB61
                      Memory Dump Source
                      • Source File: 00000009.00000002.3825810955.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_68a0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2157ef3a2c8985fe28dfc1c7a0cc59b7a70719dcf0389070b45a7572ef3a7b6e
                      • Instruction ID: e8bc41862af331eb713ee9fdca0dbb41f36ed4e3403def5c68ba7df1e95d91c6
                      • Opcode Fuzzy Hash: 2157ef3a2c8985fe28dfc1c7a0cc59b7a70719dcf0389070b45a7572ef3a7b6e
                      • Instruction Fuzzy Hash: DBD0C92414D6C18FDB038B249665459BFF19D9615132985EBD8C4CB2A3C118556AC371
                      Memory Dump Source
                      • Source File: 00000009.00000002.3813935410.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_ef0000_RFQ 20726 - T5 7841.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3ed087dc18f255f0e26d38ec699b77a33e2552580614aefea1faf248e15296cf
                      • Instruction ID: 0c872026d664154a4bd6df714d727286b9e94d30a2ba58ace25b80400c98409d
                      • Opcode Fuzzy Hash: 3ed087dc18f255f0e26d38ec699b77a33e2552580614aefea1faf248e15296cf
                      • Instruction Fuzzy Hash: DEC0127491430947D501F772FA46A55336E76D1604F809950B05A07929DFB419898BA5

                      Execution Graph

                      Execution Coverage:10.9%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:228
                      Total number of Limit Nodes:6
                      execution_graph 22393 22d4668 22394 22d4672 22393->22394 22398 22d4758 22393->22398 22403 22d4218 22394->22403 22396 22d468d 22399 22d477d 22398->22399 22407 22d4859 22399->22407 22411 22d4868 22399->22411 22404 22d4223 22403->22404 22419 22d5c4c 22404->22419 22406 22d6f95 22406->22396 22409 22d488f 22407->22409 22408 22d496c 22408->22408 22409->22408 22415 22d44e0 22409->22415 22413 22d488f 22411->22413 22412 22d496c 22412->22412 22413->22412 22414 22d44e0 CreateActCtxA 22413->22414 22414->22412 22416 22d58f8 CreateActCtxA 22415->22416 22418 22d59bb 22416->22418 22418->22418 22420 22d5c57 22419->22420 22423 22d5c6c 22420->22423 22422 22d7035 22422->22406 22424 22d5c77 22423->22424 22427 22d5c9c 22424->22427 22426 22d711a 22426->22422 22428 22d5ca7 22427->22428 22431 22d5ccc 22428->22431 22430 22d720d 22430->22426 22432 22d5cd7 22431->22432 22433 22d82b0 22432->22433 22440 22d8558 22432->22440 22435 22d850b 22433->22435 22448 22dabb8 22433->22448 22434 22d8549 22434->22430 22435->22434 22452 22dccb0 22435->22452 22457 22dcca1 22435->22457 22441 22d84f8 22440->22441 22444 22d8567 22440->22444 22443 22d8509 22441->22443 22447 22dabb8 3 API calls 22441->22447 22442 22d8549 22442->22433 22443->22442 22445 22dcca1 3 API calls 22443->22445 22446 22dccb0 3 API calls 22443->22446 22444->22433 22445->22442 22446->22442 22447->22443 22462 22dabdf 22448->22462 22467 22dabf0 22448->22467 22449 22dabce 22449->22435 22453 22dccd1 22452->22453 22454 22dccf5 22453->22454 22499 22dce4f 22453->22499 22503 22dce60 22453->22503 22454->22434 22458 22dccd1 22457->22458 22459 22dccf5 22458->22459 22460 22dce4f 3 API calls 22458->22460 22461 22dce60 3 API calls 22458->22461 22459->22434 22460->22459 22461->22459 22463 22dabf0 22462->22463 22471 22dacd9 22463->22471 22479 22dace8 22463->22479 22464 22dabff 22464->22449 22469 22dacd9 2 API calls 22467->22469 22470 22dace8 2 API calls 22467->22470 22468 22dabff 22468->22449 22469->22468 22470->22468 22472 22dacf9 22471->22472 22473 22dad1c 22471->22473 22472->22473 22487 22daf70 22472->22487 22491 22daf80 22472->22491 22473->22464 22474 22dad14 22474->22473 22475 22daf20 GetModuleHandleW 22474->22475 22476 22daf4d 22475->22476 22476->22464 22480 22dacf9 22479->22480 22481 22dad1c 22479->22481 22480->22481 22485 22daf70 LoadLibraryExW 22480->22485 22486 22daf80 LoadLibraryExW 22480->22486 22481->22464 22482 22dad14 22482->22481 22483 22daf20 GetModuleHandleW 22482->22483 22484 22daf4d 22483->22484 22484->22464 22485->22482 22486->22482 22488 22daf94 22487->22488 22489 22dafb9 22488->22489 22495 22da0a8 22488->22495 22489->22474 22492 22daf94 22491->22492 22493 22da0a8 LoadLibraryExW 22492->22493 22494 22dafb9 22492->22494 22493->22494 22494->22474 22496 22db160 LoadLibraryExW 22495->22496 22498 22db1d9 22496->22498 22498->22489 22501 22dce6d 22499->22501 22500 22dcea7 22500->22454 22501->22500 22507 22db6c0 22501->22507 22504 22dce6d 22503->22504 22505 22dcea7 22504->22505 22506 22db6c0 3 API calls 22504->22506 22505->22454 22506->22505 22508 22db6cb 22507->22508 22510 22ddbb8 22508->22510 22511 22dcfc4 22508->22511 22510->22510 22512 22dcfcf 22511->22512 22513 22d5ccc 3 API calls 22512->22513 22514 22ddc27 22513->22514 22514->22510 22515 22dd378 22516 22dd3be 22515->22516 22520 22dd558 22516->22520 22523 22dd547 22516->22523 22517 22dd4ab 22521 22dd586 22520->22521 22526 22db6d0 22520->22526 22521->22517 22524 22db6d0 DuplicateHandle 22523->22524 22525 22dd586 22524->22525 22525->22517 22527 22dd5c0 DuplicateHandle 22526->22527 22528 22dd656 22527->22528 22528->22521 22529 2254213 22532 2253f91 22529->22532 22530 225405f 22531 225422b 22532->22531 22535 2256271 22532->22535 22541 2256280 22532->22541 22536 2256295 22535->22536 22547 22562b1 22536->22547 22561 225631e 22536->22561 22576 22562c0 22536->22576 22537 22562a7 22537->22530 22542 2256295 22541->22542 22544 22562b1 11 API calls 22542->22544 22545 22562c0 11 API calls 22542->22545 22546 225631e 11 API calls 22542->22546 22543 22562a7 22543->22530 22544->22543 22545->22543 22546->22543 22548 22562da 22547->22548 22550 22562fe 22548->22550 22590 2256afb 22548->22590 22594 22567d9 22548->22594 22599 22567fe 22548->22599 22604 22566df 22548->22604 22608 225687c 22548->22608 22613 2256973 22548->22613 22618 2256a53 22548->22618 22622 2256cf1 22548->22622 22626 225674f 22548->22626 22630 2256a0c 22548->22630 22635 2256807 22548->22635 22550->22537 22562 22562ac 22561->22562 22563 2256321 22561->22563 22564 2256807 2 API calls 22562->22564 22565 22562fe 22562->22565 22566 2256a0c 2 API calls 22562->22566 22567 225674f 2 API calls 22562->22567 22568 2256cf1 2 API calls 22562->22568 22569 2256a53 ResumeThread 22562->22569 22570 2256973 2 API calls 22562->22570 22571 225687c 2 API calls 22562->22571 22572 22566df 2 API calls 22562->22572 22573 22567fe 2 API calls 22562->22573 22574 22567d9 2 API calls 22562->22574 22575 2256afb ResumeThread 22562->22575 22563->22537 22564->22565 22565->22537 22566->22565 22567->22565 22568->22565 22569->22565 22570->22565 22571->22565 22572->22565 22573->22565 22574->22565 22575->22565 22577 22562da 22576->22577 22578 22562fe 22577->22578 22579 2256807 2 API calls 22577->22579 22580 2256a0c 2 API calls 22577->22580 22581 225674f 2 API calls 22577->22581 22582 2256cf1 2 API calls 22577->22582 22583 2256a53 ResumeThread 22577->22583 22584 2256973 2 API calls 22577->22584 22585 225687c 2 API calls 22577->22585 22586 22566df 2 API calls 22577->22586 22587 22567fe 2 API calls 22577->22587 22588 22567d9 2 API calls 22577->22588 22589 2256afb ResumeThread 22577->22589 22578->22537 22579->22578 22580->22578 22581->22578 22582->22578 22583->22578 22584->22578 22585->22578 22586->22578 22587->22578 22588->22578 22589->22578 22591 2256b01 22590->22591 22640 22532a6 22591->22640 22592 2256b2e 22592->22550 22592->22592 22595 22567f8 22594->22595 22644 22538f1 22595->22644 22648 22538f8 22595->22648 22596 2256737 22596->22550 22600 225683b 22599->22600 22652 2253830 22600->22652 22656 2253838 22600->22656 22601 2256859 22660 2253b75 22604->22660 22664 2253b80 22604->22664 22609 2256d2a 22608->22609 22668 2253321 22609->22668 22672 2253328 22609->22672 22610 2256d45 22614 225697c 22613->22614 22615 225699f 22614->22615 22676 22539e1 22614->22676 22680 22539e8 22614->22680 22615->22550 22619 2256a60 22618->22619 22621 22532a6 ResumeThread 22619->22621 22620 2256b2e 22620->22550 22621->22620 22624 2253321 Wow64SetThreadContext 22622->22624 22625 2253328 Wow64SetThreadContext 22622->22625 22623 2256d0b 22624->22623 22625->22623 22628 22538f1 WriteProcessMemory 22626->22628 22629 22538f8 WriteProcessMemory 22626->22629 22627 2256773 22627->22550 22628->22627 22629->22627 22631 225697d 22630->22631 22633 22539e1 ReadProcessMemory 22631->22633 22634 22539e8 ReadProcessMemory 22631->22634 22632 225699f 22632->22550 22633->22632 22634->22632 22636 2256812 22635->22636 22638 22538f1 WriteProcessMemory 22636->22638 22639 22538f8 WriteProcessMemory 22636->22639 22637 2256e96 22638->22637 22639->22637 22641 22532b8 ResumeThread 22640->22641 22643 22532e9 22641->22643 22643->22592 22645 22538f7 WriteProcessMemory 22644->22645 22647 2253997 22645->22647 22647->22596 22649 2253940 WriteProcessMemory 22648->22649 22651 2253997 22649->22651 22651->22596 22653 2253838 VirtualAllocEx 22652->22653 22655 22538b5 22653->22655 22655->22601 22657 2253878 VirtualAllocEx 22656->22657 22659 22538b5 22657->22659 22659->22601 22661 2253c09 CreateProcessA 22660->22661 22663 2253dcb 22661->22663 22665 2253c09 CreateProcessA 22664->22665 22667 2253dcb 22665->22667 22669 225336d Wow64SetThreadContext 22668->22669 22671 22533b5 22669->22671 22671->22610 22673 225336d Wow64SetThreadContext 22672->22673 22675 22533b5 22673->22675 22675->22610 22677 2253a33 ReadProcessMemory 22676->22677 22679 2253a77 22677->22679 22679->22615 22681 2253a33 ReadProcessMemory 22680->22681 22683 2253a77 22681->22683 22683->22615 22684 2257578 22685 2257703 22684->22685 22687 225759e 22684->22687 22687->22685 22688 2254af4 22687->22688 22689 22577f8 PostMessageW 22688->22689 22690 2257864 22689->22690 22690->22687

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 2253b75-2253c15 2 2253c17-2253c21 0->2 3 2253c4e-2253c6e 0->3 2->3 4 2253c23-2253c25 2->4 8 2253ca7-2253cd6 3->8 9 2253c70-2253c7a 3->9 5 2253c27-2253c31 4->5 6 2253c48-2253c4b 4->6 10 2253c35-2253c44 5->10 11 2253c33 5->11 6->3 19 2253d0f-2253dc9 CreateProcessA 8->19 20 2253cd8-2253ce2 8->20 9->8 12 2253c7c-2253c7e 9->12 10->10 13 2253c46 10->13 11->10 14 2253ca1-2253ca4 12->14 15 2253c80-2253c8a 12->15 13->6 14->8 17 2253c8c 15->17 18 2253c8e-2253c9d 15->18 17->18 18->18 21 2253c9f 18->21 31 2253dd2-2253e58 19->31 32 2253dcb-2253dd1 19->32 20->19 22 2253ce4-2253ce6 20->22 21->14 24 2253d09-2253d0c 22->24 25 2253ce8-2253cf2 22->25 24->19 26 2253cf4 25->26 27 2253cf6-2253d05 25->27 26->27 27->27 29 2253d07 27->29 29->24 42 2253e68-2253e6c 31->42 43 2253e5a-2253e5e 31->43 32->31 45 2253e7c-2253e80 42->45 46 2253e6e-2253e72 42->46 43->42 44 2253e60 43->44 44->42 48 2253e90-2253e94 45->48 49 2253e82-2253e86 45->49 46->45 47 2253e74 46->47 47->45 51 2253ea6-2253ead 48->51 52 2253e96-2253e9c 48->52 49->48 50 2253e88 49->50 50->48 53 2253ec4 51->53 54 2253eaf-2253ebe 51->54 52->51 56 2253ec5 53->56 54->53 56->56
                      APIs
                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 02253DB6
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1425320409.0000000002250000.00000040.00000800.00020000.00000000.sdmp, Offset: 02250000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2250000_lmUupyodsah.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: dca77c17917ada54cded8da188ad20430208afd945fd51922eeec54db92aaf93
                      • Instruction ID: 9082c7eb59e8d8bc01efab4c8b0c776fea646fd3a7ac816bbb519ba5d771658d
                      • Opcode Fuzzy Hash: dca77c17917ada54cded8da188ad20430208afd945fd51922eeec54db92aaf93
                      • Instruction Fuzzy Hash: B3A16B71D103299FEB21CFA8C841BEEBBF2BF48314F1491A9E808A7244D7749985CF91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 57 2253b80-2253c15 59 2253c17-2253c21 57->59 60 2253c4e-2253c6e 57->60 59->60 61 2253c23-2253c25 59->61 65 2253ca7-2253cd6 60->65 66 2253c70-2253c7a 60->66 62 2253c27-2253c31 61->62 63 2253c48-2253c4b 61->63 67 2253c35-2253c44 62->67 68 2253c33 62->68 63->60 76 2253d0f-2253dc9 CreateProcessA 65->76 77 2253cd8-2253ce2 65->77 66->65 69 2253c7c-2253c7e 66->69 67->67 70 2253c46 67->70 68->67 71 2253ca1-2253ca4 69->71 72 2253c80-2253c8a 69->72 70->63 71->65 74 2253c8c 72->74 75 2253c8e-2253c9d 72->75 74->75 75->75 78 2253c9f 75->78 88 2253dd2-2253e58 76->88 89 2253dcb-2253dd1 76->89 77->76 79 2253ce4-2253ce6 77->79 78->71 81 2253d09-2253d0c 79->81 82 2253ce8-2253cf2 79->82 81->76 83 2253cf4 82->83 84 2253cf6-2253d05 82->84 83->84 84->84 86 2253d07 84->86 86->81 99 2253e68-2253e6c 88->99 100 2253e5a-2253e5e 88->100 89->88 102 2253e7c-2253e80 99->102 103 2253e6e-2253e72 99->103 100->99 101 2253e60 100->101 101->99 105 2253e90-2253e94 102->105 106 2253e82-2253e86 102->106 103->102 104 2253e74 103->104 104->102 108 2253ea6-2253ead 105->108 109 2253e96-2253e9c 105->109 106->105 107 2253e88 106->107 107->105 110 2253ec4 108->110 111 2253eaf-2253ebe 108->111 109->108 113 2253ec5 110->113 111->110 113->113
                      APIs
                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 02253DB6
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1425320409.0000000002250000.00000040.00000800.00020000.00000000.sdmp, Offset: 02250000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2250000_lmUupyodsah.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: d563eae204e6287143b0d3ca82e87aca565dfa7ac520efc4deb04483fbf9551e
                      • Instruction ID: 20f6c5c9cd9420f07ff4a6d5f9ba1576648a94c245176afb42bfdcb0d340c1bb
                      • Opcode Fuzzy Hash: d563eae204e6287143b0d3ca82e87aca565dfa7ac520efc4deb04483fbf9551e
                      • Instruction Fuzzy Hash: 9D916C71D103299FEB25CFA8C841BEDBBF2BF48314F1491A9E808A7244DB759985CF91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 114 22dace8-22dacf7 115 22dacf9-22dad06 call 22da040 114->115 116 22dad23-22dad27 114->116 121 22dad1c 115->121 122 22dad08 115->122 117 22dad29-22dad33 116->117 118 22dad3b-22dad7c 116->118 117->118 125 22dad7e-22dad86 118->125 126 22dad89-22dad97 118->126 121->116 169 22dad0e call 22daf70 122->169 170 22dad0e call 22daf80 122->170 125->126 128 22dad99-22dad9e 126->128 129 22dadbb-22dadbd 126->129 127 22dad14-22dad16 127->121 130 22dae58-22daf18 127->130 132 22dada9 128->132 133 22dada0-22dada7 call 22da04c 128->133 131 22dadc0-22dadc7 129->131 164 22daf1a-22daf1d 130->164 165 22daf20-22daf4b GetModuleHandleW 130->165 136 22dadc9-22dadd1 131->136 137 22dadd4-22daddb 131->137 135 22dadab-22dadb9 132->135 133->135 135->131 136->137 139 22daddd-22dade5 137->139 140 22dade8-22dadf1 call 22da05c 137->140 139->140 145 22dadfe-22dae03 140->145 146 22dadf3-22dadfb 140->146 147 22dae05-22dae0c 145->147 148 22dae21-22dae25 145->148 146->145 147->148 150 22dae0e-22dae1e call 22da06c call 22da07c 147->150 153 22dae2b-22dae2e 148->153 150->148 155 22dae51-22dae57 153->155 156 22dae30-22dae4e 153->156 156->155 164->165 166 22daf4d-22daf53 165->166 167 22daf54-22daf68 165->167 166->167 169->127 170->127
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 022DAF3E
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1425482014.00000000022D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_22d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: 0c676f8fc7eff69624420eebc95fa94eba81c39dfb6691aab1d65f579a344a64
                      • Instruction ID: 82e2899bd21bc153b139087e533aab54cbd4d4ca32751694ca14192e0de63256
                      • Opcode Fuzzy Hash: 0c676f8fc7eff69624420eebc95fa94eba81c39dfb6691aab1d65f579a344a64
                      • Instruction Fuzzy Hash: DD7157B0A10B058FD724DF6AD044B5ABBF1FF88304F00892DE48ADBA54DB75E945CB91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 171 22d58ed-22d596c 172 22d596f-22d59b9 CreateActCtxA 171->172 174 22d59bb-22d59c1 172->174 175 22d59c2-22d5a1c 172->175 174->175 182 22d5a1e-22d5a21 175->182 183 22d5a2b-22d5a2f 175->183 182->183 184 22d5a31-22d5a3d 183->184 185 22d5a40 183->185 184->185 186 22d5a41 185->186 186->186
                      APIs
                      • CreateActCtxA.KERNEL32(?), ref: 022D59A9
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1425482014.00000000022D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_22d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: db5b9ddee60d7a24b30c8a2d06443e7472fa2da505cfdb53f0d5b0108458d40a
                      • Instruction ID: dcecf8b7dc18f1298691693d05626416eee641a47d9c16b91d71814081b64cf3
                      • Opcode Fuzzy Hash: db5b9ddee60d7a24b30c8a2d06443e7472fa2da505cfdb53f0d5b0108458d40a
                      • Instruction Fuzzy Hash: C841C571D10719CFEB24DF99C884BDDBBB1BF48304F20816AD408AB255DBB56946CF90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 188 22d44e0-22d59b9 CreateActCtxA 192 22d59bb-22d59c1 188->192 193 22d59c2-22d5a1c 188->193 192->193 200 22d5a1e-22d5a21 193->200 201 22d5a2b-22d5a2f 193->201 200->201 202 22d5a31-22d5a3d 201->202 203 22d5a40 201->203 202->203 204 22d5a41 203->204 204->204
                      APIs
                      • CreateActCtxA.KERNEL32(?), ref: 022D59A9
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1425482014.00000000022D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_22d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: 5a2b5b5b1587589502929577b88671346f0d2ba55a93b8e24082f17d123ff049
                      • Instruction ID: 77c0c125dfa03f00cdecdfe5fc1170dac3d53709480cf9c8da56f07076e03385
                      • Opcode Fuzzy Hash: 5a2b5b5b1587589502929577b88671346f0d2ba55a93b8e24082f17d123ff049
                      • Instruction Fuzzy Hash: BB41D471C1071DCBEB24DF99C884B9EBBF5BF48304F608169D408AB255D7B56945CF90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 206 22d5a64-22d5a70 207 22d5a22 206->207 208 22d5a72-22d5a77 206->208 209 22d5a24-22d5a27 207->209 210 22d5a92-22d5a97 207->210 211 22d5ae9-22d5af4 208->211 213 22d5a2b-22d5a2f 209->213 210->211 214 22d5a31-22d5a3d 213->214 215 22d5a40 213->215 214->215 216 22d5a41 215->216 216->216
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1425482014.00000000022D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_22d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 14bad8d0dbe47236a218d14ac5e64efe718b47c464597e536d0e6cdd20e8b75c
                      • Instruction ID: 8eb318d5f1f29d107a75b30ee559bbf4476b50d7711859b6c1ce7a0b84ba325c
                      • Opcode Fuzzy Hash: 14bad8d0dbe47236a218d14ac5e64efe718b47c464597e536d0e6cdd20e8b75c
                      • Instruction Fuzzy Hash: 7131CF71C24759CFEB11CFE8C884BDDBBF1AF45304F90415AD005AB259C7B9A94ACB51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 218 22538f1-22538f5 219 22538f7-2253917 218->219 220 225391a-2253946 218->220 219->220 222 2253956-2253995 WriteProcessMemory 220->222 223 2253948-2253954 220->223 225 2253997-225399d 222->225 226 225399e-22539ce 222->226 223->222 225->226
                      APIs
                      • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 02253988
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1425320409.0000000002250000.00000040.00000800.00020000.00000000.sdmp, Offset: 02250000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2250000_lmUupyodsah.jbxd
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID:
                      • API String ID: 3559483778-0
                      • Opcode ID: ac40c5014bd6ecc1d41c75c9cc19760ad8f4fb3230fdcd2355d67629baf612f4
                      • Instruction ID: 47e92651672479d00900f0ab98e16df18a27c0d19ce03191e7090b53c88e7409
                      • Opcode Fuzzy Hash: ac40c5014bd6ecc1d41c75c9cc19760ad8f4fb3230fdcd2355d67629baf612f4
                      • Instruction Fuzzy Hash: 122146B29003598FDB20CFA9C880BEEBBF1FF48310F108429E858A7241C7799945CBA0

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 230 22538f8-2253946 232 2253956-2253995 WriteProcessMemory 230->232 233 2253948-2253954 230->233 235 2253997-225399d 232->235 236 225399e-22539ce 232->236 233->232 235->236
                      APIs
                      • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 02253988
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1425320409.0000000002250000.00000040.00000800.00020000.00000000.sdmp, Offset: 02250000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2250000_lmUupyodsah.jbxd
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID:
                      • API String ID: 3559483778-0
                      • Opcode ID: 89a0728528c42d3062b0503f2d953d0899425357f10d3aca26d3831939c5bcbd
                      • Instruction ID: 18a1a3cf3d6f879576812ead9c338bb1187c3079264c19f1a1c83dd747440fb7
                      • Opcode Fuzzy Hash: 89a0728528c42d3062b0503f2d953d0899425357f10d3aca26d3831939c5bcbd
                      • Instruction Fuzzy Hash: 3E213BB6D003599FDB10DFAAC884BDEBBF5FF48310F108429E958A7240C7789945CBA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 240 22dd5b8-22dd654 DuplicateHandle 241 22dd65d-22dd67a 240->241 242 22dd656-22dd65c 240->242 242->241
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,022DD586,?,?,?,?,?), ref: 022DD647
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1425482014.00000000022D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_22d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 9a14651b75450dc03be30bf54693358471b68ecda4a8fa8ce0cd82be57027714
                      • Instruction ID: 5ef3760fefb6d2bbe6d27c63c53afbea52d22536cfba43e9c497468363c360ae
                      • Opcode Fuzzy Hash: 9a14651b75450dc03be30bf54693358471b68ecda4a8fa8ce0cd82be57027714
                      • Instruction Fuzzy Hash: 872114B6D003099FDB10CFAAD584BDEBBF5EB48310F14842AE918A7350C378A945CFA0

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 245 22db6d0-22dd654 DuplicateHandle 247 22dd65d-22dd67a 245->247 248 22dd656-22dd65c 245->248 248->247
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,022DD586,?,?,?,?,?), ref: 022DD647
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1425482014.00000000022D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_22d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 2adefb37b1705c7ea6855d7d06498a8bdc2ab5ae429a941eb371737b48a1f216
                      • Instruction ID: 1e65af1c4ed86e45eeebff2e8cc7306edc2228fda1ca7028b63a9116d98e29a9
                      • Opcode Fuzzy Hash: 2adefb37b1705c7ea6855d7d06498a8bdc2ab5ae429a941eb371737b48a1f216
                      • Instruction Fuzzy Hash: 5F21E3B69003499FDB10CFAAD584AEEBBF4EB48310F14842AE918A7350D374A940CFA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 251 2253321-2253373 253 2253375-2253381 251->253 254 2253383-22533b3 Wow64SetThreadContext 251->254 253->254 256 22533b5-22533bb 254->256 257 22533bc-22533ec 254->257 256->257
                      APIs
                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 022533A6
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1425320409.0000000002250000.00000040.00000800.00020000.00000000.sdmp, Offset: 02250000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2250000_lmUupyodsah.jbxd
                      Similarity
                      • API ID: ContextThreadWow64
                      • String ID:
                      • API String ID: 983334009-0
                      • Opcode ID: 469183ee5f711e06f59304f4dfd770eae2392584377c795fc01b97b5526e9397
                      • Instruction ID: 001d9528acde7fb64b67866a4edf5f498cd5110141ff0e7215e010dc5d1ed43a
                      • Opcode Fuzzy Hash: 469183ee5f711e06f59304f4dfd770eae2392584377c795fc01b97b5526e9397
                      • Instruction Fuzzy Hash: A6213771D103099FDB24DFAAC4857EEBBF5EF88324F14842AD859A7240CB789945CFA0

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 261 22539e1-2253a75 ReadProcessMemory 264 2253a77-2253a7d 261->264 265 2253a7e-2253aae 261->265 264->265
                      APIs
                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02253A68
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1425320409.0000000002250000.00000040.00000800.00020000.00000000.sdmp, Offset: 02250000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2250000_lmUupyodsah.jbxd
                      Similarity
                      • API ID: MemoryProcessRead
                      • String ID:
                      • API String ID: 1726664587-0
                      • Opcode ID: 33d0fe1a9c5745bcc47907b191936d746a1f6255264a612be060495b4971bfa7
                      • Instruction ID: 29d6d40fe94745b365a024bd6445a1252d10ba661d84b327435e198c06cf85f8
                      • Opcode Fuzzy Hash: 33d0fe1a9c5745bcc47907b191936d746a1f6255264a612be060495b4971bfa7
                      • Instruction Fuzzy Hash: 152128B1D003599FDB14DFAAC880BEEBBF1FF48310F14842AE959A7244C7789941CBA0

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 269 2253328-2253373 271 2253375-2253381 269->271 272 2253383-22533b3 Wow64SetThreadContext 269->272 271->272 274 22533b5-22533bb 272->274 275 22533bc-22533ec 272->275 274->275
                      APIs
                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 022533A6
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1425320409.0000000002250000.00000040.00000800.00020000.00000000.sdmp, Offset: 02250000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2250000_lmUupyodsah.jbxd
                      Similarity
                      • API ID: ContextThreadWow64
                      • String ID:
                      • API String ID: 983334009-0
                      • Opcode ID: 78e562b158a4adcc7c623e5f14f9d139f2d117304a944c93433ad79677144f67
                      • Instruction ID: ef4372371f6452d3fa820b2fd5711aa3a4d8e421c58436827b946e22a6de0e2f
                      • Opcode Fuzzy Hash: 78e562b158a4adcc7c623e5f14f9d139f2d117304a944c93433ad79677144f67
                      • Instruction Fuzzy Hash: 9D213771D003099FDB20DFAAC4847EEBBF5EF88224F148429D859A7240CB78A945CBA0

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 279 22539e8-2253a75 ReadProcessMemory 282 2253a77-2253a7d 279->282 283 2253a7e-2253aae 279->283 282->283
                      APIs
                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02253A68
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1425320409.0000000002250000.00000040.00000800.00020000.00000000.sdmp, Offset: 02250000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2250000_lmUupyodsah.jbxd
                      Similarity
                      • API ID: MemoryProcessRead
                      • String ID:
                      • API String ID: 1726664587-0
                      • Opcode ID: 11d2bd94036af7ec9465904204fcca41e827ec2fe2e9396c23153cf8cb098905
                      • Instruction ID: 4b8b2301542e0710c0a955e3f0a8c374f855edff420d6010e6648a4488c51bb2
                      • Opcode Fuzzy Hash: 11d2bd94036af7ec9465904204fcca41e827ec2fe2e9396c23153cf8cb098905
                      • Instruction Fuzzy Hash: E42128B1D003599FDB10DFAAC880BEEBBF5FF48310F108429E918A7240C778A941CBA0

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 287 2253830-22538b3 VirtualAllocEx 291 22538b5-22538bb 287->291 292 22538bc-22538e1 287->292 291->292
                      APIs
                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 022538A6
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1425320409.0000000002250000.00000040.00000800.00020000.00000000.sdmp, Offset: 02250000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2250000_lmUupyodsah.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 3364164e4745a4b241deed4f08c461de792da45ce1825fdf8e16dbe673c26358
                      • Instruction ID: 63895a952089eb320e776123f4a44a3f740ee389f06bfdf8864b1d7c8c58f56e
                      • Opcode Fuzzy Hash: 3364164e4745a4b241deed4f08c461de792da45ce1825fdf8e16dbe673c26358
                      • Instruction Fuzzy Hash: AD2167728003499FDB20DFAAC844BDFBFF5EF48320F148419E855A7210C779A941CBA0
                      APIs
                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,022DAFB9,00000800,00000000,00000000), ref: 022DB1CA
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1425482014.00000000022D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_22d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: ed404167fe99bb75cd1c28b92c8f19ee320dc2ce5f802b4c35c5ead334527301
                      • Instruction ID: 7bbee6429b5ef8b6546617c05a42cbe589165e7f7d85a46b60cdf0b7ed72aa55
                      • Opcode Fuzzy Hash: ed404167fe99bb75cd1c28b92c8f19ee320dc2ce5f802b4c35c5ead334527301
                      • Instruction Fuzzy Hash: 351106B69003499FDB10CF9AC444BDEFBF4EB88314F15842EE415A7210C375A945CFA4
                      APIs
                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 022538A6
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1425320409.0000000002250000.00000040.00000800.00020000.00000000.sdmp, Offset: 02250000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2250000_lmUupyodsah.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 35d74e5acf1ae0f92e2396d3b2c3f7fdca9e45f01a0393990694d6d2a89837e0
                      • Instruction ID: 8778fe52a5a0c076323dc0d89d3828fa592c0b7f714d29abc5f275dc82b39119
                      • Opcode Fuzzy Hash: 35d74e5acf1ae0f92e2396d3b2c3f7fdca9e45f01a0393990694d6d2a89837e0
                      • Instruction Fuzzy Hash: 001126769003499FDB24DFAAC844BDFBBF5EF88320F248419E915A7250C779A945CBA0
                      APIs
                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,022DAFB9,00000800,00000000,00000000), ref: 022DB1CA
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1425482014.00000000022D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_22d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: bc601fb46cc70687fb31ba35c66e10e83d99bbabb933eb3a833d249bdee02c68
                      • Instruction ID: d34e634b784b44fb73e478de90e0919a163b6f47bfb6b8c61c8757c406a1b9fe
                      • Opcode Fuzzy Hash: bc601fb46cc70687fb31ba35c66e10e83d99bbabb933eb3a833d249bdee02c68
                      • Instruction Fuzzy Hash: 5B1112B69003498FDB24CFAAC844BDEFBF4EB89314F14846AD819A7210C375A545CFA4
                      APIs
                      • PostMessageW.USER32(?,00000010,00000000,?), ref: 02257855
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1425320409.0000000002250000.00000040.00000800.00020000.00000000.sdmp, Offset: 02250000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2250000_lmUupyodsah.jbxd
                      Similarity
                      • API ID: MessagePost
                      • String ID:
                      • API String ID: 410705778-0
                      • Opcode ID: ebf5d024f648e83152bec43b4e0b7367244658f493c8160ce3c3eb082dfdccbb
                      • Instruction ID: af414677cfc4b4e88671c1d69d5cbe621eac37b8b43cc877b6ce4e3b2fb53ec6
                      • Opcode Fuzzy Hash: ebf5d024f648e83152bec43b4e0b7367244658f493c8160ce3c3eb082dfdccbb
                      • Instruction Fuzzy Hash: 091106B58003499FDB20DF9AD488BEEFBF8EB48314F108419E958A7210C375A944CFA5
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 022DAF3E
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1425482014.00000000022D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_22d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: e4672d50ebb2d8ab9ab4bd41860eb1c3acd31611e81e1de58ead48b0ca3042ca
                      • Instruction ID: c7b03c1d4bcb553909992001f51ca261c8975fde94e3dec5808b160b13e153c6
                      • Opcode Fuzzy Hash: e4672d50ebb2d8ab9ab4bd41860eb1c3acd31611e81e1de58ead48b0ca3042ca
                      • Instruction Fuzzy Hash: 92111DB6C003498FDB20CF9AD444BDEFBF4EB88324F10846AD828A7204C379A545CFA1
                      APIs
                      • PostMessageW.USER32(?,00000010,00000000,?), ref: 02257855
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1425320409.0000000002250000.00000040.00000800.00020000.00000000.sdmp, Offset: 02250000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2250000_lmUupyodsah.jbxd
                      Similarity
                      • API ID: MessagePost
                      • String ID:
                      • API String ID: 410705778-0
                      • Opcode ID: 16b732117fdba22863223df0c8072429d4062aa02f1be2b0dd21bd9c882dbcc8
                      • Instruction ID: f19a56fc7bfd1fa0e7ba97eaf54fc4eff409612ea7ee5786da75ae271a5a3481
                      • Opcode Fuzzy Hash: 16b732117fdba22863223df0c8072429d4062aa02f1be2b0dd21bd9c882dbcc8
                      • Instruction Fuzzy Hash: F811F2B58003499FDB20DF9AC589BDEBFF4EB48314F248459E958A7210C379A944CFA1
                      APIs
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1425320409.0000000002250000.00000040.00000800.00020000.00000000.sdmp, Offset: 02250000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_2250000_lmUupyodsah.jbxd
                      Similarity
                      • API ID: ResumeThread
                      • String ID:
                      • API String ID: 947044025-0
                      • Opcode ID: e0912d318da0d13d36ca89ca3b8669432c0ea83516b86dbf08a16baa9f8b3ab8
                      • Instruction ID: 672c3230916b6e13ab94acf86041cdf52bf4fd3421314a9563bdc32e945fcf47
                      • Opcode Fuzzy Hash: e0912d318da0d13d36ca89ca3b8669432c0ea83516b86dbf08a16baa9f8b3ab8
                      • Instruction Fuzzy Hash: 43016D71D003198FDB24DFA9D4443EEFBF1AF88324F24C82AC419A7254CB799845CB90
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1424894696.00000000008ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 008ED000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_8ed000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0627e6f1eb3f5a92a4cd8ebeadc0ba819c31d5192122aea359b93b54884e76a5
                      • Instruction ID: f47c4cd10efa8ba95369147c17b370ef84356bc5f2e6e2af218cd1269b68bb39
                      • Opcode Fuzzy Hash: 0627e6f1eb3f5a92a4cd8ebeadc0ba819c31d5192122aea359b93b54884e76a5
                      • Instruction Fuzzy Hash: EE217F71504384DFDB05DF00C5C0B16BB65FBA5318F24C16DD8094F286C336E84ACBA6
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1424952415.00000000008FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008FD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_8fd000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6ec2b759d85b3c527fe4a62b3fccf6ebfc84fbe32ce26de3a31ad2e564db3706
                      • Instruction ID: 5d23f421c95459b1ded59a528f56f95c4e2ca98fe20e4640f7616ddc98a77e04
                      • Opcode Fuzzy Hash: 6ec2b759d85b3c527fe4a62b3fccf6ebfc84fbe32ce26de3a31ad2e564db3706
                      • Instruction Fuzzy Hash: 0C212571504708DFDB14DF20D480B26BB62FBC4314F24C56DDB0A8B246CB3AD847CA62
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1424952415.00000000008FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008FD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_8fd000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 02b120dc620c0f9af7e9fcd68c69d8df754e4b8fa90fe42d313966e0dafd12af
                      • Instruction ID: ca51983f98c867369e2a1eaceb09d75d5137a6d3c83f43b400492493183092e2
                      • Opcode Fuzzy Hash: 02b120dc620c0f9af7e9fcd68c69d8df754e4b8fa90fe42d313966e0dafd12af
                      • Instruction Fuzzy Hash: A321F571504308DFDB05DF20D5C0B26BBA6FB84314F24C56DDB098B256C376E846CAA1
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1424894696.00000000008ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 008ED000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_8ed000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                      • Instruction ID: f100e57c125a7a2570b7d5bbc6e2ef42d0cffa0690e14a092f55183c75a7dca5
                      • Opcode Fuzzy Hash: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                      • Instruction Fuzzy Hash: 8711DF76404280CFCB12CF00D5C0B16BF71FBA4324F24C2A9D8094B656C33AE85ACBA1
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1424952415.00000000008FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008FD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_8fd000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                      • Instruction ID: 4064a58def83721d81cfda5b935a504eed269df4f4a2ef755543ef90cdf2523d
                      • Opcode Fuzzy Hash: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                      • Instruction Fuzzy Hash: 98118E75504244DFDB16CF20D5C4B25BB72FB84314F24C6AADA498B656C33AE84ACB91
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1424952415.00000000008FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008FD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_8fd000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                      • Instruction ID: 1606b8be6912de51dc4ee3a5368313335aac63ce25201a7a9b143741b99cf5b2
                      • Opcode Fuzzy Hash: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                      • Instruction Fuzzy Hash: E811BE75504784CFCB16CF20D5C4B25FB62FB84314F24C6AADA498B656C33AD80ACB61
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1424894696.00000000008ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 008ED000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_8ed000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 830f4b3b2a5b06d5ccd46c4d9d08d544a12633ac3c04f2901bf353eafa9afbbf
                      • Instruction ID: 68f27d6b8355c787fd479aa1bc1e3a3e436fe5443b26d1edf8f1cef82df17e46
                      • Opcode Fuzzy Hash: 830f4b3b2a5b06d5ccd46c4d9d08d544a12633ac3c04f2901bf353eafa9afbbf
                      • Instruction Fuzzy Hash: 2701A7714043849BE7205B26DD84766BBA8FF43724F28C41AED098E286C2799844CA71
                      Memory Dump Source
                      • Source File: 0000000A.00000002.1424894696.00000000008ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 008ED000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_10_2_8ed000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ef6a486fed057e0c2b8e16d3354d50ca95db5aca37ed67e979c08425143f95ff
                      • Instruction ID: bb0384d929a5d1bea5a01f574c4f85e6c5d066145389ff0801f329447557d1d4
                      • Opcode Fuzzy Hash: ef6a486fed057e0c2b8e16d3354d50ca95db5aca37ed67e979c08425143f95ff
                      • Instruction Fuzzy Hash: 39F068714043849EE7208B16DDC4766FBA8EF51724F18C45AED484F286C2755C44CA71

                      Execution Graph

                      Execution Coverage:11.4%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:12.5%
                      Total number of Nodes:32
                      Total number of Limit Nodes:5
                      execution_graph 25411 57d7e78 25412 57d7e85 25411->25412 25413 57d7e7f 25411->25413 25413->25412 25416 57d8206 25413->25416 25417 57d7588 25413->25417 25415 57d7588 LdrInitializeThunk 25415->25416 25416->25412 25416->25415 25418 57d759a 25417->25418 25420 57d759f 25417->25420 25418->25416 25419 57d7cc9 LdrInitializeThunk 25419->25418 25420->25418 25420->25419 25421 11dced8 25422 11dcee4 25421->25422 25426 6a385a3 25422->25426 25432 6a385b0 25422->25432 25423 11dd0b7 25427 6a385d2 25426->25427 25428 6a386e4 25427->25428 25430 57d7588 LdrInitializeThunk 25427->25430 25438 57d7b8c 25427->25438 25444 57d77a8 25427->25444 25428->25423 25430->25428 25433 6a385d2 25432->25433 25434 6a386e4 25433->25434 25435 57d7b8c 2 API calls 25433->25435 25436 57d7588 LdrInitializeThunk 25433->25436 25437 57d77a8 2 API calls 25433->25437 25434->25423 25435->25434 25436->25434 25437->25434 25443 57d7a43 25438->25443 25439 57d7b84 LdrInitializeThunk 25441 57d7ce1 25439->25441 25441->25428 25442 57d7588 LdrInitializeThunk 25442->25443 25443->25439 25443->25442 25448 57d77d9 25444->25448 25445 57d7939 25445->25428 25446 57d7b84 LdrInitializeThunk 25446->25445 25448->25445 25448->25446 25449 57d7588 LdrInitializeThunk 25448->25449 25449->25448

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1002 57d7588-57d7598 1003 57d759f-57d75ab 1002->1003 1004 57d759a 1002->1004 1007 57d75ad 1003->1007 1008 57d75b2-57d75c7 1003->1008 1005 57d76cb-57d76d5 1004->1005 1007->1005 1011 57d75cd-57d75d8 1008->1011 1012 57d76db-57d771b 1008->1012 1015 57d75de-57d75e5 1011->1015 1016 57d76d6 1011->1016 1028 57d7722-57d77d7 1012->1028 1017 57d75e7-57d75fe 1015->1017 1018 57d7612-57d761d 1015->1018 1016->1012 1027 57d7604-57d7607 1017->1027 1017->1028 1023 57d761f-57d7627 1018->1023 1024 57d762a-57d7634 1018->1024 1023->1024 1033 57d76be-57d76c3 1024->1033 1034 57d763a-57d7644 1024->1034 1027->1016 1031 57d760d-57d7610 1027->1031 1060 57d77de-57d7874 1028->1060 1061 57d77d9 1028->1061 1031->1017 1031->1018 1033->1005 1034->1016 1038 57d764a-57d7666 1034->1038 1044 57d7668 1038->1044 1045 57d766a-57d766d 1038->1045 1044->1005 1047 57d766f-57d7672 1045->1047 1048 57d7674-57d7677 1045->1048 1049 57d767a-57d7688 1047->1049 1048->1049 1049->1016 1053 57d768a-57d7691 1049->1053 1053->1005 1054 57d7693-57d7699 1053->1054 1054->1016 1056 57d769b-57d76a0 1054->1056 1056->1016 1057 57d76a2-57d76b5 1056->1057 1057->1016 1062 57d76b7-57d76ba 1057->1062 1065 57d7913-57d7919 1060->1065 1061->1060 1062->1054 1063 57d76bc 1062->1063 1063->1005 1066 57d791f-57d7937 1065->1066 1067 57d7879-57d788c 1065->1067 1068 57d7939-57d7946 1066->1068 1069 57d794b-57d795e 1066->1069 1070 57d788e 1067->1070 1071 57d7893-57d78e4 1067->1071 1072 57d7ce1-57d7dde 1068->1072 1073 57d7965-57d7981 1069->1073 1074 57d7960 1069->1074 1070->1071 1087 57d78f7-57d7909 1071->1087 1088 57d78e6-57d78f4 1071->1088 1079 57d7de6-57d7df0 1072->1079 1080 57d7de0-57d7de5 1072->1080 1076 57d7988-57d79ac 1073->1076 1077 57d7983 1073->1077 1074->1073 1083 57d79ae 1076->1083 1084 57d79b3-57d79e5 1076->1084 1077->1076 1080->1079 1083->1084 1093 57d79ec-57d7a2e 1084->1093 1094 57d79e7 1084->1094 1090 57d790b 1087->1090 1091 57d7910 1087->1091 1088->1066 1090->1091 1091->1065 1096 57d7a35-57d7a3e 1093->1096 1097 57d7a30 1093->1097 1094->1093 1098 57d7c66-57d7c6c 1096->1098 1097->1096 1099 57d7a43-57d7a68 1098->1099 1100 57d7c72-57d7c85 1098->1100 1101 57d7a6f-57d7aa6 1099->1101 1102 57d7a6a 1099->1102 1103 57d7c8c-57d7ca7 1100->1103 1104 57d7c87 1100->1104 1112 57d7aad-57d7adf 1101->1112 1113 57d7aa8 1101->1113 1102->1101 1105 57d7cae-57d7cc2 1103->1105 1106 57d7ca9 1103->1106 1104->1103 1110 57d7cc9-57d7cdf LdrInitializeThunk 1105->1110 1111 57d7cc4 1105->1111 1106->1105 1110->1072 1111->1110 1115 57d7ae1-57d7b06 1112->1115 1116 57d7b43-57d7b56 1112->1116 1113->1112 1117 57d7b0d-57d7b3b 1115->1117 1118 57d7b08 1115->1118 1119 57d7b5d-57d7b82 1116->1119 1120 57d7b58 1116->1120 1117->1116 1118->1117 1123 57d7b84-57d7b85 1119->1123 1124 57d7b91-57d7bc9 1119->1124 1120->1119 1123->1100 1125 57d7bcb 1124->1125 1126 57d7bd0-57d7c31 call 57d7588 1124->1126 1125->1126 1132 57d7c38-57d7c5c 1126->1132 1133 57d7c33 1126->1133 1136 57d7c5e 1132->1136 1137 57d7c63 1132->1137 1133->1132 1136->1137 1137->1098
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3822779623.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_57d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2aa42a06475087bc953e3e73949b027c9380b27da875b808104665ae1a25f7ef
                      • Instruction ID: 3758a635a8a417a8d79b0a53f9f5190796d8779e2ae1698dfc13da3f14f1c5d8
                      • Opcode Fuzzy Hash: 2aa42a06475087bc953e3e73949b027c9380b27da875b808104665ae1a25f7ef
                      • Instruction Fuzzy Hash: 01222774E002188FDB18DFA9D884BADFBB2FF88304F1481A9D409AB355DB759981CF60
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c40648405b00b348ee5b6d66510a29ebd0a8d623d87b625d6e44c4688d521f19
                      • Instruction ID: 140d4f6b547ee1c1978013ccb55de0cdda18e885b3a3d5bb17aee4c7f749a3ac
                      • Opcode Fuzzy Hash: c40648405b00b348ee5b6d66510a29ebd0a8d623d87b625d6e44c4688d521f19
                      • Instruction Fuzzy Hash: 86729F71A00209DFCF19CF68D884AAEBBF2FF88314F158559E9099B3A5D734E941CB91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1915 6a30d48-6a30d68 1916 6a30d6a 1915->1916 1917 6a30d6f-6a30de8 1915->1917 1916->1917 1921 6a30e36-6a30e89 1917->1921 1922 6a30dea-6a30e31 1917->1922 1929 6a30ed1-6a30f85 1921->1929 1930 6a30e8b-6a30ed0 1921->1930 1922->1929 2077 6a30f8b call 11d4dc8 1929->2077 2078 6a30f8b call 11d4dbb 1929->2078 1930->1929 1940 6a30f90-6a30fb6 1942 6a31b77-6a31bac 1940->1942 1943 6a30fbc-6a310bf 1940->1943 1953 6a31b6a-6a31b70 1943->1953 1954 6a31b76 1953->1954 1955 6a310c4-6a311a2 1953->1955 1954->1942 1963 6a311a4 1955->1963 1964 6a311a9-6a31212 1955->1964 1963->1964 1968 6a31214 1964->1968 1969 6a31219-6a3122a 1964->1969 1968->1969 1970 6a31230-6a3123a 1969->1970 1971 6a312b7-6a313be 1969->1971 1972 6a31241-6a312b6 1970->1972 1973 6a3123c 1970->1973 1989 6a313c0 1971->1989 1990 6a313c5-6a3142e 1971->1990 1972->1971 1973->1972 1989->1990 1994 6a31430 1990->1994 1995 6a31435-6a31446 1990->1995 1994->1995 1996 6a314d3-6a31687 1995->1996 1997 6a3144c-6a31456 1995->1997 2018 6a31689 1996->2018 2019 6a3168e-6a3170c 1996->2019 1998 6a31458 1997->1998 1999 6a3145d-6a314d2 1997->1999 1998->1999 1999->1996 2018->2019 2023 6a31713-6a31724 2019->2023 2024 6a3170e 2019->2024 2025 6a317b1-6a3184a 2023->2025 2026 6a3172a-6a31734 2023->2026 2024->2023 2037 6a31851-6a318c9 2025->2037 2038 6a3184c 2025->2038 2027 6a31736 2026->2027 2028 6a3173b-6a317b0 2026->2028 2027->2028 2028->2025 2044 6a318d0-6a318e1 2037->2044 2045 6a318cb 2037->2045 2038->2037 2046 6a318e7-6a3197b 2044->2046 2047 6a319cf-6a31a63 2044->2047 2045->2044 2061 6a31982-6a319ce 2046->2061 2062 6a3197d 2046->2062 2056 6a31b55-6a31b60 2047->2056 2057 6a31a69-6a31b54 2047->2057 2058 6a31b62 2056->2058 2059 6a31b67 2056->2059 2057->2056 2058->2059 2059->1953 2061->2047 2062->2061 2077->1940 2078->1940
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0126fc297900ab743287eb4f681e10c8c599b0c612b2c566defe7a06a8bcccde
                      • Instruction ID: 8ebdd616e4f72302e54f73cf33733c166eb2d9ad6498ba42d770f1dc8a38ebd6
                      • Opcode Fuzzy Hash: 0126fc297900ab743287eb4f681e10c8c599b0c612b2c566defe7a06a8bcccde
                      • Instruction Fuzzy Hash: 22825D74E012288FDB64DF69DC98B9DBBB2BB89300F1081E9985DA7365DB705E81CF41

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2079 11de431-11de460 2080 11de467-11de4e9 2079->2080 2081 11de462 2079->2081 2083 11de550-11de566 2080->2083 2081->2080 2084 11de568-11de5b2 call 11d0364 2083->2084 2085 11de4eb-11de4f4 2083->2085 2094 11de61d-11de61e 2084->2094 2095 11de5b4-11de5f5 call 11d0384 2084->2095 2086 11de4fb-11de546 call 11dbb84 2085->2086 2087 11de4f6 2085->2087 2096 11de54d 2086->2096 2097 11de548 2086->2097 2087->2086 2099 11de61f-11de650 2094->2099 2104 11de617-11de618 2095->2104 2105 11de5f7-11de615 2095->2105 2096->2083 2097->2096 2103 11de657-11de6be 2099->2103 2111 11de6c4-11de6e5 2103->2111 2112 11df010-11df047 2103->2112 2106 11de619-11de61b 2104->2106 2105->2106 2106->2099 2115 11defed-11df009 2111->2115 2116 11df00f 2115->2116 2117 11de6ea-11de6f3 2115->2117 2116->2112 2118 11de6fa-11de760 call 11db020 2117->2118 2119 11de6f5 2117->2119 2124 11de767-11de7f1 call 11db030 2118->2124 2125 11de762 2118->2125 2119->2118 2132 11de803-11de80a 2124->2132 2133 11de7f3-11de7fa 2124->2133 2125->2124 2136 11de80c 2132->2136 2137 11de811-11de81e 2132->2137 2134 11de7fc 2133->2134 2135 11de801 2133->2135 2134->2135 2135->2137 2136->2137 2138 11de825-11de82c 2137->2138 2139 11de820 2137->2139 2140 11de82e 2138->2140 2141 11de833-11de88a 2138->2141 2139->2138 2140->2141 2144 11de88c 2141->2144 2145 11de891-11de8a8 2141->2145 2144->2145 2146 11de8aa-11de8b1 2145->2146 2147 11de8b3-11de8bb 2145->2147 2148 11de8bc-11de8c6 2146->2148 2147->2148 2149 11de8cd-11de8d6 2148->2149 2150 11de8c8 2148->2150 2151 11defbd-11defc3 2149->2151 2150->2149 2152 11defc9-11defe3 2151->2152 2153 11de8db-11de8e7 2151->2153 2159 11defea 2152->2159 2160 11defe5 2152->2160 2154 11de8ee-11de8f3 2153->2154 2155 11de8e9 2153->2155 2157 11de8f5-11de901 2154->2157 2158 11de936-11de938 2154->2158 2155->2154 2162 11de908-11de90d 2157->2162 2163 11de903 2157->2163 2161 11de93e-11de952 2158->2161 2159->2115 2160->2159 2165 11de958-11de96d 2161->2165 2166 11def9b-11defa8 2161->2166 2162->2158 2164 11de90f-11de91c 2162->2164 2163->2162 2167 11de91e 2164->2167 2168 11de923-11de934 2164->2168 2169 11de96f 2165->2169 2170 11de974-11de9fa 2165->2170 2171 11defa9-11defb3 2166->2171 2167->2168 2168->2161 2169->2170 2178 11de9fc-11dea22 2170->2178 2179 11dea24 2170->2179 2172 11defba 2171->2172 2173 11defb5 2171->2173 2172->2151 2173->2172 2180 11dea2e-11dea4e 2178->2180 2179->2180 2182 11debcd-11debd2 2180->2182 2183 11dea54-11dea5e 2180->2183 2186 11debd4-11debf4 2182->2186 2187 11dec36-11dec38 2182->2187 2184 11dea65-11dea8e 2183->2184 2185 11dea60 2183->2185 2189 11deaa8-11deaaa 2184->2189 2190 11dea90-11dea9a 2184->2190 2185->2184 2202 11dec1e 2186->2202 2203 11debf6-11dec1c 2186->2203 2188 11dec3e-11dec5e 2187->2188 2192 11def95-11def96 2188->2192 2193 11dec64-11dec6e 2188->2193 2191 11deb49-11deb58 2189->2191 2195 11dea9c 2190->2195 2196 11deaa1-11deaa7 2190->2196 2197 11deb5f-11deb64 2191->2197 2198 11deb5a 2191->2198 2201 11def97-11def99 2192->2201 2199 11dec75-11dec9e 2193->2199 2200 11dec70 2193->2200 2195->2196 2196->2189 2205 11deb8e-11deb90 2197->2205 2206 11deb66-11deb76 2197->2206 2198->2197 2207 11decb8-11decc6 2199->2207 2208 11deca0-11decaa 2199->2208 2200->2199 2201->2171 2204 11dec28-11dec34 2202->2204 2203->2204 2204->2188 2212 11deb96-11debaa 2205->2212 2210 11deb7d-11deb8c 2206->2210 2211 11deb78 2206->2211 2215 11ded65-11ded74 2207->2215 2213 11decac 2208->2213 2214 11decb1-11decb7 2208->2214 2210->2212 2211->2210 2216 11deaaf-11deaca 2212->2216 2217 11debb0-11debc8 2212->2217 2213->2214 2214->2207 2218 11ded7b-11ded80 2215->2218 2219 11ded76 2215->2219 2220 11deacc 2216->2220 2221 11dead1-11deb3b 2216->2221 2217->2201 2222 11dedaa-11dedac 2218->2222 2223 11ded82-11ded92 2218->2223 2219->2218 2220->2221 2242 11deb3d 2221->2242 2243 11deb42-11deb48 2221->2243 2226 11dedb2-11dedc6 2222->2226 2224 11ded99-11deda8 2223->2224 2225 11ded94 2223->2225 2224->2226 2225->2224 2227 11dedcc-11dee35 call 11d59d0 * 2 2226->2227 2228 11deccb-11dece6 2226->2228 2240 11dee3e-11def91 2227->2240 2241 11dee37-11dee39 2227->2241 2231 11deced-11ded57 2228->2231 2232 11dece8 2228->2232 2247 11ded5e-11ded64 2231->2247 2248 11ded59 2231->2248 2232->2231 2244 11def92-11def93 2240->2244 2241->2244 2242->2243 2243->2191 2244->2152 2247->2215 2248->2247
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a679f2fe7090d87d6bb56ef0b5021d8cb4c22c550180ed1e512b78c167da1230
                      • Instruction ID: 6b5391e0181e5c558dd7b1eafee97519a573611f3ca1d1342311b5343d9e03d9
                      • Opcode Fuzzy Hash: a679f2fe7090d87d6bb56ef0b5021d8cb4c22c550180ed1e512b78c167da1230
                      • Instruction Fuzzy Hash: CC72C174E01228CFDB68DF69C884BDDBBB2BB49301F5481E9D449AB355E7349A81CF50

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2449 11d6108-11d614e 2451 11d6719-11d6774 call 11d6880 2449->2451 2452 11d6154-11d6162 2449->2452 2469 11d67c4-11d67c8 2451->2469 2470 11d6776-11d677a 2451->2470 2456 11d6164-11d6175 2452->2456 2457 11d6190-11d61a1 2452->2457 2456->2457 2471 11d6177-11d6183 2456->2471 2458 11d61a3-11d61a7 2457->2458 2459 11d6212-11d6226 2457->2459 2460 11d61a9-11d61b5 2458->2460 2461 11d61c2-11d61cb 2458->2461 2594 11d6229 call 11d6108 2459->2594 2595 11d6229 call 11d6730 2459->2595 2465 11d61bb-11d61bd 2460->2465 2466 11d6543-11d658e 2460->2466 2467 11d64d4 2461->2467 2468 11d61d1-11d61d4 2461->2468 2464 11d622f-11d6235 2474 11d623e-11d6245 2464->2474 2475 11d6237-11d6239 2464->2475 2476 11d64ca-11d64d1 2465->2476 2547 11d6595-11d6614 2466->2547 2472 11d64d9-11d653c 2467->2472 2468->2467 2477 11d61da-11d61f9 2468->2477 2480 11d67df-11d67f3 2469->2480 2481 11d67ca-11d67d9 2469->2481 2478 11d677c-11d6781 2470->2478 2479 11d6789-11d6790 2470->2479 2471->2472 2473 11d6189-11d618b 2471->2473 2472->2466 2473->2476 2483 11d624b-11d6262 2474->2483 2484 11d6333-11d6344 2474->2484 2475->2476 2477->2467 2514 11d61ff-11d6205 2477->2514 2478->2479 2486 11d6866-11d687a 2479->2486 2487 11d6796-11d679d 2479->2487 2482 11d67fb-11d6802 2480->2482 2596 11d67f5 call 11d9858 2480->2596 2597 11d67f5 call 11d9851 2480->2597 2488 11d67db-11d67dd 2481->2488 2489 11d6805-11d680f 2481->2489 2483->2484 2504 11d6268-11d6274 2483->2504 2507 11d636e-11d6374 2484->2507 2508 11d6346-11d6353 2484->2508 2487->2469 2494 11d679f-11d67a3 2487->2494 2488->2482 2490 11d6819-11d681d 2489->2490 2491 11d6811-11d6817 2489->2491 2497 11d6825-11d685f 2490->2497 2498 11d681f 2490->2498 2491->2497 2501 11d67a5-11d67aa 2494->2501 2502 11d67b2-11d67b9 2494->2502 2497->2486 2498->2497 2501->2502 2502->2486 2503 11d67bf-11d67c2 2502->2503 2503->2482 2511 11d632c-11d632e 2504->2511 2512 11d627a-11d62e6 2504->2512 2509 11d638f-11d6395 2507->2509 2510 11d6376-11d6382 2507->2510 2508->2509 2525 11d6355-11d6361 2508->2525 2518 11d639b-11d63b8 2509->2518 2519 11d64c7 2509->2519 2516 11d6388-11d638a 2510->2516 2517 11d662b-11d668e 2510->2517 2511->2476 2549 11d62e8-11d6312 2512->2549 2550 11d6314-11d6329 2512->2550 2514->2451 2521 11d620b-11d620f 2514->2521 2516->2476 2574 11d6695-11d6714 2517->2574 2518->2467 2540 11d63be-11d63c1 2518->2540 2519->2476 2521->2459 2527 11d6619-11d6624 2525->2527 2528 11d6367-11d6369 2525->2528 2527->2517 2528->2476 2540->2451 2545 11d63c7-11d63ed 2540->2545 2545->2519 2556 11d63f3-11d63ff 2545->2556 2549->2550 2550->2511 2560 11d6405-11d647d 2556->2560 2561 11d64c3-11d64c5 2556->2561 2576 11d647f-11d64a9 2560->2576 2577 11d64ab-11d64c0 2560->2577 2561->2476 2576->2577 2577->2561 2594->2464 2595->2464 2596->2482 2597->2482
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ac9633b57971091b7114f5fc4dc9ee37d9ab2f1a47039c89035d8744e91741e7
                      • Instruction ID: 47e066a1e85d5c26ef2058ee1afceaddd3a785a6da3f23ac15aa45ecdb56e3f3
                      • Opcode Fuzzy Hash: ac9633b57971091b7114f5fc4dc9ee37d9ab2f1a47039c89035d8744e91741e7
                      • Instruction Fuzzy Hash: E8128D70A002189FDB18DF69C854BAEBBF6FF88304F25856DE509AB395DB349D41CB90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 3170 11db328-11db33b 3171 11db47a-11db481 3170->3171 3172 11db341-11db34a 3170->3172 3173 11db484 3172->3173 3174 11db350-11db354 3172->3174 3177 11db489-11db491 3173->3177 3175 11db36e-11db375 3174->3175 3176 11db356 3174->3176 3175->3171 3179 11db37b-11db388 3175->3179 3178 11db359-11db364 3176->3178 3184 11db4bc-11db4ca 3177->3184 3185 11db493-11db4b0 3177->3185 3178->3173 3180 11db36a-11db36c 3178->3180 3179->3171 3183 11db38e-11db3a1 3179->3183 3180->3175 3180->3178 3186 11db3a6-11db3ae 3183->3186 3187 11db3a3 3183->3187 3194 11db4cc-11db4d1 3184->3194 3195 11db4d3-11db4d6 3184->3195 3188 11db4dc 3185->3188 3189 11db4b2-11db4b8 3185->3189 3190 11db41b-11db41d 3186->3190 3191 11db3b0-11db3b6 3186->3191 3187->3186 3192 11db4de-11db4e2 3188->3192 3189->3184 3190->3171 3196 11db41f-11db425 3190->3196 3191->3190 3197 11db3b8-11db3be 3191->3197 3194->3192 3198 11db4d8-11db4da 3195->3198 3199 11db4e3-11db520 3195->3199 3196->3171 3200 11db427-11db431 3196->3200 3197->3177 3201 11db3c4-11db3dc 3197->3201 3198->3188 3198->3189 3206 11db527-11db604 call 11d3908 call 11d3428 3199->3206 3207 11db522 3199->3207 3200->3177 3202 11db433-11db44b 3200->3202 3211 11db3de-11db3e4 3201->3211 3212 11db409-11db40c 3201->3212 3214 11db44d-11db453 3202->3214 3215 11db470-11db473 3202->3215 3233 11db60b-11db62c call 11d4dc8 3206->3233 3234 11db606 3206->3234 3207->3206 3211->3177 3216 11db3ea-11db3fe 3211->3216 3212->3173 3213 11db40e-11db411 3212->3213 3213->3173 3219 11db413-11db419 3213->3219 3214->3177 3220 11db455-11db469 3214->3220 3215->3173 3218 11db475-11db478 3215->3218 3216->3177 3225 11db404 3216->3225 3218->3171 3218->3200 3219->3190 3219->3191 3220->3177 3227 11db46b 3220->3227 3225->3212 3227->3215 3236 11db631-11db63c 3233->3236 3234->3233 3237 11db63e 3236->3237 3238 11db643-11db647 3236->3238 3237->3238 3239 11db64c-11db653 3238->3239 3240 11db649-11db64a 3238->3240 3242 11db65a-11db668 3239->3242 3243 11db655 3239->3243 3241 11db66b-11db6af 3240->3241 3247 11db715-11db72c 3241->3247 3242->3241 3243->3242 3249 11db72e-11db753 3247->3249 3250 11db6b1-11db6c7 3247->3250 3256 11db76b 3249->3256 3257 11db755-11db76a 3249->3257 3254 11db6c9-11db6d5 3250->3254 3255 11db6f1 3250->3255 3258 11db6df-11db6e5 3254->3258 3259 11db6d7-11db6dd 3254->3259 3260 11db6f7-11db714 3255->3260 3263 11db76c 3256->3263 3257->3256 3261 11db6ef 3258->3261 3259->3261 3260->3247 3261->3260 3263->3263
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f80a2aa3a1ae62a9e4bf463098f14d50bfc01e0279473e15d5ac8a041598eaba
                      • Instruction ID: e0704825436fe240bc7192d78fc1e3cfbf1af46fe3d2eca0b789da6959b4232f
                      • Opcode Fuzzy Hash: f80a2aa3a1ae62a9e4bf463098f14d50bfc01e0279473e15d5ac8a041598eaba
                      • Instruction Fuzzy Hash: F1E11C75E04218CFDB18CFA9C884A9DBBB1FF49310F168069E91AAB361DB34AC41CF55

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 3266 11d6880-11d68a3 3267 11d68ae-11d68ce 3266->3267 3268 11d68a5-11d68ab 3266->3268 3271 11d68d5-11d68dc 3267->3271 3272 11d68d0 3267->3272 3268->3267 3274 11d68de-11d68e9 3271->3274 3273 11d6c64-11d6c6d 3272->3273 3275 11d68ef-11d6902 3274->3275 3276 11d6c75-11d6c9a 3274->3276 3279 11d6918-11d6933 3275->3279 3280 11d6904-11d6912 3275->3280 3284 11d6935-11d693b 3279->3284 3285 11d6957-11d695a 3279->3285 3280->3279 3283 11d6bec-11d6bf3 3280->3283 3283->3273 3290 11d6bf5-11d6bf7 3283->3290 3288 11d693d 3284->3288 3289 11d6944-11d6947 3284->3289 3286 11d6ab4-11d6aba 3285->3286 3287 11d6960-11d6963 3285->3287 3295 11d6ba6-11d6ba9 3286->3295 3296 11d6ac0-11d6ac5 3286->3296 3287->3286 3297 11d6969-11d696f 3287->3297 3288->3286 3288->3289 3292 11d697a-11d6980 3288->3292 3288->3295 3291 11d6949-11d694c 3289->3291 3289->3292 3293 11d6bf9-11d6bfe 3290->3293 3294 11d6c06-11d6c0c 3290->3294 3298 11d69e6-11d69ec 3291->3298 3299 11d6952 3291->3299 3302 11d6986-11d6988 3292->3302 3303 11d6982-11d6984 3292->3303 3293->3294 3294->3276 3300 11d6c0e-11d6c13 3294->3300 3304 11d6baf-11d6bb5 3295->3304 3305 11d6c70 3295->3305 3296->3295 3297->3286 3301 11d6975 3297->3301 3298->3295 3308 11d69f2-11d69f8 3298->3308 3299->3295 3306 11d6c58-11d6c5b 3300->3306 3307 11d6c15-11d6c1a 3300->3307 3301->3295 3309 11d6992-11d699b 3302->3309 3303->3309 3310 11d6bda-11d6bde 3304->3310 3311 11d6bb7-11d6bbf 3304->3311 3305->3276 3306->3305 3312 11d6c5d-11d6c62 3306->3312 3307->3305 3313 11d6c1c 3307->3313 3314 11d69fe-11d6a00 3308->3314 3315 11d69fa-11d69fc 3308->3315 3317 11d699d-11d69a8 3309->3317 3318 11d69ae-11d69d6 3309->3318 3310->3283 3319 11d6be0-11d6be6 3310->3319 3311->3276 3316 11d6bc5-11d6bd4 3311->3316 3312->3273 3312->3290 3320 11d6c23-11d6c28 3313->3320 3321 11d6a0a-11d6a21 3314->3321 3315->3321 3316->3279 3316->3310 3317->3295 3317->3318 3339 11d69dc-11d69e1 3318->3339 3340 11d6aca-11d6b00 3318->3340 3319->3274 3319->3283 3323 11d6c4a-11d6c4c 3320->3323 3324 11d6c2a-11d6c2c 3320->3324 3333 11d6a4c-11d6a73 3321->3333 3334 11d6a23-11d6a3c 3321->3334 3323->3305 3330 11d6c4e-11d6c51 3323->3330 3327 11d6c2e-11d6c33 3324->3327 3328 11d6c3b-11d6c41 3324->3328 3327->3328 3328->3276 3332 11d6c43-11d6c48 3328->3332 3330->3306 3332->3323 3335 11d6c1e-11d6c21 3332->3335 3333->3305 3345 11d6a79-11d6a7c 3333->3345 3334->3340 3343 11d6a42-11d6a47 3334->3343 3335->3305 3335->3320 3339->3340 3346 11d6b0d-11d6b15 3340->3346 3347 11d6b02-11d6b06 3340->3347 3343->3340 3345->3305 3348 11d6a82-11d6aab 3345->3348 3346->3305 3351 11d6b1b-11d6b20 3346->3351 3349 11d6b08-11d6b0b 3347->3349 3350 11d6b25-11d6b29 3347->3350 3348->3340 3363 11d6aad-11d6ab2 3348->3363 3349->3346 3349->3350 3352 11d6b48-11d6b4c 3350->3352 3353 11d6b2b-11d6b31 3350->3353 3351->3295 3355 11d6b4e-11d6b54 3352->3355 3356 11d6b56-11d6b75 call 11d6e58 3352->3356 3353->3352 3357 11d6b33-11d6b3b 3353->3357 3355->3356 3358 11d6b7b-11d6b7f 3355->3358 3356->3358 3357->3305 3359 11d6b41-11d6b46 3357->3359 3358->3295 3361 11d6b81-11d6b9d 3358->3361 3359->3295 3361->3295 3363->3340
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4319795cf4c2c98259d4f01e85b8ba61d4a46453aac66c7d4d4c636f68652070
                      • Instruction ID: 3f04b0aeee8d74ed3ea06671969aff19b9af1f33a726c31bbd04ee414b9aaae0
                      • Opcode Fuzzy Hash: 4319795cf4c2c98259d4f01e85b8ba61d4a46453aac66c7d4d4c636f68652070
                      • Instruction Fuzzy Hash: 20D14871A00219DFDB18CFA9C984AAEBBB2FF88304F198069E505AB365D734EC41CF51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 3627 6a385b0-6a385d0 3628 6a385d2 3627->3628 3629 6a385d7-6a38699 3627->3629 3628->3629 3634 6a38a62-6a38b60 3629->3634 3635 6a3869f-6a386dd 3629->3635 3637 6a38b62-6a38b67 3634->3637 3638 6a38b68-6a38b6e 3634->3638 3686 6a386df call 57d7b8c 3635->3686 3687 6a386df call 57d7588 3635->3687 3688 6a386df call 57d77a8 3635->3688 3637->3638 3642 6a386e4-6a38706 3644 6a38708 3642->3644 3645 6a3870d-6a38716 3642->3645 3644->3645 3646 6a38a55-6a38a5b 3645->3646 3647 6a38a61 3646->3647 3648 6a3871b-6a387b3 3646->3648 3647->3634 3653 6a3888b-6a388ec 3648->3653 3654 6a387b9-6a387f5 3648->3654 3665 6a388ed-6a38942 3653->3665 3689 6a387fb call 6a38b9b 3654->3689 3690 6a387fb call 6a38e69 3654->3690 3661 6a38801-6a3883c 3663 6a38886-6a38889 3661->3663 3664 6a3883e-6a3885b 3661->3664 3663->3665 3669 6a38861-6a38885 3664->3669 3670 6a38a39-6a38a4b 3665->3670 3671 6a38948-6a38a38 3665->3671 3669->3663 3673 6a38a52 3670->3673 3674 6a38a4d 3670->3674 3671->3670 3673->3646 3674->3673 3686->3642 3687->3642 3688->3642 3689->3661 3690->3661
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 66b6bab69f46faee17b304b0f32b73e91161d4f184c51ca904134860f3855063
                      • Instruction ID: 7bd2ee1bdf49c8947a033b9d0bb121e8124a92bbe61c847a9004eb70b8f0666a
                      • Opcode Fuzzy Hash: 66b6bab69f46faee17b304b0f32b73e91161d4f184c51ca904134860f3855063
                      • Instruction Fuzzy Hash: FBE1B274E01218CFEB64DFA5D944B9DBBB2BF89304F2081AAD409BB394DB755A85CF10
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bd8c5002e7993bec8cb1dc52f1130be1834f0d4f86a8f38f6e14bd9fe0252ac3
                      • Instruction ID: 9557298b9aa02fa60ecfb8596b2c06c060a19d8019115ae0c9fdbfa9e1b95d8d
                      • Opcode Fuzzy Hash: bd8c5002e7993bec8cb1dc52f1130be1834f0d4f86a8f38f6e14bd9fe0252ac3
                      • Instruction Fuzzy Hash: 59D1B374E00219CFDB14DFA9D954B9DBBB2BF89300F1081AAD809A7364DB355E82CF51
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7075ff519efc3eb5e495c35d456ec9aa6698c413e30e9dd5f125ff87f5f32655
                      • Instruction ID: e0a962f5a154ca73b2047fc75060668e527f4e6e4d964a2036a7a2dfba74777d
                      • Opcode Fuzzy Hash: 7075ff519efc3eb5e495c35d456ec9aa6698c413e30e9dd5f125ff87f5f32655
                      • Instruction Fuzzy Hash: D6A1AF75E01228CFEB68DF6AC944B9DBAF2BF89300F14C1AAD509A7254DB345A85CF10
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f6373845dc2b204ec8f5f88751b28a2c80a88073834d41094822b31410d9fd4a
                      • Instruction ID: d77b8a8ff8eca8dce67674540dbc987740312b10264e8725b7265adf5a5f94ec
                      • Opcode Fuzzy Hash: f6373845dc2b204ec8f5f88751b28a2c80a88073834d41094822b31410d9fd4a
                      • Instruction Fuzzy Hash: CCA19075E012288FEB68DF6AD944B9DBBF2AF89300F14C1AAD40DB7251DB345A85CF50
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 17e39669ed71bf5480a912222f5923cf95e0b8b341d5cc02b4d225eb40f8b6d9
                      • Instruction ID: d2f01f38136e4536de628ec2d7634c6321e8a699b7f736418e803f0b91c3795e
                      • Opcode Fuzzy Hash: 17e39669ed71bf5480a912222f5923cf95e0b8b341d5cc02b4d225eb40f8b6d9
                      • Instruction Fuzzy Hash: 4FA1AF75E012288FEB68DF6AD944B9DBAF2AF89310F14C0AAD409B7251DB345A85CF50
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b29394301a996ef08643f2247b04a084fa9920039a975fa04236148bf7f0e23f
                      • Instruction ID: 1da5b12cd0e7beaede4541595ef2465afe8c759492247e7ed3c1debfd649fe8e
                      • Opcode Fuzzy Hash: b29394301a996ef08643f2247b04a084fa9920039a975fa04236148bf7f0e23f
                      • Instruction Fuzzy Hash: 44A1A275E01228CFEB68DF6AD944B9DBAF2BF89300F14C1AAD409A7251DB345A85CF50
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e8e66c686139c427a8e5245859a9ad9c137d47d43910ed775047060cab2b2062
                      • Instruction ID: 90968efb6475c8847e182096f4a6cb15299b07ca308bbf8712e7ed859a760ee4
                      • Opcode Fuzzy Hash: e8e66c686139c427a8e5245859a9ad9c137d47d43910ed775047060cab2b2062
                      • Instruction Fuzzy Hash: 82A19075E01228CFEB68DF6AD944B9DFAF2BF89300F14C0AAD409A7254DB345A85CF50
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2452f77b9632b6c2fd978ba87e7c7590de8a97cb8a14dca08a4b77e5f721b7c3
                      • Instruction ID: 9ce014849fbfd627bab364085a4eca2ae5aa5fb281d2e33c45884d1525ae51c1
                      • Opcode Fuzzy Hash: 2452f77b9632b6c2fd978ba87e7c7590de8a97cb8a14dca08a4b77e5f721b7c3
                      • Instruction Fuzzy Hash: EBA19275E01628CFEB68DF6AD944B9DFAF2BF89300F14C0AAD408A7255DB345A85CF50
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0410ec16397cb25b0289468737a864591fe92e6d18b4c4a2cb370d4491b8e5e4
                      • Instruction ID: 5e255b82b6356c00c16cb2f53d14ad95cf9bf8991be95fb6dcedd7e2f2a74ac6
                      • Opcode Fuzzy Hash: 0410ec16397cb25b0289468737a864591fe92e6d18b4c4a2cb370d4491b8e5e4
                      • Instruction Fuzzy Hash: 43A1BF71E01228CFEB68DF6AC944B9DFBF2AF89300F14C0AAD508A7254DB345A81CF50
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a8f2d28091724f8ddb355eeeeba5f1401359406c9c8a4eb2319bf9aaed7a8b51
                      • Instruction ID: 6b9cb66ec847316a911a6d7b0a17589f90487edb23ba03b3a9ea25517dbe6110
                      • Opcode Fuzzy Hash: a8f2d28091724f8ddb355eeeeba5f1401359406c9c8a4eb2319bf9aaed7a8b51
                      • Instruction Fuzzy Hash: 74A19175E01228CFEB68DF6AC944B9DBBF2BF89300F14C1AAD548A7254DB345A85CF50
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c21c80f1211ccc87dd89e80d7a72fd25f6191c817c3370313b107729902cb823
                      • Instruction ID: e8051e2af238df3679bd95c7e242afed79f1e345b44f9a55961ac27eef7af304
                      • Opcode Fuzzy Hash: c21c80f1211ccc87dd89e80d7a72fd25f6191c817c3370313b107729902cb823
                      • Instruction Fuzzy Hash: DFA19F75E01228CFEB68DF6AD944B9DBAF2BF89300F14C1AAD409B7254DB345A85CF50
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c31de21f75dd59109325637e8311b87eb187f60770ce76fa51869ec290686040
                      • Instruction ID: d62262c2cf74537b9d10b548ab8cc35f078fc0a0f7c5367bc8c306be9b433ad5
                      • Opcode Fuzzy Hash: c31de21f75dd59109325637e8311b87eb187f60770ce76fa51869ec290686040
                      • Instruction Fuzzy Hash: 0991E574E05328DFDB58DFA9D844AADBBF2BF89300F20816AE419AB354DB345945CF50
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9dc1948cc0d8607581816369651b3c350bc86a59772a32f3b88b16f70e831e72
                      • Instruction ID: b08d7a9b05c8a40c50a03d8bd6c951581039a7a75889d0e1b83a360ba04773a1
                      • Opcode Fuzzy Hash: 9dc1948cc0d8607581816369651b3c350bc86a59772a32f3b88b16f70e831e72
                      • Instruction Fuzzy Hash: A7911774E04218CFDB18CFA9D884B9DBBF2BF89300F158069D819AB365DB349941CF55
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8ec29f9c765496a68c6a4251b889469785eb4bb159f800a0e35cb71ca249a880
                      • Instruction ID: d69296811699ba7e9afde65b961ea3c95f0f92e7405c5c58b792a3d3858e205a
                      • Opcode Fuzzy Hash: 8ec29f9c765496a68c6a4251b889469785eb4bb159f800a0e35cb71ca249a880
                      • Instruction Fuzzy Hash: A581B474E00218CFDB18DFA9D884B9DBBF2BF89300F148469E819AB355DB349981CF51
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 42a7cf591317865622ed7d7992be762722ac5c6ab1f88fe451dbe1128979842c
                      • Instruction ID: b9ffeeb7aa68f67b3e640cc3567df0eb6a1b218740d8a44f117c907cb9a9006b
                      • Opcode Fuzzy Hash: 42a7cf591317865622ed7d7992be762722ac5c6ab1f88fe451dbe1128979842c
                      • Instruction Fuzzy Hash: 8C81C774E00218CFDB18DFAAD884B9DBBF2BF89310F148469E419AB355EB345981CF51
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 024bc159bd864a8a265ea9920ca1b5085568676afb7c6d1b23c5409b04685176
                      • Instruction ID: 87bde1bf8cd9c7ce19e7dd5a1a38df23446df53db780c8143200d91defd62720
                      • Opcode Fuzzy Hash: 024bc159bd864a8a265ea9920ca1b5085568676afb7c6d1b23c5409b04685176
                      • Instruction Fuzzy Hash: C581B375E00218DFDB18DFAAD884B9DBBF2BF89300F148469E819AB365DB349941CF51
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 94e95985887b589a82dc01594d101ee754ce6593592f199e81ad6b51320cddf3
                      • Instruction ID: 657475e1ad904a151e9e036de07f5d6c926ba1e98c50a07b04d81c2421e70c71
                      • Opcode Fuzzy Hash: 94e95985887b589a82dc01594d101ee754ce6593592f199e81ad6b51320cddf3
                      • Instruction Fuzzy Hash: 9B81B375E00218CFDB18DFAAD984B9DBBF2BF88300F148469E419AB365DB345981CF51
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 706557d4eb87efdfcc0e02c0a32bb075b02dc85e3e394fc256371fed4b94f04b
                      • Instruction ID: 869d18dcd8bd2dde4a3a0e0c7d4b960a004214c74aac89800c41469c52dfd8b4
                      • Opcode Fuzzy Hash: 706557d4eb87efdfcc0e02c0a32bb075b02dc85e3e394fc256371fed4b94f04b
                      • Instruction Fuzzy Hash: 3381A274E00218CFDB18DFAAD984B9DBBF2BF88300F148469E919AB365DB349941DF51
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1c9849081316a74976c5a1189a42b803314027c102ab9f81c25140a467a15321
                      • Instruction ID: 3536e98856a5e73373ceaa9b8c9082033a60f8dcae2ff074b0bacf1d59f15392
                      • Opcode Fuzzy Hash: 1c9849081316a74976c5a1189a42b803314027c102ab9f81c25140a467a15321
                      • Instruction Fuzzy Hash: 9881B574E00218CFDB58DFAAD884B9DBBF2BF89300F148069E819AB765DB345981CF11
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7e973d8cb21dedb71123563aa3518432acccc059c27c015d8fa245f8cd3aa25a
                      • Instruction ID: 40607508fde87b94b96ff42f168861fb4ac98276ed8a12abda5dc338c9cfee98
                      • Opcode Fuzzy Hash: 7e973d8cb21dedb71123563aa3518432acccc059c27c015d8fa245f8cd3aa25a
                      • Instruction Fuzzy Hash: 9581A6B1D00628CFEB68DF6AC944B9DBBF2AF89300F14C1AAD50DA7255DB345A85CF50
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ebd24b1899002e02efd9eef052a8a52f134532920c5de80af89f7b73471e5daa
                      • Instruction ID: 8cf0aab7fc8329fccda89eea7f33c5d6dfc4f383ac5cdb16b711cc42431c493e
                      • Opcode Fuzzy Hash: ebd24b1899002e02efd9eef052a8a52f134532920c5de80af89f7b73471e5daa
                      • Instruction Fuzzy Hash: 8A818F74E41229DFEBA5DF69D854BDDBBB2AB89300F1081EA9819A7354DB305E81CF40
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f9381727050568aa0b3edb459775e7b6d7b1c746d1f924169e6808bce780df46
                      • Instruction ID: 785f2cb5a5b506ce5ec2429b956dc5f584aa47b016608400d1158e644789af9e
                      • Opcode Fuzzy Hash: f9381727050568aa0b3edb459775e7b6d7b1c746d1f924169e6808bce780df46
                      • Instruction Fuzzy Hash: A9819371E01628CFEB68DF6AD944B9DBAF2AF89300F14C0AAD40DB7255DB304A85CF51
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 10af8d3ab6d892988b997caca6c48c2474a651b3debd08f98ecd2aefea31598e
                      • Instruction ID: 0c8c7098afe49323fc51861e2398ab0b2ef9ca1c5c0c74394e707b3ef1673c42
                      • Opcode Fuzzy Hash: 10af8d3ab6d892988b997caca6c48c2474a651b3debd08f98ecd2aefea31598e
                      • Instruction Fuzzy Hash: EA718171E00628CFEB68DF6AC944B9DBAF2AF89300F14C1AAD50DA7255DB345A85CF50
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3840827320d7efaa642747f3664e00359d32b3ee94061814eceb3c959c0bccdf
                      • Instruction ID: c42acdbf7373570e51c63c8f8d6a0e6b1f641992abf8bedf17d51f28ebdf9149
                      • Opcode Fuzzy Hash: 3840827320d7efaa642747f3664e00359d32b3ee94061814eceb3c959c0bccdf
                      • Instruction Fuzzy Hash: 53611675E00208CFDB18DFAAD884A9DBBF2BF89300F15C069E819AB365DB349941CF15
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b6d840bff690648fcdf9f4a57e3e59fd3b84c5a36c59a7ff059f87e625d17f6e
                      • Instruction ID: b12e2f0c428dbf43542027079462c9bd0465f199af18a73620513067339d302c
                      • Opcode Fuzzy Hash: b6d840bff690648fcdf9f4a57e3e59fd3b84c5a36c59a7ff059f87e625d17f6e
                      • Instruction Fuzzy Hash: 9741BEB4E002188FEB58DFAAD8547DEBAF2BF88300F10C16AD418BB254DB354946CF64
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bd9495da9568715ab94a18f87eda8c921f69fe33215355974f64ae6f055f3765
                      • Instruction ID: b955f119e7cd6cd1cd86474026f9707d128cc9cf92e61b83517118fa944018d5
                      • Opcode Fuzzy Hash: bd9495da9568715ab94a18f87eda8c921f69fe33215355974f64ae6f055f3765
                      • Instruction Fuzzy Hash: 24416BB1E016188FEB58CF6BD9457DAFAF3AFC8300F14C1AAD50CA6254DB740A858F51
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7526cd23835fe011d32aa648399470365e43947ae31c645cd373edad925a41c3
                      • Instruction ID: 2edef2a2c01d2bd22bd44a713611e61e888e783dd66466e3b6bb065c33f01fee
                      • Opcode Fuzzy Hash: 7526cd23835fe011d32aa648399470365e43947ae31c645cd373edad925a41c3
                      • Instruction Fuzzy Hash: 7E4169B1D016588FEB58CF6BD9457DAFAF3AFC9300F04C1AAD50CA6255DB740A858F50
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7bf759d0342f4d2c93fcfc65f013f422c42c526a9810150a446689ab30dee5e2
                      • Instruction ID: fd7b51687c33084e0fd13c71c4aa03954c3ba6b775e0cf8f10d5e021e270a9c7
                      • Opcode Fuzzy Hash: 7bf759d0342f4d2c93fcfc65f013f422c42c526a9810150a446689ab30dee5e2
                      • Instruction Fuzzy Hash: A44158B1D016188FEB58CF6BCD45799FAF3AFC9310F14C1AAD50CA6255EB740A858F50
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5c5ab27c109e872119a272f58b04580270a8d2a9f3eb13ac3a4499321b62cab0
                      • Instruction ID: 131e96a710480e654de2209e10aafe73146905383b86808cf6f4aae753cbe6f9
                      • Opcode Fuzzy Hash: 5c5ab27c109e872119a272f58b04580270a8d2a9f3eb13ac3a4499321b62cab0
                      • Instruction Fuzzy Hash: E3414771E016188BEB58CF6BD94579EFAF3AFC9310F14C1AAD50CA6254DB740A858F50
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0f3d96ef8560da75cc57b2acf1a5376b1aa3f6a4a3a5478adb0bd9c664a02dee
                      • Instruction ID: 7025fb85e50c4b721649055662267fc48aa656322ce9eb0ad0f59fa68027fe23
                      • Opcode Fuzzy Hash: 0f3d96ef8560da75cc57b2acf1a5376b1aa3f6a4a3a5478adb0bd9c664a02dee
                      • Instruction Fuzzy Hash: D84158B1E016288BEB58DF6BD94578AFAF3AFC9300F14C1AAD50CA6254DB740A858F51
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 67ddaa3f7494f43abf09115a7fe3d1002b0d0c0a71250d9f6c7c11cf8c6d609c
                      • Instruction ID: 4c2051db15cac67e7f3ce62257ec85ff4fb2a9126ee796c4cae3c3cf2a9cec64
                      • Opcode Fuzzy Hash: 67ddaa3f7494f43abf09115a7fe3d1002b0d0c0a71250d9f6c7c11cf8c6d609c
                      • Instruction Fuzzy Hash: 1D4169B1E016188FEB58CF6BD9457DAFAF3AFC9300F04C1AAC50CA6265DB740A858F50

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1625 57d7b8c 1626 57d7c4b-57d7c5c 1625->1626 1627 57d7c5e 1626->1627 1628 57d7c63-57d7c6c 1626->1628 1627->1628 1630 57d7a43-57d7a68 1628->1630 1631 57d7c72-57d7c85 1628->1631 1632 57d7a6f-57d7aa6 1630->1632 1633 57d7a6a 1630->1633 1634 57d7c8c-57d7ca7 1631->1634 1635 57d7c87 1631->1635 1643 57d7aad-57d7adf 1632->1643 1644 57d7aa8 1632->1644 1633->1632 1636 57d7cae-57d7cc2 1634->1636 1637 57d7ca9 1634->1637 1635->1634 1641 57d7cc9-57d7cdf LdrInitializeThunk 1636->1641 1642 57d7cc4 1636->1642 1637->1636 1645 57d7ce1-57d7dde 1641->1645 1642->1641 1650 57d7ae1-57d7b06 1643->1650 1651 57d7b43-57d7b56 1643->1651 1644->1643 1648 57d7de6-57d7df0 1645->1648 1649 57d7de0-57d7de5 1645->1649 1649->1648 1652 57d7b0d-57d7b3b 1650->1652 1653 57d7b08 1650->1653 1655 57d7b5d-57d7b82 1651->1655 1656 57d7b58 1651->1656 1652->1651 1653->1652 1659 57d7b84-57d7b85 1655->1659 1660 57d7b91-57d7bc9 1655->1660 1656->1655 1659->1631 1661 57d7bcb 1660->1661 1662 57d7bd0-57d7c31 call 57d7588 1660->1662 1661->1662 1668 57d7c38-57d7c4a 1662->1668 1669 57d7c33 1662->1669 1668->1626 1669->1668
                      APIs
                      • LdrInitializeThunk.NTDLL(00000000), ref: 057D7CCE
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3822779623.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_57d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID:
                      • API String ID: 2994545307-0
                      • Opcode ID: d6d82e07d927ff36e5ee3436fc48cce68f182f8eedd628cb2595f204ff3087be
                      • Instruction ID: 3a4f9e130dea6f3ac291821a5682a01105fbe9ffe0817c3dfebeacb04b29719b
                      • Opcode Fuzzy Hash: d6d82e07d927ff36e5ee3436fc48cce68f182f8eedd628cb2595f204ff3087be
                      • Instruction Fuzzy Hash: 31116A74E002099FDB08DFA8D884FADF7BAFB88304F548165E808E7245D735A941DB20

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2261 11d77f0-11d7cde 2336 11d7ce4-11d7cf4 2261->2336 2337 11d8230-11d8265 2261->2337 2336->2337 2338 11d7cfa-11d7d0a 2336->2338 2341 11d8267-11d826c 2337->2341 2342 11d8271-11d828f 2337->2342 2338->2337 2340 11d7d10-11d7d20 2338->2340 2340->2337 2343 11d7d26-11d7d36 2340->2343 2344 11d8356-11d835b 2341->2344 2355 11d8306-11d8312 2342->2355 2356 11d8291-11d829b 2342->2356 2343->2337 2345 11d7d3c-11d7d4c 2343->2345 2345->2337 2347 11d7d52-11d7d62 2345->2347 2347->2337 2348 11d7d68-11d7d78 2347->2348 2348->2337 2350 11d7d7e-11d7d8e 2348->2350 2350->2337 2351 11d7d94-11d7da4 2350->2351 2351->2337 2352 11d7daa-11d7dba 2351->2352 2352->2337 2354 11d7dc0-11d822f 2352->2354 2361 11d8329-11d8335 2355->2361 2362 11d8314-11d8320 2355->2362 2356->2355 2360 11d829d-11d82a9 2356->2360 2367 11d82ce-11d82d1 2360->2367 2368 11d82ab-11d82b6 2360->2368 2371 11d834c-11d834e 2361->2371 2372 11d8337-11d8343 2361->2372 2362->2361 2370 11d8322-11d8327 2362->2370 2373 11d82e8-11d82f4 2367->2373 2374 11d82d3-11d82df 2367->2374 2368->2367 2381 11d82b8-11d82c2 2368->2381 2370->2344 2371->2344 2448 11d8350 call 11d87e9 2371->2448 2372->2371 2383 11d8345-11d834a 2372->2383 2375 11d835c-11d8373 2373->2375 2376 11d82f6-11d82fd 2373->2376 2374->2373 2386 11d82e1-11d82e6 2374->2386 2376->2375 2380 11d82ff-11d8304 2376->2380 2380->2344 2381->2367 2388 11d82c4-11d82c9 2381->2388 2383->2344 2386->2344 2388->2344 2448->2344
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dd62f27b8896808c22700fc80e5455dfb739720a42c414047a5a174cbaf288d4
                      • Instruction ID: ea886bf87cf2c6cacb1eb6da84e0fd7ab10e1a8bf85ff42385213659fe7587fe
                      • Opcode Fuzzy Hash: dd62f27b8896808c22700fc80e5455dfb739720a42c414047a5a174cbaf288d4
                      • Instruction Fuzzy Hash: A1525074A00318CFEB159BA0C854B9EBB73FF88340F1080A9D14A6B765DB759E85DFA1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2598 11d6e58-11d6e8d 2599 11d72bc-11d72c0 2598->2599 2600 11d6e93-11d6eb6 2598->2600 2601 11d72d9-11d72e7 2599->2601 2602 11d72c2-11d72d6 2599->2602 2609 11d6ebc-11d6ec9 2600->2609 2610 11d6f64-11d6f68 2600->2610 2606 11d72e9-11d72fe 2601->2606 2607 11d7358-11d736d 2601->2607 2616 11d7305-11d7312 2606->2616 2617 11d7300-11d7303 2606->2617 2618 11d736f-11d7372 2607->2618 2619 11d7374-11d7381 2607->2619 2622 11d6ed8 2609->2622 2623 11d6ecb-11d6ed6 2609->2623 2613 11d6f6a-11d6f78 2610->2613 2614 11d6fb0-11d6fb9 2610->2614 2613->2614 2634 11d6f7a-11d6f95 2613->2634 2620 11d73cf 2614->2620 2621 11d6fbf-11d6fc9 2614->2621 2624 11d7314-11d7355 2616->2624 2617->2624 2625 11d7383-11d73be 2618->2625 2619->2625 2628 11d73d4-11d7404 2620->2628 2621->2599 2626 11d6fcf-11d6fd8 2621->2626 2629 11d6eda-11d6edc 2622->2629 2623->2629 2674 11d73c5-11d73cc 2625->2674 2632 11d6fda-11d6fdf 2626->2632 2633 11d6fe7-11d6ff3 2626->2633 2661 11d741d-11d7424 2628->2661 2662 11d7406-11d741c 2628->2662 2629->2610 2636 11d6ee2-11d6f44 2629->2636 2632->2633 2633->2628 2639 11d6ff9-11d6fff 2633->2639 2653 11d6f97-11d6fa1 2634->2653 2654 11d6fa3 2634->2654 2685 11d6f4a-11d6f61 2636->2685 2686 11d6f46 2636->2686 2641 11d7005-11d7015 2639->2641 2642 11d72a6-11d72aa 2639->2642 2651 11d7029-11d702b 2641->2651 2652 11d7017-11d7027 2641->2652 2642->2620 2646 11d72b0-11d72b6 2642->2646 2646->2599 2646->2626 2659 11d702e-11d7034 2651->2659 2652->2659 2660 11d6fa5-11d6fa7 2653->2660 2654->2660 2659->2642 2667 11d703a-11d7049 2659->2667 2660->2614 2668 11d6fa9 2660->2668 2670 11d704f 2667->2670 2671 11d70f7-11d7122 call 11d6ca0 * 2 2667->2671 2668->2614 2676 11d7052-11d7063 2670->2676 2689 11d720c-11d7226 2671->2689 2690 11d7128-11d712c 2671->2690 2676->2628 2678 11d7069-11d707b 2676->2678 2678->2628 2681 11d7081-11d7099 2678->2681 2743 11d709b call 11d7438 2681->2743 2744 11d709b call 11d7428 2681->2744 2684 11d70a1-11d70b1 2684->2642 2688 11d70b7-11d70ba 2684->2688 2685->2610 2686->2685 2691 11d70bc-11d70c2 2688->2691 2692 11d70c4-11d70c7 2688->2692 2689->2599 2710 11d722c-11d7230 2689->2710 2690->2642 2695 11d7132-11d7136 2690->2695 2691->2692 2693 11d70cd-11d70d0 2691->2693 2692->2620 2692->2693 2696 11d70d8-11d70db 2693->2696 2697 11d70d2-11d70d6 2693->2697 2699 11d715e-11d7164 2695->2699 2700 11d7138-11d7145 2695->2700 2696->2620 2701 11d70e1-11d70e5 2696->2701 2697->2696 2697->2701 2702 11d719f-11d71a5 2699->2702 2703 11d7166-11d716a 2699->2703 2713 11d7154 2700->2713 2714 11d7147-11d7152 2700->2714 2701->2620 2708 11d70eb-11d70f1 2701->2708 2704 11d71a7-11d71ab 2702->2704 2705 11d71b1-11d71b7 2702->2705 2703->2702 2709 11d716c-11d7175 2703->2709 2704->2674 2704->2705 2711 11d71b9-11d71bd 2705->2711 2712 11d71c3-11d71c5 2705->2712 2708->2671 2708->2676 2715 11d7184-11d719a 2709->2715 2716 11d7177-11d717c 2709->2716 2717 11d726c-11d7270 2710->2717 2718 11d7232-11d723c call 11d5b50 2710->2718 2711->2642 2711->2712 2719 11d71fa-11d71fc 2712->2719 2720 11d71c7-11d71d0 2712->2720 2721 11d7156-11d7158 2713->2721 2714->2721 2715->2642 2716->2715 2717->2674 2722 11d7276-11d727a 2717->2722 2718->2717 2731 11d723e-11d7253 2718->2731 2719->2642 2727 11d7202-11d7209 2719->2727 2725 11d71df-11d71f5 2720->2725 2726 11d71d2-11d71d7 2720->2726 2721->2642 2721->2699 2722->2674 2729 11d7280-11d728d 2722->2729 2725->2642 2726->2725 2734 11d729c 2729->2734 2735 11d728f-11d729a 2729->2735 2731->2717 2740 11d7255-11d726a 2731->2740 2737 11d729e-11d72a0 2734->2737 2735->2737 2737->2642 2737->2674 2740->2599 2740->2717 2743->2684 2744->2684
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3e98d679ae16dc7040025510e867c48e08bb6d968eb41ffb5af32b228d8f3e70
                      • Instruction ID: c2c738afccf038ab18691142afcabf5346552d2cd0e3c726d86231b455dddb9f
                      • Opcode Fuzzy Hash: 3e98d679ae16dc7040025510e867c48e08bb6d968eb41ffb5af32b228d8f3e70
                      • Instruction Fuzzy Hash: D2126B30A002499FDB19DF69D884A9EBBF2FF49318F158599E905DB3A1DB30ED41CB50

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2745 11da818-11da842 call 11da7c0 2749 11da848-11da84d 2745->2749 2750 11da90b 2745->2750 2749->2750 2751 11da853-11da872 2749->2751 2752 11da910-11da94f 2750->2752 2754 11da8bb-11da8c0 2751->2754 2755 11da874-11da87c 2751->2755 2758 11da957-11da95f 2752->2758 2759 11da951-11da954 2752->2759 2762 11da8c8-11da8cf 2754->2762 2755->2750 2757 11da882-11da885 2755->2757 2757->2750 2763 11da88b-11da8aa 2757->2763 2760 11da9c7-11da9ce 2758->2760 2761 11da961-11da967 2758->2761 2759->2758 2767 11da9d4-11da9db 2760->2767 2768 11daad3-11daadc 2760->2768 2761->2760 2764 11da969-11da96f 2761->2764 2765 11da8fe-11da908 2762->2765 2766 11da8d1-11da8d7 2762->2766 2763->2750 2797 11da8ac-11da8b2 2763->2797 2769 11dabf9-11dac01 2764->2769 2770 11da975-11da982 2764->2770 2766->2752 2771 11da8d9-11da8f6 2766->2771 2775 11daa8a-11daa90 2767->2775 2776 11da9e1-11da9e9 2767->2776 2773 11daade-11daae4 2768->2773 2774 11daae6-11daae9 2768->2774 2793 11dac2c-11dac2f 2769->2793 2794 11dac03-11dac2b 2769->2794 2770->2769 2777 11da988-11da9b0 2770->2777 2771->2765 2773->2774 2779 11dab00-11dab04 2773->2779 2780 11daaef-11daafd 2774->2780 2781 11dabf4 2774->2781 2775->2769 2778 11daa96-11daaa0 2775->2778 2776->2781 2782 11da9ef-11da9f8 2776->2782 2777->2781 2828 11da9b6-11da9b9 2777->2828 2778->2769 2788 11daaa6-11daac2 2778->2788 2785 11dab0a-11dab13 2779->2785 2786 11dab87-11dab8b 2779->2786 2780->2779 2781->2769 2782->2769 2783 11da9fe-11daa31 2782->2783 2831 11daa7b-11daa88 2783->2831 2832 11daa33 2783->2832 2785->2786 2795 11dab15-11dab1b 2785->2795 2791 11dab8d-11dab96 2786->2791 2792 11dabea-11dabf1 2786->2792 2829 11daaca-11daacd 2788->2829 2791->2781 2799 11dab98-11dab9f 2791->2799 2803 11dac3e-11dac42 2793->2803 2804 11dac31-11dac3c 2793->2804 2794->2793 2795->2769 2800 11dab21-11dab2b 2795->2800 2797->2752 2805 11da8b4-11da8b8 2797->2805 2799->2792 2806 11daba1 2799->2806 2800->2769 2808 11dab31-11dab3e 2800->2808 2810 11dac54 2803->2810 2811 11dac44-11dac52 2803->2811 2804->2803 2805->2754 2813 11daba4-11dabac 2806->2813 2808->2769 2814 11dab44-11dab6f 2808->2814 2817 11dac56-11dac58 2810->2817 2811->2817 2818 11dabae-11dabba 2813->2818 2819 11dabe0-11dabe3 2813->2819 2814->2769 2851 11dab75-11dab7d 2814->2851 2821 11dac5e-11dac66 2817->2821 2822 11dac5a-11dac5c 2817->2822 2818->2769 2826 11dabbc-11dabd8 2818->2826 2819->2781 2830 11dabe5-11dabe8 2819->2830 2823 11dac89-11dac8b 2821->2823 2824 11dac68-11dac7a 2821->2824 2822->2821 2833 11dac8d-11dac9a call 11da340 2823->2833 2834 11dacb9-11dacca 2823->2834 2824->2823 2843 11dac7c-11dac87 2824->2843 2826->2819 2828->2781 2835 11da9bf-11da9c5 2828->2835 2829->2768 2829->2781 2830->2792 2830->2813 2831->2829 2837 11daa36-11daa3c 2832->2837 2833->2834 2847 11dac9c-11dacab 2833->2847 2835->2760 2835->2761 2837->2769 2844 11daa42-11daa63 2837->2844 2843->2823 2844->2781 2856 11daa69-11daa6d 2844->2856 2847->2834 2855 11dacad-11dacb7 2847->2855 2851->2781 2853 11dab7f-11dab85 2851->2853 2853->2786 2853->2795 2855->2834 2856->2781 2858 11daa73-11daa79 2856->2858 2858->2831 2858->2837
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 029a6b5b84ee5e3a84fb291f08dd782a78458fc9991ec1ccfb0f421c02281f74
                      • Instruction ID: fae827546c99316f220b4849e9d0d3db955a0d220d4bc931e890130b58052a4f
                      • Opcode Fuzzy Hash: 029a6b5b84ee5e3a84fb291f08dd782a78458fc9991ec1ccfb0f421c02281f74
                      • Instruction Fuzzy Hash: 12F13E76A00614CFCB18CF6DD888AADBBF6FF88310B1A8459E515AB361DB35EC41CB50

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2859 11d0c8f-11d0cc0 2861 11d0cc7-11d0d10 call 11d0708 2859->2861 2862 11d0cc2 2859->2862 2869 11d0d15 2861->2869 2862->2861 2870 11d0d1e-11d0eda call 11d0708 * 7 2869->2870 2913 11d0ee2-11d0eeb 2870->2913 2995 11d0eee call 11d1f08 2913->2995 2996 11d0eee call 11d1e58 2913->2996 2997 11d0eee call 11d1ec8 2913->2997 2998 11d0eee call 11d1f61 2913->2998 2999 11d0eee call 11d1ea0 2913->2999 2914 11d0ef4-11d0f1b call 11d3428 3001 11d0f1e call 11d39ed 2914->3001 3002 11d0f1e call 11d3908 2914->3002 2917 11d0f24-11d0f4e 2920 11d0f57-11d0f5a call 11d4ad9 2917->2920 2921 11d0f60-11d0f8a 2920->2921 2924 11d0f93 2921->2924 3005 11d0f96 call 11db318 2924->3005 3006 11d0f96 call 11db328 2924->3006 3007 11d0f96 call 11db4f3 2924->3007 2925 11d0f9c-11d0fc6 2928 11d0fcf-11d0fd5 call 11dbbb8 2925->2928 2929 11d0fdb-11d1017 2928->2929 2932 11d1023-11d1029 call 11dbeb0 2929->2932 2933 11d102f-11d106b 2932->2933 2936 11d1077-11d107d call 11dc190 2933->2936 2937 11d1083-11d10bf 2936->2937 2940 11d10cb-11d10d1 call 11dc470 2937->2940 2941 11d10d7-11d1113 2940->2941 2944 11d111f 2941->2944 2993 11d1125 call 11dc470 2944->2993 2994 11d1125 call 11dc753 2944->2994 2945 11d112b-11d1167 2948 11d1173-11d1179 call 11dca33 2945->2948 2949 11d117f-11d122a 2948->2949 2957 11d1235-11d1241 call 11dcd10 2949->2957 2958 11d1247-11d1253 2957->2958 2959 11d125e-11d126a call 11dcd10 2958->2959 2960 11d1270-11d127c 2959->2960 2961 11d1287-11d1293 call 11dcd10 2960->2961 2962 11d1299-11d12a5 2961->2962 2963 11d12b0-11d12bc call 11dcd10 2962->2963 2964 11d12c2-11d12ce 2963->2964 2965 11d12d9-11d12e5 call 11dcd10 2964->2965 2966 11d12eb-11d12f7 2965->2966 2967 11d1302-11d130e call 11dcd10 2966->2967 2968 11d1314-11d1320 2967->2968 2969 11d132b-11d1337 call 11dcd10 2968->2969 2970 11d133d-11d1349 2969->2970 2971 11d1354-11d1360 call 11dcd10 2970->2971 2972 11d1366-11d1372 2971->2972 2973 11d137d-11d1389 call 11dcd10 2972->2973 2974 11d138f-11d139b 2973->2974 2975 11d13a6-11d13b2 call 11dcd10 2974->2975 2976 11d13b8-11d146b 2975->2976 2993->2945 2994->2945 2995->2914 2996->2914 2997->2914 2998->2914 2999->2914 3001->2917 3002->2917 3005->2925 3006->2925 3007->2925
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 086042dc370552f7a130fe263110b44e2f12fdcb6da586c6e28a6ca8dbf67f2c
                      • Instruction ID: 346cb4ae0668786a563742ff610d2a82fbdbd6dbc0099cb004982614aa9fba59
                      • Opcode Fuzzy Hash: 086042dc370552f7a130fe263110b44e2f12fdcb6da586c6e28a6ca8dbf67f2c
                      • Instruction Fuzzy Hash: 9922B979A0021ACFCB94EF64E894B9DB7B2FF49301F1085A9D409AB358EB306D85CF51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 3015 11d0ca0-11d0cc0 3016 11d0cc7-11d0eeb call 11d0708 * 8 3015->3016 3017 11d0cc2 3015->3017 3150 11d0eee call 11d1f08 3016->3150 3151 11d0eee call 11d1e58 3016->3151 3152 11d0eee call 11d1ec8 3016->3152 3153 11d0eee call 11d1f61 3016->3153 3154 11d0eee call 11d1ea0 3016->3154 3017->3016 3069 11d0ef4-11d0f1b call 11d3428 3156 11d0f1e call 11d39ed 3069->3156 3157 11d0f1e call 11d3908 3069->3157 3072 11d0f24-11d0f93 call 11d4ad9 3160 11d0f96 call 11db318 3072->3160 3161 11d0f96 call 11db328 3072->3161 3162 11d0f96 call 11db4f3 3072->3162 3080 11d0f9c-11d111f call 11dbbb8 call 11dbeb0 call 11dc190 call 11dc470 3148 11d1125 call 11dc470 3080->3148 3149 11d1125 call 11dc753 3080->3149 3100 11d112b-11d13b2 call 11dca33 call 11dcd10 * 10 3131 11d13b8-11d146b 3100->3131 3148->3100 3149->3100 3150->3069 3151->3069 3152->3069 3153->3069 3154->3069 3156->3072 3157->3072 3160->3080 3161->3080 3162->3080
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fba052feaf0e8ccc6c311d5059f01ae9f5a3cf24af6521cc700ce36e85839a76
                      • Instruction ID: 7b3d6ed6a5ada2f3c5593407c8575cece979e37242e9b797d407c21442dd11d3
                      • Opcode Fuzzy Hash: fba052feaf0e8ccc6c311d5059f01ae9f5a3cf24af6521cc700ce36e85839a76
                      • Instruction Fuzzy Hash: 7122A97990021ACFCB94EF64E894B9DB7B2FF49301F1085A9D409AB358EB706D85CF51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 3365 11d56a8-11d56ca 3366 11d56cc-11d56d0 3365->3366 3367 11d56e0-11d56eb 3365->3367 3368 11d56f8-11d56ff 3366->3368 3369 11d56d2-11d56de 3366->3369 3370 11d56f1-11d56f3 3367->3370 3371 11d5793-11d57bf 3367->3371 3373 11d571f-11d5728 3368->3373 3374 11d5701-11d5708 3368->3374 3369->3367 3369->3368 3372 11d578b-11d5790 3370->3372 3378 11d57c6-11d581e 3371->3378 3473 11d572a call 6a31ca1 3373->3473 3474 11d572a call 6a31bc1 3373->3474 3475 11d572a call 6a31bd0 3373->3475 3476 11d572a call 11d5698 3373->3476 3477 11d572a call 11d56a8 3373->3477 3374->3373 3375 11d570a-11d5715 3374->3375 3377 11d571b-11d571d 3375->3377 3375->3378 3377->3372 3397 11d582d-11d583f 3378->3397 3398 11d5820-11d5826 3378->3398 3379 11d5730-11d5732 3380 11d573a-11d5742 3379->3380 3381 11d5734-11d5738 3379->3381 3385 11d5744-11d5749 3380->3385 3386 11d5751-11d5753 3380->3386 3381->3380 3384 11d5755-11d5774 call 11d6108 3381->3384 3391 11d5789 3384->3391 3392 11d5776-11d577f 3384->3392 3385->3386 3386->3372 3391->3372 3467 11d5781 call 11da70d 3392->3467 3468 11d5781 call 11da650 3392->3468 3394 11d5787 3394->3372 3400 11d5845-11d5849 3397->3400 3401 11d58d3-11d58d7 call 11d5a70 3397->3401 3398->3397 3402 11d5859-11d5866 3400->3402 3403 11d584b-11d5857 3400->3403 3404 11d58dd-11d58e3 3401->3404 3411 11d5868-11d5872 3402->3411 3403->3411 3405 11d58ef-11d58f6 3404->3405 3406 11d58e5-11d58eb 3404->3406 3409 11d58ed 3406->3409 3410 11d5951-11d599f 3406->3410 3409->3405 3469 11d59a1 call 6a31f71 3410->3469 3470 11d59a1 call 6a31f80 3410->3470 3471 11d59a1 call 6a32188 3410->3471 3414 11d589f-11d58a3 3411->3414 3415 11d5874-11d5883 3411->3415 3416 11d58af-11d58b3 3414->3416 3417 11d58a5-11d58ab 3414->3417 3423 11d5885-11d588c 3415->3423 3424 11d5893-11d589d 3415->3424 3416->3405 3421 11d58b5-11d58b9 3416->3421 3419 11d58ad 3417->3419 3420 11d58f9-11d594a 3417->3420 3419->3405 3420->3410 3425 11d58bf-11d58d1 3421->3425 3426 11d59b7-11d59db 3421->3426 3423->3424 3424->3414 3425->3405 3434 11d59dd-11d59df 3426->3434 3435 11d59e1-11d59e3 3426->3435 3436 11d5a59-11d5a5c 3434->3436 3437 11d59e5-11d59e9 3435->3437 3438 11d59f4-11d59f6 3435->3438 3444 11d59ef-11d59f2 3437->3444 3445 11d59eb-11d59ed 3437->3445 3441 11d5a09-11d5a0f 3438->3441 3442 11d59f8-11d59fc 3438->3442 3449 11d5a3a-11d5a3c 3441->3449 3450 11d5a11-11d5a38 3441->3450 3446 11d59fe-11d5a00 3442->3446 3447 11d5a02-11d5a07 3442->3447 3444->3436 3445->3436 3446->3436 3447->3436 3454 11d5a43-11d5a45 3449->3454 3450->3454 3452 11d59a7-11d59b0 3452->3426 3455 11d5a4b-11d5a4d 3454->3455 3456 11d5a47-11d5a49 3454->3456 3458 11d5a4f-11d5a54 3455->3458 3459 11d5a56 3455->3459 3456->3436 3458->3436 3459->3436 3467->3394 3468->3394 3469->3452 3470->3452 3471->3452 3473->3379 3474->3379 3475->3379 3476->3379 3477->3379
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 980d9965ea6ed2e8b24548a4845a2462f8457c0710936d9320172192c6a44de8
                      • Instruction ID: f4251861093c10e63001aa6440d0a932bd0059f426104c4f9f920f5e4c7efa84
                      • Opcode Fuzzy Hash: 980d9965ea6ed2e8b24548a4845a2462f8457c0710936d9320172192c6a44de8
                      • Instruction Fuzzy Hash: 39B1DE317042548FDB699F69C848B3A7BB3AF88354F25852DE50ACB391DB74DC01CB92

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 3478 11d87e9-11d8805 3479 11d8807-11d880c 3478->3479 3480 11d8811-11d881d 3478->3480 3481 11d8ba6-11d8bab 3479->3481 3483 11d882d-11d8832 3480->3483 3484 11d881f-11d8821 3480->3484 3483->3481 3485 11d8829-11d882b 3484->3485 3485->3483 3486 11d8837-11d8843 3485->3486 3488 11d8845-11d8851 3486->3488 3489 11d8853-11d8858 3486->3489 3488->3489 3491 11d885d-11d8868 3488->3491 3489->3481 3493 11d886e-11d8879 3491->3493 3494 11d8912-11d891d 3491->3494 3497 11d888f 3493->3497 3498 11d887b-11d888d 3493->3498 3499 11d89c0-11d89cc 3494->3499 3500 11d8923-11d8932 3494->3500 3501 11d8894-11d8896 3497->3501 3498->3501 3509 11d89dc-11d89ee 3499->3509 3510 11d89ce-11d89da 3499->3510 3507 11d8934-11d893e 3500->3507 3508 11d8943-11d8952 3500->3508 3504 11d8898-11d88a7 3501->3504 3505 11d88b6-11d88bb 3501->3505 3504->3505 3515 11d88a9-11d88b4 3504->3515 3505->3481 3507->3481 3518 11d8954-11d8960 3508->3518 3519 11d8976-11d897f 3508->3519 3522 11d89f0-11d89fc 3509->3522 3523 11d8a12-11d8a17 3509->3523 3510->3509 3517 11d8a1c-11d8a27 3510->3517 3515->3505 3526 11d88c0-11d88c9 3515->3526 3532 11d8a2d-11d8a36 3517->3532 3533 11d8b09-11d8b14 3517->3533 3530 11d896c-11d8971 3518->3530 3531 11d8962-11d8967 3518->3531 3528 11d8995 3519->3528 3529 11d8981-11d8993 3519->3529 3543 11d89fe-11d8a03 3522->3543 3544 11d8a08-11d8a0d 3522->3544 3523->3481 3538 11d88cb-11d88d0 3526->3538 3539 11d88d5-11d88e4 3526->3539 3535 11d899a-11d899c 3528->3535 3529->3535 3530->3481 3531->3481 3545 11d8a4c 3532->3545 3546 11d8a38-11d8a4a 3532->3546 3547 11d8b3e-11d8b4d 3533->3547 3548 11d8b16-11d8b20 3533->3548 3535->3499 3541 11d899e-11d89aa 3535->3541 3538->3481 3556 11d8908-11d890d 3539->3556 3557 11d88e6-11d88f2 3539->3557 3558 11d89ac-11d89b1 3541->3558 3559 11d89b6-11d89bb 3541->3559 3543->3481 3544->3481 3549 11d8a51-11d8a53 3545->3549 3546->3549 3561 11d8b4f-11d8b5e 3547->3561 3562 11d8ba1 3547->3562 3564 11d8b37-11d8b3c 3548->3564 3565 11d8b22-11d8b2e 3548->3565 3554 11d8a55-11d8a61 3549->3554 3555 11d8a63 3549->3555 3563 11d8a68-11d8a6a 3554->3563 3555->3563 3556->3481 3571 11d88fe-11d8903 3557->3571 3572 11d88f4-11d88f9 3557->3572 3558->3481 3559->3481 3561->3562 3574 11d8b60-11d8b78 3561->3574 3562->3481 3568 11d8a6c-11d8a71 3563->3568 3569 11d8a76-11d8a89 3563->3569 3564->3481 3565->3564 3576 11d8b30-11d8b35 3565->3576 3568->3481 3577 11d8a8b 3569->3577 3578 11d8ac1-11d8acb 3569->3578 3571->3481 3572->3481 3589 11d8b9a-11d8b9f 3574->3589 3590 11d8b7a-11d8b98 3574->3590 3576->3481 3579 11d8a8e-11d8a9f call 11d8258 3577->3579 3585 11d8acd-11d8ad9 call 11d8258 3578->3585 3586 11d8aea-11d8af6 3578->3586 3587 11d8aa6-11d8aab 3579->3587 3588 11d8aa1-11d8aa4 3579->3588 3600 11d8adb-11d8ade 3585->3600 3601 11d8ae0-11d8ae5 3585->3601 3595 11d8aff 3586->3595 3596 11d8af8-11d8afd 3586->3596 3587->3481 3588->3587 3593 11d8ab0-11d8ab3 3588->3593 3589->3481 3590->3481 3597 11d8bac-11d8bc0 3593->3597 3598 11d8ab9-11d8abf 3593->3598 3602 11d8b04 3595->3602 3596->3602 3605 11d8c12-11d8c19 3597->3605 3606 11d8bc2 3597->3606 3598->3578 3598->3579 3600->3586 3600->3601 3601->3481 3602->3481 3609 11d8c4e-11d8c60 3605->3609 3610 11d8c1b-11d8c2a 3605->3610 3613 11d8d5f 3609->3613 3614 11d8c66-11d8c74 3609->3614 3610->3609 3615 11d8c2c-11d8c42 3610->3615 3616 11d8d61-11d8d65 3613->3616 3619 11d8c76-11d8c7b 3614->3619 3620 11d8c80-11d8c83 3614->3620 3615->3609 3624 11d8c44-11d8c49 3615->3624 3619->3616 3622 11d8c89-11d8c8c 3620->3622 3623 11d8d66-11d8d82 3620->3623 3622->3614 3625 11d8c8e 3622->3625 3624->3616 3625->3613
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ae10b9def54ed41dde218c6900bcc6edda3c58af0a77b04f7e2e356f0ae0ba4c
                      • Instruction ID: 0b839ec0b42cf627d72f6a80af22b9e38ef1ab5c1989d205ba095eee6fd43167
                      • Opcode Fuzzy Hash: ae10b9def54ed41dde218c6900bcc6edda3c58af0a77b04f7e2e356f0ae0ba4c
                      • Instruction Fuzzy Hash: E4B17FB03101118FEB2D9B2DC958B3A7BAAEF85705F19446AE602DF3B1EB64CC41C752
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6033a29c20d73dc6c42006d696296350270e092b56d5110e7f3e9e962724c9e1
                      • Instruction ID: 3cbc1b0484d85fc60d73435513c628fae247354021faeca79b9d76f97f6d8037
                      • Opcode Fuzzy Hash: 6033a29c20d73dc6c42006d696296350270e092b56d5110e7f3e9e962724c9e1
                      • Instruction Fuzzy Hash: F681AD31A00515CFDB9CDFADC888A6EBBB7BF89210B158169D506EB361DB31E841CF61
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0fa6fd13dd29ab822d8582c6b2cda00d011257b633918a894bc7b8a1116c3831
                      • Instruction ID: 92a5bb5dac415bb34ef8b077ee8732f49b5502c237d5b841164270cd2c6d230d
                      • Opcode Fuzzy Hash: 0fa6fd13dd29ab822d8582c6b2cda00d011257b633918a894bc7b8a1116c3831
                      • Instruction Fuzzy Hash: F481D135B002258FDB58EF78D954A6E7BF6BF89700B11816AE505DB3A1DB31ED01CBA0
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7e9277ebc680088477a233d2ac08f25f5dfcba18257d4d92778c1b1dfab083cd
                      • Instruction ID: 2213034b5f456a1cf26aa7fbabbdde88a3b396f9f6da12e3a2d24c790ef952d5
                      • Opcode Fuzzy Hash: 7e9277ebc680088477a233d2ac08f25f5dfcba18257d4d92778c1b1dfab083cd
                      • Instruction Fuzzy Hash: 8171A331F002189BDB55EFA9C8546AEBBB2AFC8700F148129E405BB380EF749D46CBD5
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c308c274a66b7b07b5ff4273c53a1711ddae04c260543530ec80cdfccb0edcd2
                      • Instruction ID: 199bfe355e0d8b9faec884dd09080d3d6fff2f5f9bb1945a42ef6249139d21d1
                      • Opcode Fuzzy Hash: c308c274a66b7b07b5ff4273c53a1711ddae04c260543530ec80cdfccb0edcd2
                      • Instruction Fuzzy Hash: CE711B347002558FDB29DF2CC898AAD7BE6AF49708F5900A9E906CB3B1DB74DC51CB91
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 50c5eea0039e8b11121f92fd3a0cb5774428dd16053d436f510ff10be9464095
                      • Instruction ID: da486908214f225deb4f6ac992deec03c948ecad638c22a405cd3cef60388d7c
                      • Opcode Fuzzy Hash: 50c5eea0039e8b11121f92fd3a0cb5774428dd16053d436f510ff10be9464095
                      • Instruction Fuzzy Hash: 9151A2388213078FE3682FA5E5AC16E7BA5FB0F7277416C28A21E8526DDF3050A5DB51
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f370d43ef473d842d32158ce5f814eeea225f75fd8f6bdbeef5225aca18308c5
                      • Instruction ID: a436ac4f5a4a2362c927bd3cffbbb672f9894b06632dd5a8c5658e94ded18ee1
                      • Opcode Fuzzy Hash: f370d43ef473d842d32158ce5f814eeea225f75fd8f6bdbeef5225aca18308c5
                      • Instruction Fuzzy Hash: 4051A1388213078FE3682FA1A5AC16E7BA5FB0F7277416C28B21F8122D9F3054A5DF51
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3031fe0e6b016490db278a11f2a5bdb4ca8b328019a524ef7b23dca638f61f1a
                      • Instruction ID: c3d9fced2b9ef4bdb6dde2662808589687f6bdd66bcc33dd92afc42476e5caf5
                      • Opcode Fuzzy Hash: 3031fe0e6b016490db278a11f2a5bdb4ca8b328019a524ef7b23dca638f61f1a
                      • Instruction Fuzzy Hash: D0610174D01218CFDB24DFA5D858BAEBBB2FF89300F608529D806AB394DB755A85CF40
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cb1b4187df8d3a23026cbdd9b0e4b8990d7f201ce15723f7f29e4770a30be15b
                      • Instruction ID: 013dccb9ee7c140c47aaa5790db7a0f668b263d43393e0f5245e53db76e5fa35
                      • Opcode Fuzzy Hash: cb1b4187df8d3a23026cbdd9b0e4b8990d7f201ce15723f7f29e4770a30be15b
                      • Instruction Fuzzy Hash: DA512574B00226CFD798EF6AD894D3A77B1BF493547510965F8029B7A8CB30EC01CB90
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fdf979c235fc6c72ac5236029b5d490e95ea73c1b5f2d7247ec68652a1e5e43f
                      • Instruction ID: c0eefe372e6e643ed8fcbe62caedcc267f9f87842831963288e2cec87b949c35
                      • Opcode Fuzzy Hash: fdf979c235fc6c72ac5236029b5d490e95ea73c1b5f2d7247ec68652a1e5e43f
                      • Instruction Fuzzy Hash: 2C518475E01208DFDB58DFAAD9849DDBBF2BF89300F248169E519AB365DB30A901CF50
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4504da97e6ef59b4b63eea96949292190656d9b584ab743448ea1cc87a9b19f5
                      • Instruction ID: b9118b06a266ecfe9cd8b942acb83e8217101cdd746fa4795f1bb38663cfe0fe
                      • Opcode Fuzzy Hash: 4504da97e6ef59b4b63eea96949292190656d9b584ab743448ea1cc87a9b19f5
                      • Instruction Fuzzy Hash: 20418B39841229CFD758BFB4D06C7EEBBB2FB4A716F105829D11166294DB780A84CF60
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8abc55ee0bfde9f9cee3af89cc673ded59778a92373b95842cf50a76a9c3d10e
                      • Instruction ID: 472a5ab4b5adbfccfada6ece125f110aeba1a0bfb228dd0b63f381ea1db11a7e
                      • Opcode Fuzzy Hash: 8abc55ee0bfde9f9cee3af89cc673ded59778a92373b95842cf50a76a9c3d10e
                      • Instruction Fuzzy Hash: 4A51B275E01208DFCB48EFA9D49099DBBF2FF89310B208569E815AB324DB31AC46CF50
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5030e95df36933ef95f3607e5ccab08b18bd38631a01d53cd80f73f92f37d988
                      • Instruction ID: 7e0536efaab714b8e3b1318b6f40f136747f5395152b37b2a1f70a37c382ab71
                      • Opcode Fuzzy Hash: 5030e95df36933ef95f3607e5ccab08b18bd38631a01d53cd80f73f92f37d988
                      • Instruction Fuzzy Hash: E551B075D02228CFDB69DF68D884BEDBBB2BB49301F5055AAE409A7350D735AE81CF10
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8451aa8d699d5cf583bed48136e25c5bd2c8191d50bc15345f8e63025ac540fa
                      • Instruction ID: 11e501163c969213ab763d52a7999efc80f31680d2e9793f78f29bd204ac27c0
                      • Opcode Fuzzy Hash: 8451aa8d699d5cf583bed48136e25c5bd2c8191d50bc15345f8e63025ac540fa
                      • Instruction Fuzzy Hash: F541AF31A0424DDFCF19CFA8C844A9DBFB2EF49318F058555E915AF2A5D334E950CBA1
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 95bbe49bc17d7b6d0ad6c0ffe79e38a629b1dd9a7ceeacc2ec0f34e311b1e17d
                      • Instruction ID: bc8c88d87324b6872964c0334e0f66af3ec4a54246d570b728a1eb2f9c8f2375
                      • Opcode Fuzzy Hash: 95bbe49bc17d7b6d0ad6c0ffe79e38a629b1dd9a7ceeacc2ec0f34e311b1e17d
                      • Instruction Fuzzy Hash: CD41C231B002049FCB289B79E8186AE7BF2EFC8210F15416DE906E7391CF359C12CB91
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 832ee2cc259997f34a4d30645e4e9dd8a1f17967c3bc4e95df6d801581987a60
                      • Instruction ID: 25b08b05d54939d8935374b89e86280b2158c0e27dc5af73b927306b0114e3bf
                      • Opcode Fuzzy Hash: 832ee2cc259997f34a4d30645e4e9dd8a1f17967c3bc4e95df6d801581987a60
                      • Instruction Fuzzy Hash: C0411231E102199BDB55DFA5C890ADFBBF6BF88710F258129F415BB240EB70A945CBA0
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5d9afa23361b9fe5c1d71cf7360c7372ee965431e838de67cd1e6fb7452e4246
                      • Instruction ID: 0e4f29eed48da5fb63d3547ca54a61280ce4c4869f3f825c24f44193e9a5ec56
                      • Opcode Fuzzy Hash: 5d9afa23361b9fe5c1d71cf7360c7372ee965431e838de67cd1e6fb7452e4246
                      • Instruction Fuzzy Hash: CC41E0B4E00218CFDB54DFA9D484BEEBBF2BB49300F20912AD405AB394EB74594ACF50
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 81014fbab130973074972089f713f4d02eefa07e25ea8225f4d93b07f5f3b2ab
                      • Instruction ID: dd1a73d45c3e4a1ec2d5a8ff2f803f667e753effc1a28367db390e9587e5a1e7
                      • Opcode Fuzzy Hash: 81014fbab130973074972089f713f4d02eefa07e25ea8225f4d93b07f5f3b2ab
                      • Instruction Fuzzy Hash: 5B312BF6B103258BEF2D5AA9599433E66D6BBC4210F54403DD826D7381DFB8CC4187A3
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ad2462a8a48715d53b656b8f392e085e3191ac93730f806bac3d0abb13b20d7f
                      • Instruction ID: d790f5f016dd71f538b5ad649be7586c521a1f977c8973f1dbd973fa10326ec1
                      • Opcode Fuzzy Hash: ad2462a8a48715d53b656b8f392e085e3191ac93730f806bac3d0abb13b20d7f
                      • Instruction Fuzzy Hash: B141CF31A00308DFDB19DF69C848BAABBF6EF48314F05842EE8159B251E779DD54CB92
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0e1bb31db8a9c3d34ef4987d2fe6dfcd70341a94b6ed8f4963f86b83d7b20f62
                      • Instruction ID: de869b9ecf5b3bb77f7887a09cdfba55a9d0f1e1baa85883fc9796810b126baa
                      • Opcode Fuzzy Hash: 0e1bb31db8a9c3d34ef4987d2fe6dfcd70341a94b6ed8f4963f86b83d7b20f62
                      • Instruction Fuzzy Hash: BA41C0B4E00218CFDB54EFA9D5947EEBBF2BB88300F10912AD415A7394EB745946CF50
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6102a95a85b26f4e4844489d6e2d90e202685da8f51a377dce78bab26f691650
                      • Instruction ID: 3abb38cb7089d4ca843de23ded34af1c2dd28474f9b7af2388ade8871365ee41
                      • Opcode Fuzzy Hash: 6102a95a85b26f4e4844489d6e2d90e202685da8f51a377dce78bab26f691650
                      • Instruction Fuzzy Hash: CC319331204159EFCF1A9F68D858AAF3BA2FF88311F104419FA1987B95CB38CD61DB91
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f85fc6817d5f677525067949930cb501f7136cbf9a8299a64fdb4bf2ae6d5790
                      • Instruction ID: 849f81ce973c0138284399124e5eb51d9f8742097de7ef110684fa53bbaf176f
                      • Opcode Fuzzy Hash: f85fc6817d5f677525067949930cb501f7136cbf9a8299a64fdb4bf2ae6d5790
                      • Instruction Fuzzy Hash: 3E318D39800229DFDB58AFA5D46C7EEBBB2FB4A716F105829D11167284DB780A84CF90
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 40f21ee62dab11780d8a50daea4204a0aa2d91e7d15993cbba0b33063a1d253e
                      • Instruction ID: 36099b6047a7df2e1335c70bae3949d7a3ae90f45bb83f2f924cad00005d95b8
                      • Opcode Fuzzy Hash: 40f21ee62dab11780d8a50daea4204a0aa2d91e7d15993cbba0b33063a1d253e
                      • Instruction Fuzzy Hash: 7F21AF353006108BEB2E162D8898B7E3697AFC471CF164879E606CB7D9EF65CC82D781
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9efc7a54d70890802f8005eab411706517939ebfbbe606dbcca36a2c8d30b1f1
                      • Instruction ID: 65d8cf078aab0396acba3d8bac179993bef0397ff834efb85f6f5c9b8a4513a8
                      • Opcode Fuzzy Hash: 9efc7a54d70890802f8005eab411706517939ebfbbe606dbcca36a2c8d30b1f1
                      • Instruction Fuzzy Hash: FB31B375E001198FCB08CF6DD8889AEBBB6FF84310B158259E515973A5DB34AC42CF90
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d78c5c4a72668f36b0fb0c82979a8127b2530fe292889bfb1ba712ca1b99aed8
                      • Instruction ID: 48794e4d9470329d638ccf429b3a5d01b5b14c471d2100f19f7ed186746dd670
                      • Opcode Fuzzy Hash: d78c5c4a72668f36b0fb0c82979a8127b2530fe292889bfb1ba712ca1b99aed8
                      • Instruction Fuzzy Hash: D031B274608136CFE788FF5AE894D6B77B1BF452987910A66F4028BA6DC730EC50CB81
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bc9459fb996b80e300124c72aa9880dd9793be99b18e765b28ddc093dbe7fe6e
                      • Instruction ID: a5c19be5f958e114a3dbe75beccdb0d5df28527aa2ba1ff361a20293059f4d21
                      • Opcode Fuzzy Hash: bc9459fb996b80e300124c72aa9880dd9793be99b18e765b28ddc093dbe7fe6e
                      • Instruction Fuzzy Hash: 2D212431E04232CFCBA9BB29C49043EBBB2FB82240745457AF415DB761EB30AC51C795
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ef70109bd8779f50b13ae8ba077cdfe4793f850b0a22b6b730fc7d4ad0d3dc80
                      • Instruction ID: 9c0bb1a6674cbfe9b7d4d94ac4dfd7f9e46fe47ff34da987aaf7f719a0b6245a
                      • Opcode Fuzzy Hash: ef70109bd8779f50b13ae8ba077cdfe4793f850b0a22b6b730fc7d4ad0d3dc80
                      • Instruction Fuzzy Hash: 76219035A402149FCB19DB68C4409AE7BA6FF99360B60C569E91A9B340DB31EE42CBD1
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3813456950.0000000000FED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FED000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_fed000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cff5d75ad00360b8a7b8e91f4a150f8c012c869f8db6786453fe400cc373b49c
                      • Instruction ID: aafc2b2ada0db96628257e9655977e5c00965434d0e67ef0d76431c681f85b58
                      • Opcode Fuzzy Hash: cff5d75ad00360b8a7b8e91f4a150f8c012c869f8db6786453fe400cc373b49c
                      • Instruction Fuzzy Hash: DD213A72504284DFDB15DF10D9C0F16BB65FBA4324F34C169E9090FA96C336E856DBA2
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 728b2a1f68030fcf0e33f15df55acc1287f3346c12b16fef56956cb14f16184d
                      • Instruction ID: 10ad8d5a124d4537ae006b8f3ffcc259dcd6d069821588eb0b6f93d6a70101ee
                      • Opcode Fuzzy Hash: 728b2a1f68030fcf0e33f15df55acc1287f3346c12b16fef56956cb14f16184d
                      • Instruction Fuzzy Hash: 55218131701621CFD76D9A29C49862FBBA7BF887517154169E906DB354DF34DC028BC1
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3813632802.000000000114D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0114D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_114d000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7046a990b69c0d5e61fbeeee2cf16a98b3fe300cdf4e34ad218e33e98ef59abc
                      • Instruction ID: 72478ad37d3a409081abd5c4dfc565203f498c3fe27694cd1f518d2e35b928e2
                      • Opcode Fuzzy Hash: 7046a990b69c0d5e61fbeeee2cf16a98b3fe300cdf4e34ad218e33e98ef59abc
                      • Instruction Fuzzy Hash: 70213771504304DFDF19CF64E8C0B26BBA1FB94B14F24C5ADE8490B242C776D447CA62
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 19a408624c399781d791cbad42530c95ec0308b73a2a06457cd13d029d6b1f11
                      • Instruction ID: b352e9889998d9e00760aa8a305bcb44111204b60bb0d356cfb9d551000690f0
                      • Opcode Fuzzy Hash: 19a408624c399781d791cbad42530c95ec0308b73a2a06457cd13d029d6b1f11
                      • Instruction Fuzzy Hash: 7A1108327083645FDB456F68582866E3EA7EFC9250B00446EE505DB382DE288E0297E6
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cd45149fdcca0f3f3febe87a32a95b56ffa981bf450eafc4a3e365c2d8a318c0
                      • Instruction ID: 31871f5349f70b207ebb4b8c41b12434e76322131a5996b8ac4096445c477a2a
                      • Opcode Fuzzy Hash: cd45149fdcca0f3f3febe87a32a95b56ffa981bf450eafc4a3e365c2d8a318c0
                      • Instruction Fuzzy Hash: AB119E32E442589FCB069BBC9C009DEBB31FF89310F248796E16277191EA311905C791
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d7c60677148972368805e4838eae8f31f83954569f4277d7bbb0468a7e1de245
                      • Instruction ID: becf3d6227cf9f6fff8e3d147fbc91894cd18cead921e964fb8ec564e22252fb
                      • Opcode Fuzzy Hash: d7c60677148972368805e4838eae8f31f83954569f4277d7bbb0468a7e1de245
                      • Instruction Fuzzy Hash: 3831C379E01308CFCB08EFA8E59499DBBB2FF49300B208469E819AB324D731AC45CF50
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1f6ec13d2d773ce729b491a0ae5a37e8b6207c3d6fbb15f29627f768d54619e8
                      • Instruction ID: f4b4858bb1ce746261b69ce4285fcdb2b3bc270e1ef5be42df44ce81c3cb34a0
                      • Opcode Fuzzy Hash: 1f6ec13d2d773ce729b491a0ae5a37e8b6207c3d6fbb15f29627f768d54619e8
                      • Instruction Fuzzy Hash: 3C21D532604165EFDB199F69D848B6B3BA6FB84310F104029FA098BB95DB3CCD51CBE1
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fd575b15dcfbaf43c10710a587526052d8db7379e0a6c93d3e293cdc948bffaf
                      • Instruction ID: f65e1bf0723762a6ccbb955ce2b0e208c75124ff9af482c3fc5c9393fc4137fb
                      • Opcode Fuzzy Hash: fd575b15dcfbaf43c10710a587526052d8db7379e0a6c93d3e293cdc948bffaf
                      • Instruction Fuzzy Hash: 2F1104307152509FD7142A7A98182BBBAABAFCA211B14847BE546CB396CE788C068761
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 828d127f3954010952f4a6338269eb72957c5a1490846f89794b5673fc30c378
                      • Instruction ID: c793054216e640991c65216ea0ba28e877420dc6e5d8d92e3c8ecced2f99d8d8
                      • Opcode Fuzzy Hash: 828d127f3954010952f4a6338269eb72957c5a1490846f89794b5673fc30c378
                      • Instruction Fuzzy Hash: 5D213874C0460ACFCB16EFA8D4545EEBFF0BF49310F0041AAD541A7225EB301A89CBA2
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 89bc2e3efbcbe3e0c30408ad282aaabf33db013d915ada0409e336cefd0b0170
                      • Instruction ID: deee6c8264dfb554036a63f802ad14d5d02c334775b13b7acf065d8248493a65
                      • Opcode Fuzzy Hash: 89bc2e3efbcbe3e0c30408ad282aaabf33db013d915ada0409e336cefd0b0170
                      • Instruction Fuzzy Hash: D4218874D00209CFEB44EFB9E84479EBBF2FB84300F0081AAC0549B354EB746A868F81
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 112f8488e2e3fa9e56e9f8aee505f645665aaf51e1ba02ef5717b38ff8e397c0
                      • Instruction ID: 81c1dcdf6cc7124c9e8f7cdad1f74fe80f10e9ead45aab7a9c254b60e3eab2de
                      • Opcode Fuzzy Hash: 112f8488e2e3fa9e56e9f8aee505f645665aaf51e1ba02ef5717b38ff8e397c0
                      • Instruction Fuzzy Hash: 9421D0B5C0020A8FCB44EFA8D9456EEBBF1FB48300F10916AD905B6314EB345A95CBA1
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3813456950.0000000000FED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FED000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_fed000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                      • Instruction ID: 2786e5579d09cef1ce729413485cccbe7b7cf2a2a3a11697ee32ad0454526739
                      • Opcode Fuzzy Hash: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                      • Instruction Fuzzy Hash: EB11D376904280DFDB16CF10D9C4B16BF71FBA4324F24C5A9DC490BA56C33AE856DBA2
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ec50e2f7bafeb98c8051eb1932014a86320049aaed62494a5b6d3c36912d67df
                      • Instruction ID: 1f36b43f4a605aea99f4476699b695a0b0fcdc06b595541d328e681bbb754eb8
                      • Opcode Fuzzy Hash: ec50e2f7bafeb98c8051eb1932014a86320049aaed62494a5b6d3c36912d67df
                      • Instruction Fuzzy Hash: 221153B68003499FDB10DF9AC845BEEBFF5EB48320F148419E918A7210D379A990CFA1
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2b04fb9e2204bb1541f78c5f112d3fd716784bda44cd7eaaeca1e16a68b5b966
                      • Instruction ID: f75fe83b2af3d5698bb158de697ff6d2a86580eb800b8590c88c6a2493cccebf
                      • Opcode Fuzzy Hash: 2b04fb9e2204bb1541f78c5f112d3fd716784bda44cd7eaaeca1e16a68b5b966
                      • Instruction Fuzzy Hash: DA119774D00209CFEB44EFA8D845B9EBBF2FB84300F00C1AAC054AB314EB742A458F81
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 19ec44e6f365770784027ba98993c30e8651862bd3c2183a734ac9eea5595d72
                      • Instruction ID: 2a064b149bb5f1e310b61691f0a07065cf7a6ed3e661a83b0079c89b98c61b4f
                      • Opcode Fuzzy Hash: 19ec44e6f365770784027ba98993c30e8651862bd3c2183a734ac9eea5595d72
                      • Instruction Fuzzy Hash: 4F111C34F402588FEB10EFE8E840B9EBBB6AB85311F518061F808A7345E63499018F51
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3813632802.000000000114D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0114D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_114d000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                      • Instruction ID: 13397b3f98dfc182182c475aae01594049a09c2e50b16c54b623095e3514f52c
                      • Opcode Fuzzy Hash: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                      • Instruction Fuzzy Hash: F811EB75504280CFCF16CF24D9C4B15BBA2FB88714F28C6AED8494B252C33AD40ACF62
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 00ea8839418084ba96a2ffc22469f233ffcdbe413b71091cb8fcbe9e1e84b5b5
                      • Instruction ID: 54239b3368fccca3158e1d52f1d28a13aa314fe30102d36a5515e5acf38d4e75
                      • Opcode Fuzzy Hash: 00ea8839418084ba96a2ffc22469f233ffcdbe413b71091cb8fcbe9e1e84b5b5
                      • Instruction Fuzzy Hash: 52113975E10221CFCBA0EFB8EA08AAA7BF4AF8921571101A9E405DB325DB31C9058B90
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2e058cf2ccc5f50176155605d8a1080cc40abe763a14044fa495ac91711a72d5
                      • Instruction ID: a0e05df96bc76eb9072e13f45dc435831f3b2c1fcb7c4cac8d8e1e2b998981ed
                      • Opcode Fuzzy Hash: 2e058cf2ccc5f50176155605d8a1080cc40abe763a14044fa495ac91711a72d5
                      • Instruction Fuzzy Hash: 671142B6800249DFDB11DF99C945BEEBBF4EB48320F24841AE918A7250C379A590CFA1
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8d15c22a0e603fa6cc87e1a1a73cc58de0adf55acc5ed2817ae45ec484af8bce
                      • Instruction ID: 60e1e378adcafb40c991dded20b04a28bc7f2e256abee7988cd969624ea17132
                      • Opcode Fuzzy Hash: 8d15c22a0e603fa6cc87e1a1a73cc58de0adf55acc5ed2817ae45ec484af8bce
                      • Instruction Fuzzy Hash: 9C01F5327000046FDB468E65AC04BAE3BA7EBC8350F28802EF608C7390DB358912DBA1
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c5eb287f29c3c8b255cbf91e64c2b24e853f8018e0c3bc29361060963f765cac
                      • Instruction ID: fea180268c415730c48f4a2c19446f916ae573caf7178a654f00c54e285ceb76
                      • Opcode Fuzzy Hash: c5eb287f29c3c8b255cbf91e64c2b24e853f8018e0c3bc29361060963f765cac
                      • Instruction Fuzzy Hash: 1901E471E002298FCF58EFB9C9006EEBBB5BF48200F10856AD519E7250E7349A01CBE0
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d431eb6fd483c31b0e869c377813b040f2494fcb2ea6807a2bebb0fb2673d2fc
                      • Instruction ID: 41bc4b1997020df9fb3fc716c4a6e9b6edb489c56bfe445af415c553e08c6c10
                      • Opcode Fuzzy Hash: d431eb6fd483c31b0e869c377813b040f2494fcb2ea6807a2bebb0fb2673d2fc
                      • Instruction Fuzzy Hash: 48F05E317142108FC798AB3AE81893A77E6AFC6755B1644BAF905CF371EA61CC018B91
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 59aaefcbd8838a72153b6f21163256deafc710359587098a1ea495693de5dfc9
                      • Instruction ID: 7460903490c89476c6055487466c32f4b289b324c79b97ebabbfcd67caa0387e
                      • Opcode Fuzzy Hash: 59aaefcbd8838a72153b6f21163256deafc710359587098a1ea495693de5dfc9
                      • Instruction Fuzzy Hash: 5FF082313001148FD758AF2AE85892A77EAEFC56557158079F506CB370DE30DC018790
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0ebce1ec1aa60988b5fa0c7f5339e9b4014d83d95c1f385bda7052b7f434edd9
                      • Instruction ID: 0d7558118d2d2b04434d416384dc88898a87cd99582c0d011c16cf1a5ea319ae
                      • Opcode Fuzzy Hash: 0ebce1ec1aa60988b5fa0c7f5339e9b4014d83d95c1f385bda7052b7f434edd9
                      • Instruction Fuzzy Hash: 94E08633D6022A5BCF01A6A9EC156DEBB39FF95320F845626D52036541EB70275982A0
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b815b5530dc191c8fda582371ca2341e671937585e950ae77dc62f9249fc3920
                      • Instruction ID: 7575c555999c5751dd42c298764ec0471084e92922679b7c8193e70e1e0ea7b7
                      • Opcode Fuzzy Hash: b815b5530dc191c8fda582371ca2341e671937585e950ae77dc62f9249fc3920
                      • Instruction Fuzzy Hash: B8D01231D6022A978B01AAA5DC044DEBB39FE95721B914666D51437140EB70265986E1
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                      • Instruction ID: b80a09c67ca5c62915be598610506fef5625e33f85ec3df9786bbab21d545357
                      • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                      • Instruction Fuzzy Hash: 5AC08C3320C1283AAA3D208F7C41EB3BB8CC3C13F4A260177F91CE3200AA42AC8041F9
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ab5222daddbc682972d76ef0a1f7abed17988ce8775dfc5c0ea87c4f0babb6e4
                      • Instruction ID: 7277477517137e490467c9f03dd25c5c9cf89300fcfcf16431705f0a06cc54b6
                      • Opcode Fuzzy Hash: ab5222daddbc682972d76ef0a1f7abed17988ce8775dfc5c0ea87c4f0babb6e4
                      • Instruction Fuzzy Hash: F0D0677AB111089FCB149F98E8509DDB7B6FB9C222B148116E915E7264C6319921DB60
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2b040c9097d24a81af23c44c8f17e7c5384bb711c4ab0667e181569f7e799204
                      • Instruction ID: 6e310d0f03daf85eab6c3b4b4f4116fac5fbacbaa627365d3ebc4f54d2a980fe
                      • Opcode Fuzzy Hash: 2b040c9097d24a81af23c44c8f17e7c5384bb711c4ab0667e181569f7e799204
                      • Instruction Fuzzy Hash: 08D02B70A14385CBC715F731E8192583725BFC2204F8085EDA8850A62BEAB809454B22
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bbe60d148eb2ec0f615142688351e3045db04351963db79345ef3bcd718374c7
                      • Instruction ID: 84160755e54008e61aa1c06389c90258ff649a0acda88f676f450bfdc6790bbb
                      • Opcode Fuzzy Hash: bbe60d148eb2ec0f615142688351e3045db04351963db79345ef3bcd718374c7
                      • Instruction Fuzzy Hash: EFD06774D44119CBCB24DF64E9447DCB7B0EB85305F1054E7E80AB2254D7305E628F11
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3814014182.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_11d0000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bfe21aee3df2d13860686e9fd87fa48624f709a30cc3c88774d56622c2a38bf1
                      • Instruction ID: 157fef07eef8e6a4ede550851b38d1e5062cae2fe619f691fc14755de0eb2a6f
                      • Opcode Fuzzy Hash: bfe21aee3df2d13860686e9fd87fa48624f709a30cc3c88774d56622c2a38bf1
                      • Instruction Fuzzy Hash: 76C01271510349C7D515F772E949715331E6BC0600F809554B18A06619EEB81A854BA2
                      Memory Dump Source
                      • Source File: 0000000F.00000002.3826049078.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_6a30000_lmUupyodsah.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 52be7bf1233a89568a137a19462e81e6b7b98f09f9be55abcd00c295fc45b606
                      • Instruction ID: 458f8165badb38b39fc0170b08c772b2757626f8c89b062d267b72418e1f67cc
                      • Opcode Fuzzy Hash: 52be7bf1233a89568a137a19462e81e6b7b98f09f9be55abcd00c295fc45b606
                      • Instruction Fuzzy Hash: C4C08030504541CFCB00CF1CD554B047751FFC0304B544095F0048F137C2209831CB54