Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
F#U0130YAT TEKL#U0130F#U0130-2400.exe

Overview

General Information

Sample name:F#U0130YAT TEKL#U0130F#U0130-2400.exe
renamed because original name is a hash value
Original sample name:FYAT TEKLF-2400.exe
Analysis ID:1515067
MD5:2e6fc928822c8f9bb49e60b32e87f1ae
SHA1:eccd6b4f0ad70c48757078f4870e1d45263771c8
SHA256:28c597dffa4e58341d159876a809955f673bae6115787910d41080ef7ba2a6f0
Tags:exeFormbookgeoTURuser-abuse_ch
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • F#U0130YAT TEKL#U0130F#U0130-2400.exe (PID: 6596 cmdline: "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe" MD5: 2E6FC928822C8F9BB49E60B32E87F1AE)
    • powershell.exe (PID: 7108 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7116 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 3512 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\cYDnGbgU.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7280 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 4592 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cYDnGbgU" /XML "C:\Users\user\AppData\Local\Temp\tmp38F1.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 2840 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cYDnGbgU.exe (PID: 2836 cmdline: C:\Users\user\AppData\Roaming\cYDnGbgU.exe MD5: 2E6FC928822C8F9BB49E60B32E87F1AE)
    • schtasks.exe (PID: 7400 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cYDnGbgU" /XML "C:\Users\user\AppData\Local\Temp\tmp4A37.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cYDnGbgU.exe (PID: 7444 cmdline: "C:\Users\user\AppData\Roaming\cYDnGbgU.exe" MD5: 2E6FC928822C8F9BB49E60B32E87F1AE)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.usgrovemall.com", "Username": "contact@usgrovemall.com", "Password": "Maximzed@#$#"}
SourceRuleDescriptionAuthorStrings
0000000D.00000002.4149137493.00000000033A6000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000008.00000002.4148813369.00000000028AE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      0000000D.00000002.4149137493.00000000033B0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        0000000D.00000002.4149137493.000000000339E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000008.00000002.4148813369.0000000002884000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 21 entries
            SourceRuleDescriptionAuthorStrings
            8.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              9.2.cYDnGbgU.exe.4292550.9.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                9.2.cYDnGbgU.exe.4292550.9.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  9.2.cYDnGbgU.exe.4292550.9.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x324e5:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x32557:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x325e1:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x32673:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x326dd:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x3274f:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x327e5:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x32875:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  9.2.cYDnGbgU.exe.42cdd70.8.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    Click to see the 24 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe", ParentImage: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe, ParentProcessId: 6596, ParentProcessName: F#U0130YAT TEKL#U0130F#U0130-2400.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe", ProcessId: 7108, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe", ParentImage: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe, ParentProcessId: 6596, ParentProcessName: F#U0130YAT TEKL#U0130F#U0130-2400.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe", ProcessId: 7108, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cYDnGbgU" /XML "C:\Users\user\AppData\Local\Temp\tmp4A37.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cYDnGbgU" /XML "C:\Users\user\AppData\Local\Temp\tmp4A37.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\cYDnGbgU.exe, ParentImage: C:\Users\user\AppData\Roaming\cYDnGbgU.exe, ParentProcessId: 2836, ParentProcessName: cYDnGbgU.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cYDnGbgU" /XML "C:\Users\user\AppData\Local\Temp\tmp4A37.tmp", ProcessId: 7400, ProcessName: schtasks.exe
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 192.250.227.28, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe, Initiated: true, ProcessId: 7048, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49736
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cYDnGbgU" /XML "C:\Users\user\AppData\Local\Temp\tmp38F1.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cYDnGbgU" /XML "C:\Users\user\AppData\Local\Temp\tmp38F1.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe", ParentImage: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe, ParentProcessId: 6596, ParentProcessName: F#U0130YAT TEKL#U0130F#U0130-2400.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cYDnGbgU" /XML "C:\Users\user\AppData\Local\Temp\tmp38F1.tmp", ProcessId: 4592, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe", ParentImage: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe, ParentProcessId: 6596, ParentProcessName: F#U0130YAT TEKL#U0130F#U0130-2400.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe", ProcessId: 7108, ProcessName: powershell.exe

                    Persistence and Installation Behavior

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cYDnGbgU" /XML "C:\Users\user\AppData\Local\Temp\tmp38F1.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cYDnGbgU" /XML "C:\Users\user\AppData\Local\Temp\tmp38F1.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe", ParentImage: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe, ParentProcessId: 6596, ParentProcessName: F#U0130YAT TEKL#U0130F#U0130-2400.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cYDnGbgU" /XML "C:\Users\user\AppData\Local\Temp\tmp38F1.tmp", ProcessId: 4592, ProcessName: schtasks.exe
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exeAvira: detected
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeAvira: detection malicious, Label: HEUR/AGEN.1308740
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.3981598.8.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.usgrovemall.com", "Username": "contact@usgrovemall.com", "Password": "Maximzed@#$#"}
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeReversingLabs: Detection: 79%
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeVirustotal: Detection: 79%Perma Link
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exeReversingLabs: Detection: 79%
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exeVirustotal: Detection: 79%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeJoe Sandbox ML: detected
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exeJoe Sandbox ML: detected
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49733 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49738 version: TLS 1.2
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Networking

                    barindex
                    Source: Yara matchFile source: 9.2.cYDnGbgU.exe.42cdd70.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.cYDnGbgU.exe.4292550.9.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.39bcdb8.9.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.3981598.8.raw.unpack, type: UNPACKEDPE
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                    Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
                    Source: Joe Sandbox ViewASN Name: CNSV-LLCUS CNSV-LLCUS
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: ip-api.com
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: ip-api.com
                    Source: global trafficDNS traffic detected: DNS query: mail.usgrovemall.com
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4148813369.0000000002871000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4149137493.0000000003361000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1756426531.00000000042A6000.00000004.00000800.00020000.00000000.sdmp, F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1756426531.0000000003981000.00000004.00000800.00020000.00000000.sdmp, F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4148813369.0000000002871000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 00000009.00000002.1796054239.0000000004292000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4149137493.0000000003361000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4145299206.0000000000435000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4148813369.00000000028AE000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4149137493.000000000339E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.usgrovemall.com
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4148813369.00000000028B6000.00000004.00000800.00020000.00000000.sdmp, F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4146072478.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4149137493.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4146200410.000000000148A000.00000004.00000020.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4160825037.0000000006D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r11.i.lencr.org/0
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4148813369.00000000028B6000.00000004.00000800.00020000.00000000.sdmp, F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4146072478.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4149137493.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4146200410.000000000148A000.00000004.00000020.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4160825037.0000000006D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r11.o.lencr.org0#
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1755412576.00000000026CD000.00000004.00000800.00020000.00000000.sdmp, F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4148813369.0000000002821000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 00000009.00000002.1794251648.0000000002FDD000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4149137493.0000000003311000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmp, F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758054376.0000000004F70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4148813369.00000000028B6000.00000004.00000800.00020000.00000000.sdmp, F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4146072478.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4149137493.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4146200410.000000000148A000.00000004.00000020.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4146200410.00000000014B0000.00000004.00000020.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4160825037.0000000006D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4148813369.00000000028B6000.00000004.00000800.00020000.00000000.sdmp, F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4146072478.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4149137493.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4146200410.000000000148A000.00000004.00000020.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4146200410.00000000014B0000.00000004.00000020.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4160825037.0000000006D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1756426531.00000000042A6000.00000004.00000800.00020000.00000000.sdmp, F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1756426531.0000000003981000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 00000009.00000002.1796054239.0000000004292000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4145299206.0000000000435000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1756426531.00000000042A6000.00000004.00000800.00020000.00000000.sdmp, F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1756426531.0000000003981000.00000004.00000800.00020000.00000000.sdmp, F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4148813369.0000000002821000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 00000009.00000002.1796054239.0000000004292000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4149137493.0000000003311000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4145299206.0000000000435000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4148813369.0000000002821000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4149137493.0000000003311000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4148813369.0000000002821000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4149137493.0000000003311000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49733 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49738 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.3981598.8.raw.unpack, SKTzxzsJw.cs.Net Code: kHdlDo9V4
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.39bcdb8.9.raw.unpack, SKTzxzsJw.cs.Net Code: kHdlDo9V4
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\cYDnGbgU.exe
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeWindow created: window name: CLIPBRDWNDCLASS

                    System Summary

                    barindex
                    Source: 9.2.cYDnGbgU.exe.4292550.9.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 9.2.cYDnGbgU.exe.42cdd70.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.39bcdb8.9.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.3981598.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 9.2.cYDnGbgU.exe.42cdd70.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 9.2.cYDnGbgU.exe.4292550.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.39bcdb8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.3981598.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 0_2_00A0D2A40_2_00A0D2A4
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 0_2_046D56100_2_046D5610
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 0_2_06EA4A000_2_06EA4A00
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 0_2_06EA34F70_2_06EA34F7
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 0_2_06EA35080_2_06EA3508
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 0_2_06EAE2880_2_06EAE288
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 0_2_06EAC0D80_2_06EAC0D8
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 0_2_06EABCA00_2_06EABCA0
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 0_2_06EA8D280_2_06EA8D28
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 0_2_06EA3B080_2_06EA3B08
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 0_2_06EA3B030_2_06EA3B03
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 0_2_06EAD8C70_2_06EAD8C7
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 0_2_06EAD8D80_2_06EAD8D8
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 0_2_06EAB8680_2_06EAB868
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 0_2_06EA49F00_2_06EA49F0
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_027DF1318_2_027DF131
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_027D4AE08_2_027D4AE0
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_027DB8A08_2_027DB8A0
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_027D3EC88_2_027D3EC8
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_027DEC908_2_027DEC90
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_027D42108_2_027D4210
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_067F1DDC8_2_067F1DDC
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_067F2AE88_2_067F2AE8
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_067F2AC38_2_067F2AC3
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_067F37DF8_2_067F37DF
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_067F1DD08_2_067F1DD0
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_0686E4588_2_0686E458
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_068662B88_2_068662B8
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_0686B2E78_2_0686B2E7
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_0686C2488_2_0686C248
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_068652688_2_06865268
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_068631308_2_06863130
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_06867A408_2_06867A40
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_068659AB8_2_068659AB
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_068624108_2_06862410
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_068673608_2_06867360
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_068600408_2_06860040
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_068600078_2_06860007
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 9_2_02DF48709_2_02DF4870
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 9_2_02E0D2A49_2_02E0D2A4
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 13_2_018EB8D813_2_018EB8D8
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 13_2_018E4AE013_2_018E4AE0
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 13_2_018EEC9013_2_018EEC90
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 13_2_018E3EC813_2_018E3EC8
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 13_2_018EF1FF13_2_018EF1FF
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 13_2_018E421013_2_018E4210
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 13_2_07151DDC13_2_07151DDC
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 13_2_07152AE213_2_07152AE2
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 13_2_07152AE813_2_07152AE8
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 13_2_071537DE13_2_071537DE
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 13_2_07151DD013_2_07151DD0
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 13_2_071CC24813_2_071CC248
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 13_2_071C526813_2_071C5268
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 13_2_071C62B813_2_071C62B8
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 13_2_071CB2E713_2_071CB2E7
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 13_2_071C313013_2_071C3130
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 13_2_071C7A4013_2_071C7A40
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 13_2_071C59AB13_2_071C59AB
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 13_2_071C241013_2_071C2410
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 13_2_071CE45813_2_071CE458
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 13_2_071C736013_2_071C7360
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 13_2_071C004013_2_071C0040
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 13_2_071C000613_2_071C0006
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1755412576.0000000002641000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleLogin.dll8 vs F#U0130YAT TEKL#U0130F#U0130-2400.exe
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000000.1692888651.00000000002BA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBxxR.exe6 vs F#U0130YAT TEKL#U0130F#U0130-2400.exe
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1751802970.0000000000A2E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs F#U0130YAT TEKL#U0130F#U0130-2400.exe
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1759141015.00000000072D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs F#U0130YAT TEKL#U0130F#U0130-2400.exe
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758081406.00000000050A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleLogin.dll8 vs F#U0130YAT TEKL#U0130F#U0130-2400.exe
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1756426531.0000000003981000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameb4022792-9af8-4cfb-95a6-977ad9d19a8d.exe4 vs F#U0130YAT TEKL#U0130F#U0130-2400.exe
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1756426531.0000000003981000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs F#U0130YAT TEKL#U0130F#U0130-2400.exe
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1755412576.00000000026CD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameb4022792-9af8-4cfb-95a6-977ad9d19a8d.exe4 vs F#U0130YAT TEKL#U0130F#U0130-2400.exe
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4145905935.00000000007C8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs F#U0130YAT TEKL#U0130F#U0130-2400.exe
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exeBinary or memory string: OriginalFilenameBxxR.exe6 vs F#U0130YAT TEKL#U0130F#U0130-2400.exe
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 9.2.cYDnGbgU.exe.4292550.9.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 9.2.cYDnGbgU.exe.42cdd70.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.39bcdb8.9.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.3981598.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 9.2.cYDnGbgU.exe.42cdd70.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 9.2.cYDnGbgU.exe.4292550.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.39bcdb8.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.3981598.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: cYDnGbgU.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.3981598.8.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.3981598.8.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.3981598.8.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.3981598.8.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.3981598.8.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.3981598.8.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.3981598.8.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.3981598.8.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, bal5aDHGqqusl9PpVH.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, bal5aDHGqqusl9PpVH.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, bal5aDHGqqusl9PpVH.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, IdJIQ0mrbn0KCZUl6K.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, IdJIQ0mrbn0KCZUl6K.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.2697ab8.2.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.50c0000.11.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.2687aa0.5.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@19/15@3/3
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeFile created: C:\Users\user\AppData\Roaming\cYDnGbgU.exeJump to behavior
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2840:120:WilError_03
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeMutant created: NULL
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeMutant created: \Sessions\1\BaseNamedObjects\uDKYkOOejlkFWgu
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7116:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6008:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7408:120:WilError_03
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeFile created: C:\Users\user\AppData\Local\Temp\tmp38F1.tmpJump to behavior
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exeReversingLabs: Detection: 79%
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exeVirustotal: Detection: 79%
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeFile read: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe"
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\cYDnGbgU.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cYDnGbgU" /XML "C:\Users\user\AppData\Local\Temp\tmp38F1.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess created: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\cYDnGbgU.exe C:\Users\user\AppData\Roaming\cYDnGbgU.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cYDnGbgU" /XML "C:\Users\user\AppData\Local\Temp\tmp4A37.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess created: C:\Users\user\AppData\Roaming\cYDnGbgU.exe "C:\Users\user\AppData\Roaming\cYDnGbgU.exe"
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\cYDnGbgU.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cYDnGbgU" /XML "C:\Users\user\AppData\Local\Temp\tmp38F1.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess created: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cYDnGbgU" /XML "C:\Users\user\AppData\Local\Temp\tmp4A37.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess created: C:\Users\user\AppData\Roaming\cYDnGbgU.exe "C:\Users\user\AppData\Roaming\cYDnGbgU.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: wbemcomn.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: rasapi32.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: rasman.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: rtutils.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: mswsock.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: winhttp.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: dnsapi.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: winnsi.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: rasadhlp.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: fwpuclnt.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: secur32.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: schannel.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: mskeyprotect.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: ntasn1.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: ncrypt.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: ncryptsslp.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: gpapi.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: vaultcli.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeSection loaded: edputil.dll
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Data Obfuscation

                    barindex
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, Form1.cs.Net Code: InitializeComponent System.AppDomain.Load(byte[])
                    Source: cYDnGbgU.exe.0.dr, Form1.cs.Net Code: InitializeComponent System.AppDomain.Load(byte[])
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, bal5aDHGqqusl9PpVH.cs.Net Code: X73w2lvC5j System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.2666678.1.raw.unpack, RLhDAEYwfjHvjWVq5a.cs.Net Code: Gc3JujKCKLERSog4UEp System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.50a0000.10.raw.unpack, RLhDAEYwfjHvjWVq5a.cs.Net Code: Gc3JujKCKLERSog4UEp System.Reflection.Assembly.Load(byte[])
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_027D0C55 push edi; retf 8_2_027D0C7A
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_067F7CFF push es; ret 8_2_067F7D00
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 13_2_018E0C55 push edi; retf 13_2_018E0C7A
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeCode function: 13_2_07151AD9 push eax; iretd 13_2_07151AE5
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exeStatic PE information: section name: .text entropy: 7.934869907354881
                    Source: cYDnGbgU.exe.0.drStatic PE information: section name: .text entropy: 7.934869907354881
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, Y6tRLDwwu0r7G3xm1c.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'YCtoPXZT5U', 'XVSoK2YnEp', 'RXrozrvVXS', 'c1TUbALhlZ', 'PLZU4hGO2d', 'dt7UooRL3y', 'WL9UUypsYF', 'goalTeFohln9lLThDU9'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, AqTBq3Qc48xHs1RJelg.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'hfkZmB8TqE', 'ttqZOS4WJK', 'flIZGen8Cf', 'WlIZIOxgQr', 'ByhZv4K6Wa', 'qaQZEdLIXA', 'uNFZlkNvCV'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, iQVun9DtkxRfr6tGwr.csHigh entropy of concatenated method names: 'ydbjr4LKNw', 'kOOjg7Cxpj', 'jRRcxo4Adq', 'KPFcRq6VIE', 'mc4c9gJNh3', 'jyichuAP47', 'mYicTklxCK', 'J8ZcHH01UB', 'aq3cYC550O', 'cXfcCtD0WX'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, qewDnelTwdYfPrGKKS.csHigh entropy of concatenated method names: 'Me2ACCpwX8', 'mbhAptFDqf', 'GhoAmV7DpY', 'l0IAOhogZ7', 'kavAiT2Cgv', 'QbtAxYMURI', 'UwQARZusLM', 'sCOA9XTEW5', 'UefAh7J0Av', 'TVnATsKsQd'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, q3dBfE4CEyf38sODqy.csHigh entropy of concatenated method names: 'IOeVuk48eq', 'i1tVqT4REV', 'iIAV26ZAbf', 'DikV5g3FBu', 'p85VrHa9Ib', 'CGxVkxnrmo', 'ORFVgnynRM', 'zt8VXDhNWM', 'qd4Vd1u0rR', 'ArTV0OqU6L'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, TdWG6QYkwXf5WOH3AH.csHigh entropy of concatenated method names: 'P46WfiLoZH', 'HurWuPOrB1', 'uwTW2BbpHN', 'YtjW5MuSUe', 'w11WkZ2s3E', 'k07WgIypvb', 'hQGWdtWZXO', 'FmaW0AxOsK', 'BHj2xUQ727etFJBsFSO', 'kV4LCBQSCiwLcdM9Z89'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, wYxa99pk5AT5Q8Etp4.csHigh entropy of concatenated method names: 'fMSJX9iKVV', 'vRrJdU4iMt', 'ztdJBBAldV', 'SR0Jipv7ce', 'c9BJRK2CM9', 'V1cJ9mdble', 'G6FJTN9EVc', 'hP0JHe8eHl', 'kEVJCfcPNH', 'stDJFl6oUB'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, er30hWkpx2w8t3ZecR.csHigh entropy of concatenated method names: 'sE076AomCU', 'mWe71smKY0', 'ToString', 'KU373fIwLG', 'mJZ7aeE5Aw', 'Ocn7cfjsDJ', 'lTq7jLQRoY', 'uGw7WHZbit', 'H6h7VaZs7w', 'fYW7sjO4gq'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, akg6bXQVfj049ePpY61.csHigh entropy of concatenated method names: 'GJfNuoEtuw', 'kWYNqVJ2S0', 'JjkN2x57Si', 'XMsN5nemf3', 'xJ9Nrhkl5g', 'XUNNkDXek1', 'kGwNgwhy4O', 'uYSNXSxfyD', 'Q0WNduPJLD', 'cmSN0ujGTP'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, IdJIQ0mrbn0KCZUl6K.csHigh entropy of concatenated method names: 'WFgamTU0rp', 'pBraOo8BAp', 'BJSaGWGnUU', 'uPqaIfxN2r', 'BMEavBRyph', 'bdaaEhTMJO', 'lC4alybybh', 'JbOaQ9OINe', 'J30aP03WBP', 'eOZaKQAbqQ'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, QiAuk79qm4I2n9WpQE.csHigh entropy of concatenated method names: 'mm0L3UcFs7', 'BhLLag8Eve', 'VwaLcwTAaa', 'cH9Ljsmqsg', 'TUqLWruL9j', 'LZTLVlHk2f', 'aNALsJaAp7', 'JQYLyrDLk8', 'HIUL6SqrFt', 'PyTL1UcB53'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, fdH8GvOG7C96TaohFK.csHigh entropy of concatenated method names: 'bqILBQYPjB', 'F6mLi1y8e8', 'SkCLxaS0ox', 'DfxLRHsuMn', 'vfNLmQpvIY', 'wLYL9U85Qm', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, hafU4QijkRSw5pLNpG.csHigh entropy of concatenated method names: 'cYxN4kSiHy', 'tAbNU1e6MH', 'd3DNwcajKa', 'XQSN3gKpZW', 'UYFNai54rA', 'hYvNj1LtR6', 'sQpNWBCbON', 'GvpLlxYGSP', 'q5eLQmACo8', 'Sh9LPTiwGk'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, dSQxen83gcaoFn0u9A.csHigh entropy of concatenated method names: 'Kwr7QUQmad', 'Vkm7KRKGpB', 'mDHLb6hYc4', 'mQcL4cBXAt', 'dKa7FUtdf0', 'LaL7pm3xsZ', 'Ajk78nKapu', 'iBH7mfDdmG', 'sZl7OkrgRo', 'Gum7G9qpJX'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, bal5aDHGqqusl9PpVH.csHigh entropy of concatenated method names: 'AbOUMQDhtO', 'xuMU3h9SY5', 'phAUaQWi7H', 'AHlUcMi4ZU', 'MBOUjnYkrg', 'FeKUWhgJ66', 'W5RUVSqBeP', 'iNDUsT9WqG', 'KFpUyviJhQ', 'PNHU6xI4cn'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, yZJiAVX98IA2xsdpYB.csHigh entropy of concatenated method names: 'Dispose', 'ml54PjpJ9f', 'L3EoiEIH14', 'FQMnnUMgt7', 'XBo4KViZmr', 'HcU4zfI7xd', 'ProcessDialogKey', 'yN5ob9jyEl', 'Ff1o4RjibF', 'ytyood9QAy'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, WhCcuxKMektuQl3bUD.csHigh entropy of concatenated method names: 'ToString', 'Da1SFlemKV', 'WhLSiE4Ebn', 'OdRSxTX4c4', 'Dy3SRbDWGH', 'UrpS9reYxP', 'RwVShquE5b', 'LSsSTTt4xu', 'nfySHp6XK7', 'zmpSYNsXLA'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, jfeViXavPeEM9eF108.csHigh entropy of concatenated method names: 'I8u4VgtEV6', 'beu4sQqfGh', 'NL346i8aPP', 'Def411u5tJ', 'ewy4A3Yq3L', 'c8R4SYFMeQ', 'cFdExSdkkOslvRbwv3', 'S83OESBSIYM01MtsIh', 'tXshs8RG8bPUTT0GHB', 'bxQ44ugVPB'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, OafLSZFLDMriEAVQ9R.csHigh entropy of concatenated method names: 's5v2nPNaH', 'EOe5AUSch', 'Mn8k09Tqq', 'ICpgRdDZf', 'eFtdJsmUn', 'wqo0CRkLY', 'WUgJy5N0YvPHJEY6Kh', 'skxekl6Ccd6ogtZZEo', 'YWZLxqbyT', 'BJVZk29i9'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, P4ldvaUb5opVL6IfT5.csHigh entropy of concatenated method names: 'upFWMcHT2s', 'tx0Wad9432', 'Lv4WjkFe9T', 'DfTWVOotha', 'o1bWsaK3cX', 'bcyjvRkp6C', 'HEAjEMbVJV', 'JKdjl9L8R1', 'wMDjQUK7Km', 'gpOjPIrVfb'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.72d0000.12.raw.unpack, Ml77RDd2wh4oyD1D9p.csHigh entropy of concatenated method names: 'lx2c5kVIVw', 'C7qckyTcsg', 'GtKcXno1Dh', 'CIIcdfBefk', 'S4ScApavIM', 'KTecS9Uw6J', 'TCgc78QEiJ', 'nCJcLdtiN9', 'fWBcN7nIaa', 'H2lcZ1aunr'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.2666678.1.raw.unpack, K4VVbTCGN4q2c8lCCj.csHigh entropy of concatenated method names: 'G3KbyTLLkM4Bb', 'si9SO65af8rO14mjPDU', 'bBffTJ5RQH5OqC4Gea9', 'ovKlj65mCkfoxl0nYKf', 'BWF7CK5kxuHeQeFkeiK', 'qwHs9D5fCc7yK8DUC5g', 'CQU41K5NJrprlOnEHS0', 'RhSTw15QcpoAFlp1KXj', 'nntNvk5jVxrl8qAx10M', 'uNAC9m5VOKsj7MEAs02'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.2666678.1.raw.unpack, q1bUrWhd8NtMR4Tat2.csHigh entropy of concatenated method names: 'FtMrR4Tat', 'asVbu6B2r', 'BfjKHvjWV', 'r8MoiUGvh', 'dTGON4q2c', 'brXv00T5r', 'Dispose', 'q1bhUrWd8', 'zN8XoTN4OjYAicjyxg', 'ruXo51Q9ZfIq3o9q7i'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.2666678.1.raw.unpack, RLhDAEYwfjHvjWVq5a.csHigh entropy of concatenated method names: 'An354LdEp', 'zbMnKODFs', 'B6jqN3UrZ', 'QkT3JtuA7', 'rmgQyVns4', 'CtlpashST', 'Bh5RaqMVd', 'PW46FiDNh', 'W34ldUSmX', 'AVZwxu1MB'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.50a0000.10.raw.unpack, K4VVbTCGN4q2c8lCCj.csHigh entropy of concatenated method names: 'G3KbyTLLkM4Bb', 'si9SO65af8rO14mjPDU', 'bBffTJ5RQH5OqC4Gea9', 'ovKlj65mCkfoxl0nYKf', 'BWF7CK5kxuHeQeFkeiK', 'qwHs9D5fCc7yK8DUC5g', 'CQU41K5NJrprlOnEHS0', 'RhSTw15QcpoAFlp1KXj', 'nntNvk5jVxrl8qAx10M', 'uNAC9m5VOKsj7MEAs02'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.50a0000.10.raw.unpack, q1bUrWhd8NtMR4Tat2.csHigh entropy of concatenated method names: 'FtMrR4Tat', 'asVbu6B2r', 'BfjKHvjWV', 'r8MoiUGvh', 'dTGON4q2c', 'brXv00T5r', 'Dispose', 'q1bhUrWd8', 'zN8XoTN4OjYAicjyxg', 'ruXo51Q9ZfIq3o9q7i'
                    Source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.50a0000.10.raw.unpack, RLhDAEYwfjHvjWVq5a.csHigh entropy of concatenated method names: 'An354LdEp', 'zbMnKODFs', 'B6jqN3UrZ', 'QkT3JtuA7', 'rmgQyVns4', 'CtlpashST', 'Bh5RaqMVd', 'PW46FiDNh', 'W34ldUSmX', 'AVZwxu1MB'
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeFile created: C:\Users\user\AppData\Roaming\cYDnGbgU.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cYDnGbgU" /XML "C:\Users\user\AppData\Local\Temp\tmp38F1.tmp"

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: F#U0130YAT TEKL#U0130F#U0130-2400.exe PID: 6596, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: cYDnGbgU.exe PID: 2836, type: MEMORYSTR
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1756426531.00000000042A6000.00000004.00000800.00020000.00000000.sdmp, F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1756426531.0000000003981000.00000004.00000800.00020000.00000000.sdmp, F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4148813369.0000000002884000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 00000009.00000002.1796054239.0000000004292000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4145299206.0000000000435000.00000040.00000400.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4149137493.0000000003375000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeMemory allocated: A00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeMemory allocated: 2640000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeMemory allocated: 4640000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeMemory allocated: 8930000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeMemory allocated: 7350000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeMemory allocated: 8930000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeMemory allocated: E80000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeMemory allocated: 2820000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeMemory allocated: E80000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeMemory allocated: 2D60000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeMemory allocated: 2F50000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeMemory allocated: 2D60000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeMemory allocated: 8B60000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeMemory allocated: 9B60000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeMemory allocated: 8B60000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeMemory allocated: 18E0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeMemory allocated: 3310000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeMemory allocated: 3150000 memory reserve | memory write watch
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 599875Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 599668Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 599422Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 599211Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 599032Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 598875Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 598749Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 598640Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 598531Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 598416Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 598309Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 600000
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 599874
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 599734
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 599625
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 599516
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 599391
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 599281
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 599162
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 599031
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 598922
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 598797
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5977Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 362Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5941Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeWindow / User API: threadDelayed 4328Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeWindow / User API: threadDelayed 5356Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeWindow / User API: threadDelayed 2088
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeWindow / User API: threadDelayed 7730
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 6644Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4856Thread sleep count: 5977 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5428Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2892Thread sleep count: 362 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2916Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5780Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6984Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep count: 36 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -33204139332677172s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7192Thread sleep count: 4328 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -599875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -599668s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -599422s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -599211s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -599032s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -598875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -598749s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -598640s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -598531s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -598416s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -598309s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -99859s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7192Thread sleep count: 5356 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -99749s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -99640s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -99516s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -99391s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -99281s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -99171s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -99047s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -98928s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -98812s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -98688s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -98578s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -98453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -98342s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -98230s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -98125s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -98016s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -97906s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -97797s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -97687s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -97578s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -97469s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -97359s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -97249s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -179996s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -179890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -179780s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -179670s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -179562s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -179453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -179330s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -179218s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -179109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -178999s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -178890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -178781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -178671s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -178562s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -178453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -178342s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -178234s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -178125s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -178015s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -177906s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe TID: 7188Thread sleep time: -177796s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7172Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep count: 35 > 30
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -32281802128991695s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -600000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7544Thread sleep count: 2088 > 30
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -599874s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7544Thread sleep count: 7730 > 30
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -599734s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -599625s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -599516s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -599391s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -599281s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -599162s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -599031s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -598922s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -598797s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -100000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -99875s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -99766s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -99651s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -99532s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -99422s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -99282s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -99157s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -99032s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -98918s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -98813s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -98688s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -98563s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -98438s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -98313s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -98203s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -98094s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -97969s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -97860s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -97735s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -97610s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -97485s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -97360s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -97235s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -97110s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -96985s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -96860s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -96735s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -96610s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -96485s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -96360s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -96235s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -96086s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -179770s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -179641s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -179531s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -179422s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -179313s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -179188s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exe TID: 7536Thread sleep time: -179063s >= -30000s
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 599875Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 599668Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 599422Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 599211Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 599032Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 598875Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 598749Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 598640Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 598531Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 598416Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 598309Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 99859Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 99749Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 99640Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 99516Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 99391Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 99281Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 99171Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 99047Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 98928Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 98812Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 98688Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 98578Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 98453Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 98342Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 98230Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 98125Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 98016Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 97906Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 97797Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 97687Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 97578Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 97469Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 97359Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 97249Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 179996Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 179890Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 179780Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 179670Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 179562Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 179453Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 179330Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 179218Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 179109Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 178999Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 178890Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 178781Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 178671Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 178562Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 178453Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 178342Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 178234Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 178125Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 178015Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 177906Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeThread delayed: delay time: 177796Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 600000
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 599874
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 599734
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 599625
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 599516
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 599391
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 599281
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 599162
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 599031
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 598922
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 598797
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 100000
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 99875
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 99766
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 99651
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 99532
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 99422
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 99282
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 99157
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 99032
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 98918
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 98813
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 98688
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 98563
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 98438
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 98313
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 98203
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 98094
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 97969
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 97860
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 97735
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 97610
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 97485
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 97360
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 97235
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 97110
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 96985
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 96860
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 96735
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 96610
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 96485
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 96360
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 96235
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 96086
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 179770
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 179641
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 179531
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 179422
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 179313
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 179188
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeThread delayed: delay time: 179063
                    Source: cYDnGbgU.exe, 0000000D.00000002.4149137493.0000000003375000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                    Source: cYDnGbgU.exe, 0000000D.00000002.4149137493.0000000003375000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: cYDnGbgU.exe, 0000000D.00000002.4145299206.0000000000435000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: VMwareVBox
                    Source: F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4146072478.0000000000B1D000.00000004.00000020.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4146200410.00000000014B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess information queried: ProcessInformationJump to behavior

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeCode function: 8_2_027D7EE8 CheckRemoteDebuggerPresent,8_2_027D7EE8
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess queried: DebugPort
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe"
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\cYDnGbgU.exe"
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\cYDnGbgU.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeMemory written: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\cYDnGbgU.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cYDnGbgU" /XML "C:\Users\user\AppData\Local\Temp\tmp38F1.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeProcess created: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cYDnGbgU" /XML "C:\Users\user\AppData\Local\Temp\tmp4A37.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeProcess created: C:\Users\user\AppData\Roaming\cYDnGbgU.exe "C:\Users\user\AppData\Roaming\cYDnGbgU.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeQueries volume information: C:\Users\user\AppData\Roaming\cYDnGbgU.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeQueries volume information: C:\Users\user\AppData\Roaming\cYDnGbgU.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 8.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.cYDnGbgU.exe.4292550.9.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.cYDnGbgU.exe.42cdd70.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.39bcdb8.9.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.3981598.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.cYDnGbgU.exe.42cdd70.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.cYDnGbgU.exe.4292550.9.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.39bcdb8.9.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.3981598.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000D.00000002.4149137493.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4148813369.00000000028AE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.4149137493.00000000033B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.4149137493.000000000339E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4148813369.0000000002884000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1756426531.00000000042A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4148813369.00000000028C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.1796054239.0000000004292000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.4149137493.0000000003375000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4148813369.00000000028B6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1756426531.0000000003981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: F#U0130YAT TEKL#U0130F#U0130-2400.exe PID: 6596, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: F#U0130YAT TEKL#U0130F#U0130-2400.exe PID: 7048, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: cYDnGbgU.exe PID: 2836, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: cYDnGbgU.exe PID: 7444, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeFile opened: C:\FTP Navigator\Ftplist.txt
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                    Source: C:\Users\user\AppData\Roaming\cYDnGbgU.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: Yara matchFile source: 9.2.cYDnGbgU.exe.4292550.9.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.cYDnGbgU.exe.42cdd70.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.39bcdb8.9.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.3981598.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.cYDnGbgU.exe.42cdd70.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.cYDnGbgU.exe.4292550.9.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.39bcdb8.9.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.3981598.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000002.4148813369.0000000002884000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1756426531.00000000042A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.1796054239.0000000004292000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.4149137493.0000000003375000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1756426531.0000000003981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: F#U0130YAT TEKL#U0130F#U0130-2400.exe PID: 6596, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: F#U0130YAT TEKL#U0130F#U0130-2400.exe PID: 7048, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: cYDnGbgU.exe PID: 2836, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: cYDnGbgU.exe PID: 7444, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 8.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.cYDnGbgU.exe.4292550.9.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.cYDnGbgU.exe.42cdd70.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.39bcdb8.9.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.3981598.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.cYDnGbgU.exe.42cdd70.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.cYDnGbgU.exe.4292550.9.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.39bcdb8.9.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F#U0130YAT TEKL#U0130F#U0130-2400.exe.3981598.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000D.00000002.4149137493.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4148813369.00000000028AE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.4149137493.00000000033B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.4149137493.000000000339E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4148813369.0000000002884000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1756426531.00000000042A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4148813369.00000000028C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.1796054239.0000000004292000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.4149137493.0000000003375000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4148813369.00000000028B6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1756426531.0000000003981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: F#U0130YAT TEKL#U0130F#U0130-2400.exe PID: 6596, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: F#U0130YAT TEKL#U0130F#U0130-2400.exe PID: 7048, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: cYDnGbgU.exe PID: 2836, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: cYDnGbgU.exe PID: 7444, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Scheduled Task/Job
                    1
                    Scheduled Task/Job
                    111
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    21
                    Input Capture
                    34
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    Scheduled Task/Job
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    1
                    Query Registry
                    SMB/Windows Admin Shares1
                    Email Collection
                    2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                    Software Packing
                    NTDS631
                    Security Software Discovery
                    Distributed Component Object Model21
                    Input Capture
                    13
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets1
                    Process Discovery
                    SSH1
                    Clipboard Data
                    Fallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Masquerading
                    Cached Domain Credentials261
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items261
                    Virtualization/Sandbox Evasion
                    DCSync1
                    Application Window Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                    Process Injection
                    Proc Filesystem1
                    System Network Configuration Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1515067 Sample: F#U0130YAT TEKL#U0130F#U013... Startdate: 21/09/2024 Architecture: WINDOWS Score: 100 46 mail.usgrovemall.com 2->46 48 ip-api.com 2->48 50 api.ipify.org 2->50 58 Found malware configuration 2->58 60 Malicious sample detected (through community Yara rule) 2->60 62 Antivirus / Scanner detection for submitted sample 2->62 64 16 other signatures 2->64 8 F#U0130YAT TEKL#U0130F#U0130-2400.exe 7 2->8         started        12 cYDnGbgU.exe 5 2->12         started        signatures3 process4 file5 38 C:\Users\user\AppData\Roaming\cYDnGbgU.exe, PE32 8->38 dropped 40 C:\Users\...\cYDnGbgU.exe:Zone.Identifier, ASCII 8->40 dropped 42 C:\Users\user\AppData\Local\...\tmp38F1.tmp, XML 8->42 dropped 44 F#U0130YAT TEKL#U0...#U0130-2400.exe.log, ASCII 8->44 dropped 66 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->66 68 Adds a directory exclusion to Windows Defender 8->68 70 Injects a PE file into a foreign processes 8->70 14 F#U0130YAT TEKL#U0130F#U0130-2400.exe 15 2 8->14         started        18 powershell.exe 23 8->18         started        20 powershell.exe 22 8->20         started        22 schtasks.exe 1 8->22         started        72 Antivirus detection for dropped file 12->72 74 Multi AV Scanner detection for dropped file 12->74 76 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 12->76 78 2 other signatures 12->78 24 cYDnGbgU.exe 12->24         started        26 schtasks.exe 12->26         started        signatures6 process7 dnsIp8 52 ip-api.com 208.95.112.1, 49734, 49739, 80 TUT-ASUS United States 14->52 54 mail.usgrovemall.com 192.250.227.28, 49736, 49740, 587 CNSV-LLCUS United States 14->54 56 api.ipify.org 172.67.74.152, 443, 49733, 49738 CLOUDFLARENETUS United States 14->56 80 Installs a global keyboard hook 14->80 82 Loading BitLocker PowerShell Module 18->82 28 conhost.exe 18->28         started        30 WmiPrvSE.exe 18->30         started        32 conhost.exe 20->32         started        34 conhost.exe 22->34         started        84 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 24->84 86 Tries to steal Mail credentials (via file / registry access) 24->86 88 Tries to harvest and steal ftp login credentials 24->88 90 Tries to harvest and steal browser information (history, passwords, etc) 24->90 36 conhost.exe 26->36         started        signatures9 process10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    F#U0130YAT TEKL#U0130F#U0130-2400.exe79%ReversingLabsByteCode-MSIL.Trojan.SnakeKeylogger
                    F#U0130YAT TEKL#U0130F#U0130-2400.exe79%VirustotalBrowse
                    F#U0130YAT TEKL#U0130F#U0130-2400.exe100%AviraHEUR/AGEN.1308740
                    F#U0130YAT TEKL#U0130F#U0130-2400.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\cYDnGbgU.exe100%AviraHEUR/AGEN.1308740
                    C:\Users\user\AppData\Roaming\cYDnGbgU.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\cYDnGbgU.exe79%ReversingLabsByteCode-MSIL.Trojan.SnakeKeylogger
                    C:\Users\user\AppData\Roaming\cYDnGbgU.exe79%VirustotalBrowse
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    api.ipify.org0%VirustotalBrowse
                    ip-api.com0%VirustotalBrowse
                    mail.usgrovemall.com1%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://www.fontbureau.com0%URL Reputationsafe
                    http://www.fontbureau.com/designersG0%URL Reputationsafe
                    http://www.fontbureau.com/designers/?0%URL Reputationsafe
                    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                    https://account.dyn.com/0%URL Reputationsafe
                    http://www.fontbureau.com/designers?0%URL Reputationsafe
                    https://api.ipify.org/0%Avira URL Cloudsafe
                    http://mail.usgrovemall.com0%Avira URL Cloudsafe
                    http://www.apache.org/licenses/LICENSE-2.00%Avira URL Cloudsafe
                    http://www.tiro.com0%URL Reputationsafe
                    http://www.fontbureau.com/designers0%URL Reputationsafe
                    http://www.goodfont.co.kr0%URL Reputationsafe
                    http://www.carterandcone.coml0%URL Reputationsafe
                    http://www.sajatypeworks.com0%URL Reputationsafe
                    http://www.typography.netD0%URL Reputationsafe
                    http://www.fontbureau.com/designers/cabarga.htmlN0%URL Reputationsafe
                    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                    http://www.founder.com.cn/cn0%URL Reputationsafe
                    http://www.fontbureau.com/designers/frere-user.html0%URL Reputationsafe
                    http://r11.o.lencr.org0#0%Avira URL Cloudsafe
                    http://r11.i.lencr.org/00%Avira URL Cloudsafe
                    https://api.ipify.org/t0%Avira URL Cloudsafe
                    https://api.ipify.org/0%VirustotalBrowse
                    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                    http://www.apache.org/licenses/LICENSE-2.00%VirustotalBrowse
                    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                    http://www.fontbureau.com/designers80%URL Reputationsafe
                    http://www.fonts.com0%URL Reputationsafe
                    http://www.sandoll.co.kr0%URL Reputationsafe
                    http://www.urwpp.deDPlease0%URL Reputationsafe
                    http://www.zhongyicts.com.cn0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://www.sakkal.com0%URL Reputationsafe
                    https://api.ipify.org0%Avira URL Cloudsafe
                    http://mail.usgrovemall.com1%VirustotalBrowse
                    http://x1.c.lencr.org/00%Avira URL Cloudsafe
                    http://x1.i.lencr.org/00%Avira URL Cloudsafe
                    http://ip-api.com0%Avira URL Cloudsafe
                    http://x1.i.lencr.org/00%VirustotalBrowse
                    https://api.ipify.org0%VirustotalBrowse
                    http://r11.i.lencr.org/00%VirustotalBrowse
                    https://api.ipify.org/t0%VirustotalBrowse
                    http://ip-api.com/line/?fields=hosting0%Avira URL Cloudsafe
                    http://x1.c.lencr.org/00%VirustotalBrowse
                    http://ip-api.com/line/?fields=hosting1%VirustotalBrowse
                    http://ip-api.com0%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    api.ipify.org
                    172.67.74.152
                    truefalseunknown
                    ip-api.com
                    208.95.112.1
                    truetrueunknown
                    mail.usgrovemall.com
                    192.250.227.28
                    truetrueunknown
                    NameMaliciousAntivirus DetectionReputation
                    https://api.ipify.org/false
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://ip-api.com/line/?fields=hostingfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://mail.usgrovemall.comF#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4148813369.00000000028AE000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4149137493.000000000339E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.apache.org/licenses/LICENSE-2.0F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.comF#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersGF#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/?F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cn/bTheF#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://account.dyn.com/F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1756426531.00000000042A6000.00000004.00000800.00020000.00000000.sdmp, F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1756426531.0000000003981000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 00000009.00000002.1796054239.0000000004292000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4145299206.0000000000435000.00000040.00000400.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://r11.o.lencr.org0#F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4148813369.00000000028B6000.00000004.00000800.00020000.00000000.sdmp, F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4146072478.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4149137493.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4146200410.000000000148A000.00000004.00000020.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4160825037.0000000006D16000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designers?F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.tiro.comF#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersF#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.goodfont.co.krF#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.ipify.org/tF#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4148813369.0000000002821000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4149137493.0000000003311000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://r11.i.lencr.org/0F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4148813369.00000000028B6000.00000004.00000800.00020000.00000000.sdmp, F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4146072478.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4149137493.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4146200410.000000000148A000.00000004.00000020.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4160825037.0000000006D16000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.carterandcone.comlF#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sajatypeworks.comF#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.typography.netDF#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/cabarga.htmlNF#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cn/cTheF#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/staff/dennis.htmF#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.ipify.orgF#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1756426531.00000000042A6000.00000004.00000800.00020000.00000000.sdmp, F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1756426531.0000000003981000.00000004.00000800.00020000.00000000.sdmp, F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4148813369.0000000002821000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 00000009.00000002.1796054239.0000000004292000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4149137493.0000000003311000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4145299206.0000000000435000.00000040.00000400.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.founder.com.cn/cnF#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/frere-user.htmlF#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://x1.c.lencr.org/0F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4148813369.00000000028B6000.00000004.00000800.00020000.00000000.sdmp, F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4146072478.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4149137493.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4146200410.000000000148A000.00000004.00000020.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4146200410.00000000014B0000.00000004.00000020.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4160825037.0000000006D16000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://x1.i.lencr.org/0F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4148813369.00000000028B6000.00000004.00000800.00020000.00000000.sdmp, F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4146072478.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4149137493.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4146200410.000000000148A000.00000004.00000020.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4146200410.00000000014B0000.00000004.00000020.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4160825037.0000000006D16000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://ip-api.comF#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4148813369.0000000002871000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4149137493.0000000003361000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.galapagosdesign.com/DPleaseF#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers8F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fonts.comF#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sandoll.co.krF#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.urwpp.deDPleaseF#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.zhongyicts.com.cnF#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameF#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1755412576.00000000026CD000.00000004.00000800.00020000.00000000.sdmp, F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000008.00000002.4148813369.0000000002821000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 00000009.00000002.1794251648.0000000002FDD000.00000004.00000800.00020000.00000000.sdmp, cYDnGbgU.exe, 0000000D.00000002.4149137493.0000000003311000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sakkal.comF#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758140522.00000000066A2000.00000004.00000800.00020000.00000000.sdmp, F#U0130YAT TEKL#U0130F#U0130-2400.exe, 00000000.00000002.1758054376.0000000004F70000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    208.95.112.1
                    ip-api.comUnited States
                    53334TUT-ASUStrue
                    192.250.227.28
                    mail.usgrovemall.comUnited States
                    36454CNSV-LLCUStrue
                    172.67.74.152
                    api.ipify.orgUnited States
                    13335CLOUDFLARENETUSfalse
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1515067
                    Start date and time:2024-09-21 15:56:25 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 9m 44s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:18
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:F#U0130YAT TEKL#U0130F#U0130-2400.exe
                    renamed because original name is a hash value
                    Original Sample Name:FYAT TEKLF-2400.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@19/15@3/3
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 202
                    • Number of non-executed functions: 24
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size getting too big, too many NtCreateKey calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    TimeTypeDescription
                    09:57:19API Interceptor8032614x Sleep call for process: F#U0130YAT TEKL#U0130F#U0130-2400.exe modified
                    09:57:21API Interceptor35x Sleep call for process: powershell.exe modified
                    09:57:24API Interceptor5623277x Sleep call for process: cYDnGbgU.exe modified
                    14:57:21Task SchedulerRun new task: cYDnGbgU path: C:\Users\user\AppData\Roaming\cYDnGbgU.exe
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    208.95.112.1Invoice_0167562.exeGet hashmaliciousAgentTeslaBrowse
                    • ip-api.com/line/?fields=hosting
                    RFQ.vbsGet hashmaliciousPXRECVOWEIWOEI Stealer, PureLog StealerBrowse
                    • ip-api.com/line/?fields=hosting
                    printui.dllGet hashmaliciousUnknownBrowse
                    • ip-api.com/json/
                    Inquiry-Dubai.jsGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    • ip-api.com/line/?fields=hosting
                    ungziped_file.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                    • ip-api.com/line/?fields=hosting
                    VtkzI2DleKAWijQ.exeGet hashmaliciousAgentTeslaBrowse
                    • ip-api.com/line/?fields=hosting
                    Comprobante_98756.exeGet hashmaliciousAgentTeslaBrowse
                    • ip-api.com/line/?fields=hosting
                    comprobante_swift0000099.exeGet hashmaliciousAgentTeslaBrowse
                    • ip-api.com/line/?fields=hosting
                    FaturaHat#U0131rlatma.exeGet hashmaliciousAgentTeslaBrowse
                    • ip-api.com/line/?fields=hosting
                    Facturas de pago 003839,72011,030184.bat.exeGet hashmaliciousAgentTeslaBrowse
                    • ip-api.com/line/?fields=hosting
                    192.250.227.28quotation.docGet hashmaliciousUnknownBrowse
                    • goupbuy.com/aDJt8sVp3dLARdJlt.exe
                    SecuriteInfo.com.Exploit.CVE-2017-11882.123.30974.7732.rtfGet hashmaliciousAgentTeslaBrowse
                    • goupbuy.com/FaVp3Qd7etTM1bkon.exe
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    ip-api.comInvoice_0167562.exeGet hashmaliciousAgentTeslaBrowse
                    • 208.95.112.1
                    RFQ.vbsGet hashmaliciousPXRECVOWEIWOEI Stealer, PureLog StealerBrowse
                    • 208.95.112.1
                    printui.dllGet hashmaliciousUnknownBrowse
                    • 208.95.112.1
                    Inquiry-Dubai.jsGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    • 208.95.112.1
                    ungziped_file.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                    • 208.95.112.1
                    VtkzI2DleKAWijQ.exeGet hashmaliciousAgentTeslaBrowse
                    • 208.95.112.1
                    Comprobante_98756.exeGet hashmaliciousAgentTeslaBrowse
                    • 208.95.112.1
                    comprobante_swift0000099.exeGet hashmaliciousAgentTeslaBrowse
                    • 208.95.112.1
                    FaturaHat#U0131rlatma.exeGet hashmaliciousAgentTeslaBrowse
                    • 208.95.112.1
                    Facturas de pago 003839,72011,030184.bat.exeGet hashmaliciousAgentTeslaBrowse
                    • 208.95.112.1
                    mail.usgrovemall.comSNu4RXZpoS.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    • 192.250.227.28
                    e-DEKONT.exeGet hashmaliciousAgentTeslaBrowse
                    • 192.250.227.28
                    api.ipify.orgSPW AW25 - PO.010 SMS.exeGet hashmaliciousAgentTeslaBrowse
                    • 172.67.74.152
                    SPW AW25 - PO.010 SMS.exeGet hashmaliciousAgentTeslaBrowse
                    • 104.26.13.205
                    Invoice_0167562.exeGet hashmaliciousAgentTeslaBrowse
                    • 104.26.12.205
                    https://dionthompson.com/a/?ThiNTMtNGYyOS1hNDc1LTA2YWQzNmJkNDc5ZQAQAIGKzFxi43JDqxvx%2BxZRlAU%3DGet hashmaliciousHTMLPhisherBrowse
                    • 172.67.74.152
                    RFQ_PO_KMM7983972_ORDER_DETAILS.jsGet hashmaliciousAgentTesla, RedLineBrowse
                    • 104.26.12.205
                    MV ALIADO - S-REQ-19-00064.exeGet hashmaliciousAgentTeslaBrowse
                    • 104.26.13.205
                    ORDER_DOCUMENT_PO_GQB793987646902.TXT.MPEG.PNG.CMD.cmdGet hashmaliciousAgentTesla, DBatLoaderBrowse
                    • 104.26.12.205
                    CB5BlW3lBc.ps1Get hashmaliciousAsyncRATBrowse
                    • 104.26.13.205
                    yLIMUr0fMI.ps1Get hashmaliciousAsyncRATBrowse
                    • 172.67.74.152
                    nV2rYpqDsP.ps1Get hashmaliciousAsyncRAT, PureLog StealerBrowse
                    • 172.67.74.152
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    CNSV-LLCUShttps://sesworld.com.au:443/it/mount/Get hashmaliciousUnknownBrowse
                    • 192.250.235.25
                    https://hmchive.com/?hcv=bGFldGl0aWEucGF0cnktYmFsYXRAc3VlZHp1Y2tlcmdyb3VwLmNvbS0tLS1DYXJsb3MgR2FpdMOhbg==Get hashmaliciousUnknownBrowse
                    • 192.250.227.21
                    z27PEDIDOSDECOTIZACI__N___s__x__l__x___.exeGet hashmaliciousFormBookBrowse
                    • 192.250.231.28
                    https://sgsconsulting.com/Get hashmaliciousUnknownBrowse
                    • 192.250.227.23
                    https://sgsconsulting.com/Get hashmaliciousUnknownBrowse
                    • 192.250.227.23
                    http://linkplea.se/doarGet hashmaliciousUnknownBrowse
                    • 192.250.229.80
                    rfq_commercial_order_GMlist_for_Drumedis_tender_august_quater_2024.vbsGet hashmaliciousGuLoader, RemcosBrowse
                    • 192.250.234.170
                    https://kanomama.com/KFKFLDRFKLEK?///RG9tYWluXFVzZXJuYW1lQGRvbWFpbi5jb20=Get hashmaliciousHTMLPhisherBrowse
                    • 192.250.229.40
                    Novi upit #876567-AWB.exeGet hashmaliciousFormBookBrowse
                    • 192.250.227.27
                    z1PEDIDODECOMPRAURGENTE.exeGet hashmaliciousFormBookBrowse
                    • 192.250.231.28
                    TUT-ASUSInvoice_0167562.exeGet hashmaliciousAgentTeslaBrowse
                    • 208.95.112.1
                    RFQ.vbsGet hashmaliciousPXRECVOWEIWOEI Stealer, PureLog StealerBrowse
                    • 208.95.112.1
                    printui.dllGet hashmaliciousUnknownBrowse
                    • 208.95.112.1
                    Inquiry-Dubai.jsGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    • 208.95.112.1
                    ungziped_file.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                    • 208.95.112.1
                    VtkzI2DleKAWijQ.exeGet hashmaliciousAgentTeslaBrowse
                    • 208.95.112.1
                    Comprobante_98756.exeGet hashmaliciousAgentTeslaBrowse
                    • 208.95.112.1
                    comprobante_swift0000099.exeGet hashmaliciousAgentTeslaBrowse
                    • 208.95.112.1
                    FaturaHat#U0131rlatma.exeGet hashmaliciousAgentTeslaBrowse
                    • 208.95.112.1
                    Facturas de pago 003839,72011,030184.bat.exeGet hashmaliciousAgentTeslaBrowse
                    • 208.95.112.1
                    CLOUDFLARENETUS9B10a4bkpu.elfGet hashmaliciousMiraiBrowse
                    • 8.44.48.224
                    Order list.docx.docGet hashmaliciousRemcos, PureLog StealerBrowse
                    • 188.114.96.3
                    JaborSetup.exeGet hashmaliciousUnknownBrowse
                    • 104.17.25.14
                    KByiiYyiam.exeGet hashmaliciousLummaCBrowse
                    • 104.21.20.40
                    B0bHdMDGIN.exeGet hashmaliciousLummaCBrowse
                    • 104.21.20.40
                    AD3SI7tuzs.exeGet hashmaliciousLummaCBrowse
                    • 104.21.20.40
                    Meenakshi pdf lnk.lnkGet hashmaliciousUnknownBrowse
                    • 104.26.9.129
                    HkJrUQS8Oh.exeGet hashmaliciousLummaCBrowse
                    • 172.67.191.81
                    SecuriteInfo.com.Win32.DropperX-gen.16193.30488.exeGet hashmaliciousNetSupport RATBrowse
                    • 104.26.0.231
                    SecuriteInfo.com.Win32.CrypterX-gen.27124.19662.exeGet hashmaliciousAmadey, Clipboard Hijacker, Cryptbot, Go Injector, LummaC Stealer, PrivateLoader, PureLog StealerBrowse
                    • 172.67.74.161
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    3b5074b1b5d032e5620f69f9f700ff0elylhDVrnR3.exeGet hashmaliciousUnknownBrowse
                    • 172.67.74.152
                    Meenakshi pdf lnk.lnkGet hashmaliciousUnknownBrowse
                    • 172.67.74.152
                    lylhDVrnR3.exeGet hashmaliciousUnknownBrowse
                    • 172.67.74.152
                    SPW AW25 - PO.010 SMS.exeGet hashmaliciousAgentTeslaBrowse
                    • 172.67.74.152
                    SPW AW25 - PO.010 SMS.exeGet hashmaliciousAgentTeslaBrowse
                    • 172.67.74.152
                    file.exeGet hashmaliciousXWormBrowse
                    • 172.67.74.152
                    new shipment details.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 172.67.74.152
                    Order.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 172.67.74.152
                    details.exeGet hashmaliciousVIP KeyloggerBrowse
                    • 172.67.74.152
                    vSH3wxvvyb.zipGet hashmaliciousUnknownBrowse
                    • 172.67.74.152
                    No context
                    Process:C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1216
                    Entropy (8bit):5.34331486778365
                    Encrypted:false
                    SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                    MD5:1330C80CAAC9A0FB172F202485E9B1E8
                    SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                    SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                    SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                    Process:C:\Users\user\AppData\Roaming\cYDnGbgU.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1216
                    Entropy (8bit):5.34331486778365
                    Encrypted:false
                    SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                    MD5:1330C80CAAC9A0FB172F202485E9B1E8
                    SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                    SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                    SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                    Malicious:false
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):2232
                    Entropy (8bit):5.379401388151058
                    Encrypted:false
                    SSDEEP:48:fWSU4xymI4RfoUeW+gZ9tK8NPZHUxL7u1iMugeoPUyus:fLHxvIIwLgZ2KRHWLOugYs
                    MD5:4689846024D89F5AABDFA55655DD43FD
                    SHA1:5DD556AC947F43C65A1631A3EB5B03E423EEC5DD
                    SHA-256:83F556E6E19E0D478D948D3A10DE7B41E7CE8B50C3E7C120AD14E840B7F2BA28
                    SHA-512:EC405FBE30E70D7A9A65E8906A47B4D8690ED7F60915BCA064712CC0EEA33002F45A9C412A7D9198499A9CA39A14FCB05EC5CC7D3F2B80BA0D1FEF3107261D59
                    Malicious:false
                    Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe
                    File Type:XML 1.0 document, ASCII text
                    Category:dropped
                    Size (bytes):1574
                    Entropy (8bit):5.111806538271757
                    Encrypted:false
                    SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaWxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTjv
                    MD5:7BCE54627A8AA7FD77FF2C7B8135FE83
                    SHA1:36BEC3A706ECC1A5759579FCE9066EA80979F43B
                    SHA-256:84A5A106AA699E5D689A33BDC248B9021CEFC38F45A1CFC93EF618A17F676943
                    SHA-512:BE80466AFCFA2B66B286D701E444FAEDE148A5DA4244809BEF8FFDCD235E354DC3A55A372091CD6B6BD2EA8CD20C578E64A79BDDD9893E50DCCAE9B0D8CC03FD
                    Malicious:true
                    Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                    Process:C:\Users\user\AppData\Roaming\cYDnGbgU.exe
                    File Type:XML 1.0 document, ASCII text
                    Category:dropped
                    Size (bytes):1574
                    Entropy (8bit):5.111806538271757
                    Encrypted:false
                    SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaWxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTjv
                    MD5:7BCE54627A8AA7FD77FF2C7B8135FE83
                    SHA1:36BEC3A706ECC1A5759579FCE9066EA80979F43B
                    SHA-256:84A5A106AA699E5D689A33BDC248B9021CEFC38F45A1CFC93EF618A17F676943
                    SHA-512:BE80466AFCFA2B66B286D701E444FAEDE148A5DA4244809BEF8FFDCD235E354DC3A55A372091CD6B6BD2EA8CD20C578E64A79BDDD9893E50DCCAE9B0D8CC03FD
                    Malicious:false
                    Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                    Process:C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):712704
                    Entropy (8bit):7.835085800916468
                    Encrypted:false
                    SSDEEP:12288:+qc7hDhagHCN19W18xNOMlCoSwbqcbK0qHwrqrgbxx8QGa6NRkDcUL0soISh:shDhagq19lN/S2BZrqsx8QGIcU4ISh
                    MD5:2E6FC928822C8F9BB49E60B32E87F1AE
                    SHA1:ECCD6B4F0AD70C48757078F4870E1D45263771C8
                    SHA-256:28C597DFFA4E58341D159876A809955F673BAE6115787910D41080EF7BA2A6F0
                    SHA-512:0240BFB136C35668C1D71515A5549360F00488011FC24F23B68474082592E8CF4D1180E5653A4A0CA89F96F0E3C18950463C6336F224FF2E2DBBC114246AF344
                    Malicious:true
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: ReversingLabs, Detection: 79%
                    • Antivirus: Virustotal, Detection: 79%, Browse
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...gaXf..............0......@......v.... ........@.. ... ....................... ........@.................................$...O.......T............................................................................ ............... ..H............text....n... ....... .............. ..`.rsrc...T........ ..................@..@.reloc........... ..................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):26
                    Entropy (8bit):3.95006375643621
                    Encrypted:false
                    SSDEEP:3:ggPYV:rPYV
                    MD5:187F488E27DB4AF347237FE461A079AD
                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                    Malicious:true
                    Preview:[ZoneTransfer]....ZoneId=0
                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):7.835085800916468
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                    • Win32 Executable (generic) a (10002005/4) 49.75%
                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                    • Windows Screen Saver (13104/52) 0.07%
                    • Win16/32 Executable Delphi generic (2074/23) 0.01%
                    File name:F#U0130YAT TEKL#U0130F#U0130-2400.exe
                    File size:712'704 bytes
                    MD5:2e6fc928822c8f9bb49e60b32e87f1ae
                    SHA1:eccd6b4f0ad70c48757078f4870e1d45263771c8
                    SHA256:28c597dffa4e58341d159876a809955f673bae6115787910d41080ef7ba2a6f0
                    SHA512:0240bfb136c35668c1d71515a5549360f00488011fc24f23b68474082592e8cf4d1180e5653a4a0ca89f96f0e3c18950463c6336f224ff2e2dbbc114246af344
                    SSDEEP:12288:+qc7hDhagHCN19W18xNOMlCoSwbqcbK0qHwrqrgbxx8QGa6NRkDcUL0soISh:shDhagq19lN/S2BZrqsx8QGIcU4ISh
                    TLSH:11E4124230782B67F178C6F9AA29448653F6246B361DE3C90CCA71DE94E1F252B90F77
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...gaXf..............0......@......v.... ........@.. ... ....................... ........@................................
                    Icon Hash:abc7e6c6cbcac581
                    Entrypoint:0x4a8e76
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0x66586167 [Thu May 30 11:22:15 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                    Instruction
                    jmp dword ptr [00402000h]
                    inc ecx
                    add byte ptr [edx+00h], al
                    inc ebx
                    add byte ptr [eax+eax+45h], al
                    add byte ptr [esi+00h], al
                    inc edi
                    add byte ptr [eax+00h], cl
                    dec ecx
                    add byte ptr [edx+00h], cl
                    dec ebx
                    add byte ptr [eax+eax+4Dh], cl
                    add byte ptr [esi+00h], cl
                    dec edi
                    add byte ptr [eax+00h], dl
                    push ecx
                    add byte ptr [edx+00h], dl
                    push ebx
                    add byte ptr [eax+eax+55h], dl
                    add byte ptr [esi+00h], dl
                    push edi
                    add byte ptr [eax+00h], bl
                    pop ecx
                    add byte ptr [edx+00h], bl
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0xa8e240x4f.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xaa0000x1254.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xac0000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000xa6eb40xa800093707980401efaede63d9952f08ea0afFalse0.9382963634672619data7.934869907354881IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rsrc0xaa0000x12540x20001fbef0772612d11f6f9b88b58eefb440False0.431396484375data4.398228003046235IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0xac0000xc0x2000c8c0fd8643c39cd2d87c6ef6d2b36f51False0.0048828125data0.008814852707337104IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_ICON0xaa1000xc2bPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.8930979133226324
                    RT_GROUP_ICON0xaad3c0x14data1.05
                    RT_VERSION0xaad600x2f4data0.42724867724867727
                    RT_MANIFEST0xab0640x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                    DLLImport
                    mscoree.dll_CorExeMain
                    TimestampSource PortDest PortSource IPDest IP
                    Sep 21, 2024 15:57:22.740434885 CEST49733443192.168.2.4172.67.74.152
                    Sep 21, 2024 15:57:22.740521908 CEST44349733172.67.74.152192.168.2.4
                    Sep 21, 2024 15:57:22.740608931 CEST49733443192.168.2.4172.67.74.152
                    Sep 21, 2024 15:57:22.749685049 CEST49733443192.168.2.4172.67.74.152
                    Sep 21, 2024 15:57:22.749741077 CEST44349733172.67.74.152192.168.2.4
                    Sep 21, 2024 15:57:23.232501984 CEST44349733172.67.74.152192.168.2.4
                    Sep 21, 2024 15:57:23.232641935 CEST49733443192.168.2.4172.67.74.152
                    Sep 21, 2024 15:57:23.241302013 CEST49733443192.168.2.4172.67.74.152
                    Sep 21, 2024 15:57:23.241357088 CEST44349733172.67.74.152192.168.2.4
                    Sep 21, 2024 15:57:23.241873980 CEST44349733172.67.74.152192.168.2.4
                    Sep 21, 2024 15:57:23.317168951 CEST49733443192.168.2.4172.67.74.152
                    Sep 21, 2024 15:57:23.341828108 CEST49733443192.168.2.4172.67.74.152
                    Sep 21, 2024 15:57:23.383420944 CEST44349733172.67.74.152192.168.2.4
                    Sep 21, 2024 15:57:23.449592113 CEST44349733172.67.74.152192.168.2.4
                    Sep 21, 2024 15:57:23.449762106 CEST44349733172.67.74.152192.168.2.4
                    Sep 21, 2024 15:57:23.449835062 CEST49733443192.168.2.4172.67.74.152
                    Sep 21, 2024 15:57:23.456305981 CEST49733443192.168.2.4172.67.74.152
                    Sep 21, 2024 15:57:23.480547905 CEST4973480192.168.2.4208.95.112.1
                    Sep 21, 2024 15:57:23.485447884 CEST8049734208.95.112.1192.168.2.4
                    Sep 21, 2024 15:57:23.489270926 CEST4973480192.168.2.4208.95.112.1
                    Sep 21, 2024 15:57:23.489270926 CEST4973480192.168.2.4208.95.112.1
                    Sep 21, 2024 15:57:23.494173050 CEST8049734208.95.112.1192.168.2.4
                    Sep 21, 2024 15:57:23.955322981 CEST8049734208.95.112.1192.168.2.4
                    Sep 21, 2024 15:57:24.145328045 CEST4973480192.168.2.4208.95.112.1
                    Sep 21, 2024 15:57:25.246339083 CEST4973480192.168.2.4208.95.112.1
                    Sep 21, 2024 15:57:25.252038956 CEST8049734208.95.112.1192.168.2.4
                    Sep 21, 2024 15:57:25.252105951 CEST4973480192.168.2.4208.95.112.1
                    Sep 21, 2024 15:57:25.294770956 CEST49736587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:25.299691916 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:25.299761057 CEST49736587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:25.879782915 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:25.880290031 CEST49736587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:25.885160923 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:26.007129908 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:26.007496119 CEST49736587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:26.012378931 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:26.136888981 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:26.137396097 CEST49736587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:26.142292023 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:26.286726952 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:26.286751032 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:26.286761999 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:26.286778927 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:26.286827087 CEST49736587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:26.286952019 CEST49736587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:26.373460054 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:26.408019066 CEST49736587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:26.412990093 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:26.536032915 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:26.539416075 CEST49736587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:26.544233084 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:26.666455984 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:26.673094034 CEST49736587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:26.677926064 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:26.801260948 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:26.805762053 CEST49736587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:26.810591936 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:27.023859978 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:27.024092913 CEST49736587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:27.028958082 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:27.048090935 CEST49738443192.168.2.4172.67.74.152
                    Sep 21, 2024 15:57:27.048136950 CEST44349738172.67.74.152192.168.2.4
                    Sep 21, 2024 15:57:27.048208952 CEST49738443192.168.2.4172.67.74.152
                    Sep 21, 2024 15:57:27.051906109 CEST49738443192.168.2.4172.67.74.152
                    Sep 21, 2024 15:57:27.051920891 CEST44349738172.67.74.152192.168.2.4
                    Sep 21, 2024 15:57:27.151321888 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:27.151954889 CEST49736587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:27.156789064 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:27.293587923 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:27.293768883 CEST49736587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:27.298579931 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:27.491612911 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:27.492235899 CEST49736587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:27.492336988 CEST49736587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:27.492357016 CEST49736587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:27.492377043 CEST49736587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:27.497066021 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:27.497308016 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:27.497318983 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:27.497361898 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:27.692187071 CEST44349738172.67.74.152192.168.2.4
                    Sep 21, 2024 15:57:27.692272902 CEST49738443192.168.2.4172.67.74.152
                    Sep 21, 2024 15:57:27.694871902 CEST49738443192.168.2.4172.67.74.152
                    Sep 21, 2024 15:57:27.694886923 CEST44349738172.67.74.152192.168.2.4
                    Sep 21, 2024 15:57:27.695301056 CEST44349738172.67.74.152192.168.2.4
                    Sep 21, 2024 15:57:27.754662991 CEST49738443192.168.2.4172.67.74.152
                    Sep 21, 2024 15:57:27.759398937 CEST49738443192.168.2.4172.67.74.152
                    Sep 21, 2024 15:57:27.807398081 CEST44349738172.67.74.152192.168.2.4
                    Sep 21, 2024 15:57:27.875014067 CEST44349738172.67.74.152192.168.2.4
                    Sep 21, 2024 15:57:27.875078917 CEST44349738172.67.74.152192.168.2.4
                    Sep 21, 2024 15:57:27.875127077 CEST49738443192.168.2.4172.67.74.152
                    Sep 21, 2024 15:57:27.877837896 CEST49738443192.168.2.4172.67.74.152
                    Sep 21, 2024 15:57:27.880973101 CEST4973980192.168.2.4208.95.112.1
                    Sep 21, 2024 15:57:27.885963917 CEST8049739208.95.112.1192.168.2.4
                    Sep 21, 2024 15:57:27.886056900 CEST4973980192.168.2.4208.95.112.1
                    Sep 21, 2024 15:57:27.886166096 CEST4973980192.168.2.4208.95.112.1
                    Sep 21, 2024 15:57:27.891252041 CEST8049739208.95.112.1192.168.2.4
                    Sep 21, 2024 15:57:28.037429094 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:28.114053011 CEST49736587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:28.351192951 CEST8049739208.95.112.1192.168.2.4
                    Sep 21, 2024 15:57:28.395303011 CEST4973980192.168.2.4208.95.112.1
                    Sep 21, 2024 15:57:29.093331099 CEST4973980192.168.2.4208.95.112.1
                    Sep 21, 2024 15:57:29.093694925 CEST49740587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:29.098565102 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:29.098638058 CEST49740587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:29.098802090 CEST8049739208.95.112.1192.168.2.4
                    Sep 21, 2024 15:57:29.098866940 CEST4973980192.168.2.4208.95.112.1
                    Sep 21, 2024 15:57:29.649207115 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:29.649404049 CEST49740587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:29.654659033 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:29.782901049 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:29.787564993 CEST49740587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:29.792716980 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:29.921456099 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:29.922020912 CEST49740587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:29.927083015 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:30.078403950 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:30.078464031 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:30.078502893 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:30.078561068 CEST49740587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:30.129688025 CEST49740587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:30.170530081 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:30.179265976 CEST49740587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:30.184873104 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:30.313128948 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:30.317570925 CEST49740587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:30.322582960 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:30.450396061 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:30.450787067 CEST49740587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:30.455831051 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:31.614329100 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:31.614667892 CEST49740587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:31.615453959 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:31.615609884 CEST49740587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:31.616317987 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:31.616369009 CEST49740587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:31.617046118 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:31.617100954 CEST49740587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:31.832803965 CEST49740587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:31.856151104 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:31.857243061 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:32.126348019 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:32.127963066 CEST49740587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:32.135513067 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:32.263068914 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:32.263313055 CEST49740587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:32.268321037 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:32.401027918 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:32.401671886 CEST49740587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:32.406517982 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:32.534009933 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:32.535335064 CEST49740587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:32.535438061 CEST49740587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:32.535561085 CEST49740587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:32.535588980 CEST49740587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:57:32.540419102 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:32.540440083 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:32.540455103 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:32.540471077 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:33.058583021 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:57:33.119750977 CEST49740587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:59:05.271401882 CEST49736587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:59:05.276259899 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:59:05.400084019 CEST58749736192.250.227.28192.168.2.4
                    Sep 21, 2024 15:59:05.407438993 CEST49736587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:59:09.117269039 CEST49740587192.168.2.4192.250.227.28
                    Sep 21, 2024 15:59:09.122221947 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:59:09.251671076 CEST58749740192.250.227.28192.168.2.4
                    Sep 21, 2024 15:59:09.255641937 CEST49740587192.168.2.4192.250.227.28
                    TimestampSource PortDest PortSource IPDest IP
                    Sep 21, 2024 15:57:22.708718061 CEST6132653192.168.2.41.1.1.1
                    Sep 21, 2024 15:57:22.716032028 CEST53613261.1.1.1192.168.2.4
                    Sep 21, 2024 15:57:23.471462011 CEST4933253192.168.2.41.1.1.1
                    Sep 21, 2024 15:57:23.478257895 CEST53493321.1.1.1192.168.2.4
                    Sep 21, 2024 15:57:25.247270107 CEST4976353192.168.2.41.1.1.1
                    Sep 21, 2024 15:57:25.293940067 CEST53497631.1.1.1192.168.2.4
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Sep 21, 2024 15:57:22.708718061 CEST192.168.2.41.1.1.10xb6e9Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                    Sep 21, 2024 15:57:23.471462011 CEST192.168.2.41.1.1.10x7d31Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                    Sep 21, 2024 15:57:25.247270107 CEST192.168.2.41.1.1.10xd86Standard query (0)mail.usgrovemall.comA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Sep 21, 2024 15:57:22.716032028 CEST1.1.1.1192.168.2.40xb6e9No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                    Sep 21, 2024 15:57:22.716032028 CEST1.1.1.1192.168.2.40xb6e9No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                    Sep 21, 2024 15:57:22.716032028 CEST1.1.1.1192.168.2.40xb6e9No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                    Sep 21, 2024 15:57:23.478257895 CEST1.1.1.1192.168.2.40x7d31No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                    Sep 21, 2024 15:57:25.293940067 CEST1.1.1.1192.168.2.40xd86No error (0)mail.usgrovemall.com192.250.227.28A (IP address)IN (0x0001)false
                    • api.ipify.org
                    • ip-api.com
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.449734208.95.112.1807048C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe
                    TimestampBytes transferredDirectionData
                    Sep 21, 2024 15:57:23.489270926 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                    Host: ip-api.com
                    Connection: Keep-Alive
                    Sep 21, 2024 15:57:23.955322981 CEST175INHTTP/1.1 200 OK
                    Date: Sat, 21 Sep 2024 13:57:23 GMT
                    Content-Type: text/plain; charset=utf-8
                    Content-Length: 6
                    Access-Control-Allow-Origin: *
                    X-Ttl: 60
                    X-Rl: 44
                    Data Raw: 66 61 6c 73 65 0a
                    Data Ascii: false


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.449739208.95.112.1807444C:\Users\user\AppData\Roaming\cYDnGbgU.exe
                    TimestampBytes transferredDirectionData
                    Sep 21, 2024 15:57:27.886166096 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                    Host: ip-api.com
                    Connection: Keep-Alive
                    Sep 21, 2024 15:57:28.351192951 CEST175INHTTP/1.1 200 OK
                    Date: Sat, 21 Sep 2024 13:57:27 GMT
                    Content-Type: text/plain; charset=utf-8
                    Content-Length: 6
                    Access-Control-Allow-Origin: *
                    X-Ttl: 55
                    X-Rl: 43
                    Data Raw: 66 61 6c 73 65 0a
                    Data Ascii: false


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.449733172.67.74.1524437048C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe
                    TimestampBytes transferredDirectionData
                    2024-09-21 13:57:23 UTC155OUTGET / HTTP/1.1
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                    Host: api.ipify.org
                    Connection: Keep-Alive
                    2024-09-21 13:57:23 UTC211INHTTP/1.1 200 OK
                    Date: Sat, 21 Sep 2024 13:57:23 GMT
                    Content-Type: text/plain
                    Content-Length: 11
                    Connection: close
                    Vary: Origin
                    CF-Cache-Status: DYNAMIC
                    Server: cloudflare
                    CF-RAY: 8c6a90653cfc42ce-EWR
                    2024-09-21 13:57:23 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                    Data Ascii: 8.46.123.33


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.449738172.67.74.1524437444C:\Users\user\AppData\Roaming\cYDnGbgU.exe
                    TimestampBytes transferredDirectionData
                    2024-09-21 13:57:27 UTC155OUTGET / HTTP/1.1
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                    Host: api.ipify.org
                    Connection: Keep-Alive
                    2024-09-21 13:57:27 UTC211INHTTP/1.1 200 OK
                    Date: Sat, 21 Sep 2024 13:57:27 GMT
                    Content-Type: text/plain
                    Content-Length: 11
                    Connection: close
                    Vary: Origin
                    CF-Cache-Status: DYNAMIC
                    Server: cloudflare
                    CF-RAY: 8c6a9080cccb41d2-EWR
                    2024-09-21 13:57:27 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                    Data Ascii: 8.46.123.33


                    TimestampSource PortDest PortSource IPDest IPCommands
                    Sep 21, 2024 15:57:25.879782915 CEST58749736192.250.227.28192.168.2.4220-s1103.usc1.mysecurecloudhost.com ESMTP Exim 4.97.1 #2 Sat, 21 Sep 2024 13:57:25 +0000
                    220-We do not authorize the use of this system to transport unsolicited,
                    220 and/or bulk e-mail.
                    Sep 21, 2024 15:57:25.880290031 CEST49736587192.168.2.4192.250.227.28EHLO 571345
                    Sep 21, 2024 15:57:26.007129908 CEST58749736192.250.227.28192.168.2.4250-s1103.usc1.mysecurecloudhost.com Hello 571345 [8.46.123.33]
                    250-SIZE 104857600
                    250-8BITMIME
                    250-PIPELINING
                    250-PIPECONNECT
                    250-STARTTLS
                    250 HELP
                    Sep 21, 2024 15:57:26.007496119 CEST49736587192.168.2.4192.250.227.28STARTTLS
                    Sep 21, 2024 15:57:26.136888981 CEST58749736192.250.227.28192.168.2.4220 TLS go ahead
                    Sep 21, 2024 15:57:29.649207115 CEST58749740192.250.227.28192.168.2.4220-s1103.usc1.mysecurecloudhost.com ESMTP Exim 4.97.1 #2 Sat, 21 Sep 2024 13:57:29 +0000
                    220-We do not authorize the use of this system to transport unsolicited,
                    220 and/or bulk e-mail.
                    Sep 21, 2024 15:57:29.649404049 CEST49740587192.168.2.4192.250.227.28EHLO 571345
                    Sep 21, 2024 15:57:29.782901049 CEST58749740192.250.227.28192.168.2.4250-s1103.usc1.mysecurecloudhost.com Hello 571345 [8.46.123.33]
                    250-SIZE 104857600
                    250-8BITMIME
                    250-PIPELINING
                    250-PIPECONNECT
                    250-STARTTLS
                    250 HELP
                    Sep 21, 2024 15:57:29.787564993 CEST49740587192.168.2.4192.250.227.28STARTTLS
                    Sep 21, 2024 15:57:29.921456099 CEST58749740192.250.227.28192.168.2.4220 TLS go ahead

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:09:57:18
                    Start date:21/09/2024
                    Path:C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe"
                    Imagebase:0x210000
                    File size:712'704 bytes
                    MD5 hash:2E6FC928822C8F9BB49E60B32E87F1AE
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1756426531.00000000042A6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1756426531.00000000042A6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1756426531.0000000003981000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1756426531.0000000003981000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:true

                    Target ID:2
                    Start time:09:57:20
                    Start date:21/09/2024
                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe"
                    Imagebase:0xfa0000
                    File size:433'152 bytes
                    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:3
                    Start time:09:57:20
                    Start date:21/09/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff7699e0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:4
                    Start time:09:57:20
                    Start date:21/09/2024
                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\cYDnGbgU.exe"
                    Imagebase:0xfa0000
                    File size:433'152 bytes
                    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:5
                    Start time:09:57:20
                    Start date:21/09/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff7699e0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:6
                    Start time:09:57:20
                    Start date:21/09/2024
                    Path:C:\Windows\SysWOW64\schtasks.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cYDnGbgU" /XML "C:\Users\user\AppData\Local\Temp\tmp38F1.tmp"
                    Imagebase:0xe50000
                    File size:187'904 bytes
                    MD5 hash:48C2FE20575769DE916F48EF0676A965
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:7
                    Start time:09:57:20
                    Start date:21/09/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff7699e0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:8
                    Start time:09:57:21
                    Start date:21/09/2024
                    Path:C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\F#U0130YAT TEKL#U0130F#U0130-2400.exe"
                    Imagebase:0x590000
                    File size:712'704 bytes
                    MD5 hash:2E6FC928822C8F9BB49E60B32E87F1AE
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.4148813369.00000000028AE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.4148813369.0000000002884000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.4148813369.0000000002884000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.4148813369.00000000028C0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.4148813369.00000000028B6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:false

                    Target ID:9
                    Start time:09:57:21
                    Start date:21/09/2024
                    Path:C:\Users\user\AppData\Roaming\cYDnGbgU.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Roaming\cYDnGbgU.exe
                    Imagebase:0xba0000
                    File size:712'704 bytes
                    MD5 hash:2E6FC928822C8F9BB49E60B32E87F1AE
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.1796054239.0000000004292000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.1796054239.0000000004292000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Antivirus matches:
                    • Detection: 100%, Avira
                    • Detection: 100%, Joe Sandbox ML
                    • Detection: 79%, ReversingLabs
                    • Detection: 79%, Virustotal, Browse
                    Reputation:low
                    Has exited:true

                    Target ID:10
                    Start time:09:57:23
                    Start date:21/09/2024
                    Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Imagebase:0x7ff693ab0000
                    File size:496'640 bytes
                    MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                    Has elevated privileges:true
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:11
                    Start time:09:57:25
                    Start date:21/09/2024
                    Path:C:\Windows\SysWOW64\schtasks.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cYDnGbgU" /XML "C:\Users\user\AppData\Local\Temp\tmp4A37.tmp"
                    Imagebase:0xe50000
                    File size:187'904 bytes
                    MD5 hash:48C2FE20575769DE916F48EF0676A965
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:12
                    Start time:09:57:25
                    Start date:21/09/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff7699e0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:13
                    Start time:09:57:25
                    Start date:21/09/2024
                    Path:C:\Users\user\AppData\Roaming\cYDnGbgU.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\cYDnGbgU.exe"
                    Imagebase:0xef0000
                    File size:712'704 bytes
                    MD5 hash:2E6FC928822C8F9BB49E60B32E87F1AE
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000D.00000002.4149137493.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000D.00000002.4149137493.00000000033B0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000D.00000002.4149137493.000000000339E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000002.4149137493.0000000003375000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000D.00000002.4149137493.0000000003375000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:false

                    Reset < >

                      Execution Graph

                      Execution Coverage:11%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:202
                      Total number of Limit Nodes:15
                      execution_graph 29707 a0abf0 29708 a0abff 29707->29708 29711 a0ace8 29707->29711 29716 a0acd8 29707->29716 29712 a0acf9 29711->29712 29713 a0ad1c 29711->29713 29712->29713 29714 a0af20 GetModuleHandleW 29712->29714 29713->29708 29715 a0af4d 29714->29715 29715->29708 29717 a0ad1c 29716->29717 29719 a0acf9 29716->29719 29717->29708 29718 a0af20 GetModuleHandleW 29720 a0af4d 29718->29720 29719->29717 29719->29718 29720->29708 29741 a0d5c0 DuplicateHandle 29742 a0d656 29741->29742 29721 46d2bf8 29722 46d2d83 29721->29722 29723 46d2c1e 29721->29723 29723->29722 29726 46d3278 29723->29726 29729 46d3280 PostMessageW 29723->29729 29727 46d3280 PostMessageW 29726->29727 29728 46d32ec 29727->29728 29728->29723 29730 46d32ec 29729->29730 29730->29723 29687 a04668 29688 a04672 29687->29688 29690 a04758 29687->29690 29691 a0477d 29690->29691 29695 a04868 29691->29695 29699 a04858 29691->29699 29697 a0488f 29695->29697 29696 a0496c 29696->29696 29697->29696 29703 a044f0 29697->29703 29701 a0488f 29699->29701 29700 a0496c 29700->29700 29701->29700 29702 a044f0 CreateActCtxA 29701->29702 29702->29700 29704 a058f8 CreateActCtxA 29703->29704 29706 a059bb 29704->29706 29731 a0d378 29732 a0d3be GetCurrentProcess 29731->29732 29734 a0d410 GetCurrentThread 29732->29734 29735 a0d409 29732->29735 29736 a0d446 29734->29736 29737 a0d44d GetCurrentProcess 29734->29737 29735->29734 29736->29737 29738 a0d483 29737->29738 29739 a0d4ab GetCurrentThreadId 29738->29739 29740 a0d4dc 29739->29740 29743 6eaef83 29748 46d1a39 29743->29748 29768 46d1aa6 29743->29768 29789 46d1a48 29743->29789 29744 6eaef06 29749 46d1a62 29748->29749 29757 46d1a86 29749->29757 29809 46d1f3f 29749->29809 29814 46d23bd 29749->29814 29819 46d1e42 29749->29819 29824 46d2006 29749->29824 29829 46d2487 29749->29829 29834 46d2405 29749->29834 29839 46d266a 29749->29839 29844 46d2428 29749->29844 29849 46d202e 29749->29849 29854 46d254d 29749->29854 29859 46d1f72 29749->29859 29864 46d2072 29749->29864 29869 46d1ed3 29749->29869 29874 46d2230 29749->29874 29878 46d1ef5 29749->29878 29885 46d1e1f 29749->29885 29890 46d213f 29749->29890 29757->29744 29769 46d1a34 29768->29769 29771 46d1aa9 29768->29771 29770 46d1a86 29769->29770 29772 46d254d 2 API calls 29769->29772 29773 46d202e 2 API calls 29769->29773 29774 46d2428 2 API calls 29769->29774 29775 46d266a 2 API calls 29769->29775 29776 46d2405 2 API calls 29769->29776 29777 46d2487 2 API calls 29769->29777 29778 46d2006 2 API calls 29769->29778 29779 46d1e42 2 API calls 29769->29779 29780 46d23bd 2 API calls 29769->29780 29781 46d1f3f 2 API calls 29769->29781 29782 46d213f 2 API calls 29769->29782 29783 46d1e1f 2 API calls 29769->29783 29784 46d1ef5 2 API calls 29769->29784 29785 46d2230 2 API calls 29769->29785 29786 46d1ed3 2 API calls 29769->29786 29787 46d2072 2 API calls 29769->29787 29788 46d1f72 2 API calls 29769->29788 29770->29744 29771->29744 29772->29770 29773->29770 29774->29770 29775->29770 29776->29770 29777->29770 29778->29770 29779->29770 29780->29770 29781->29770 29782->29770 29783->29770 29784->29770 29785->29770 29786->29770 29787->29770 29788->29770 29790 46d1a62 29789->29790 29791 46d254d 2 API calls 29790->29791 29792 46d202e 2 API calls 29790->29792 29793 46d2428 2 API calls 29790->29793 29794 46d266a 2 API calls 29790->29794 29795 46d2405 2 API calls 29790->29795 29796 46d2487 2 API calls 29790->29796 29797 46d2006 2 API calls 29790->29797 29798 46d1a86 29790->29798 29799 46d1e42 2 API calls 29790->29799 29800 46d23bd 2 API calls 29790->29800 29801 46d1f3f 2 API calls 29790->29801 29802 46d213f 2 API calls 29790->29802 29803 46d1e1f 2 API calls 29790->29803 29804 46d1ef5 2 API calls 29790->29804 29805 46d2230 2 API calls 29790->29805 29806 46d1ed3 2 API calls 29790->29806 29807 46d2072 2 API calls 29790->29807 29808 46d1f72 2 API calls 29790->29808 29791->29798 29792->29798 29793->29798 29794->29798 29795->29798 29796->29798 29797->29798 29798->29744 29799->29798 29800->29798 29801->29798 29802->29798 29803->29798 29804->29798 29805->29798 29806->29798 29807->29798 29808->29798 29810 46d211e 29809->29810 29895 6eae778 29810->29895 29899 6eae780 29810->29899 29811 46d238e 29815 46d23c3 29814->29815 29903 6eae0fa 29815->29903 29907 6eae100 29815->29907 29816 46d23e9 29820 46d1e1f 29819->29820 29821 46d2940 29820->29821 29911 6eaea08 29820->29911 29915 6eae9fc 29820->29915 29821->29757 29825 46d274a 29824->29825 29919 6eae1a8 29825->29919 29923 6eae1b0 29825->29923 29826 46d2765 29831 46d1edc 29829->29831 29830 46d249d 29831->29830 29832 6eae778 WriteProcessMemory 29831->29832 29833 6eae780 WriteProcessMemory 29831->29833 29832->29831 29833->29831 29835 46d2554 29834->29835 29927 6eae868 29835->29927 29931 6eae870 29835->29931 29836 46d2576 29840 46d1edc 29839->29840 29841 46d249d 29840->29841 29842 6eae778 WriteProcessMemory 29840->29842 29843 6eae780 WriteProcessMemory 29840->29843 29842->29840 29843->29840 29845 46d23d4 29844->29845 29846 46d23e9 29844->29846 29847 6eae0fa ResumeThread 29845->29847 29848 6eae100 ResumeThread 29845->29848 29847->29846 29848->29846 29851 46d1edc 29849->29851 29850 46d249d 29851->29850 29852 6eae778 WriteProcessMemory 29851->29852 29853 6eae780 WriteProcessMemory 29851->29853 29852->29851 29853->29851 29855 46d2553 29854->29855 29856 46d2576 29855->29856 29857 6eae868 ReadProcessMemory 29855->29857 29858 6eae870 ReadProcessMemory 29855->29858 29857->29856 29858->29856 29861 46d1edc 29859->29861 29860 46d249d 29861->29860 29862 6eae778 WriteProcessMemory 29861->29862 29863 6eae780 WriteProcessMemory 29861->29863 29862->29861 29863->29861 29866 46d1edc 29864->29866 29865 46d249d 29866->29865 29867 6eae778 WriteProcessMemory 29866->29867 29868 6eae780 WriteProcessMemory 29866->29868 29867->29866 29868->29866 29870 46d1edc 29869->29870 29871 46d249d 29870->29871 29872 6eae778 WriteProcessMemory 29870->29872 29873 6eae780 WriteProcessMemory 29870->29873 29872->29870 29873->29870 29935 6eae6b9 29874->29935 29939 6eae6c0 29874->29939 29875 46d2251 29881 6eae778 WriteProcessMemory 29878->29881 29882 6eae780 WriteProcessMemory 29878->29882 29879 46d249d 29880 46d1edc 29880->29878 29880->29879 29883 6eae778 WriteProcessMemory 29880->29883 29884 6eae780 WriteProcessMemory 29880->29884 29881->29880 29882->29880 29883->29880 29884->29880 29886 46d1e29 29885->29886 29886->29885 29887 46d2940 29886->29887 29888 6eaea08 CreateProcessA 29886->29888 29889 6eae9fc CreateProcessA 29886->29889 29887->29757 29888->29886 29889->29886 29891 46d22c9 29890->29891 29893 6eae1a8 Wow64SetThreadContext 29891->29893 29894 6eae1b0 Wow64SetThreadContext 29891->29894 29892 46d22e4 29893->29892 29894->29892 29896 6eae780 WriteProcessMemory 29895->29896 29898 6eae81f 29896->29898 29898->29811 29900 6eae7c8 WriteProcessMemory 29899->29900 29902 6eae81f 29900->29902 29902->29811 29904 6eae100 ResumeThread 29903->29904 29906 6eae171 29904->29906 29906->29816 29908 6eae140 ResumeThread 29907->29908 29910 6eae171 29908->29910 29910->29816 29912 6eaea91 29911->29912 29912->29912 29913 6eaebf6 CreateProcessA 29912->29913 29914 6eaec53 29913->29914 29916 6eaea08 CreateProcessA 29915->29916 29918 6eaec53 29916->29918 29920 6eae1b0 Wow64SetThreadContext 29919->29920 29922 6eae23d 29920->29922 29922->29826 29924 6eae1f5 Wow64SetThreadContext 29923->29924 29926 6eae23d 29924->29926 29926->29826 29928 6eae870 ReadProcessMemory 29927->29928 29930 6eae8ff 29928->29930 29930->29836 29932 6eae8bb ReadProcessMemory 29931->29932 29934 6eae8ff 29932->29934 29934->29836 29936 6eae6c0 VirtualAllocEx 29935->29936 29938 6eae73d 29936->29938 29938->29875 29940 6eae700 VirtualAllocEx 29939->29940 29942 6eae73d 29940->29942 29942->29875
                      Memory Dump Source
                      • Source File: 00000000.00000002.1758962545.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ea0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e60378dd7c8f1b679d9b1dccf623617c7e62fdb9b8b652872018de9ca5e0605e
                      • Instruction ID: 148e56cc8a4b80694a6546e7fc59b69f36a5b9e713d2bee152337b7e2cbe665a
                      • Opcode Fuzzy Hash: e60378dd7c8f1b679d9b1dccf623617c7e62fdb9b8b652872018de9ca5e0605e
                      • Instruction Fuzzy Hash: 63B18C70D05328CFEB54DFA5C8447EDBBB6FB49304F00A069D519AB291EBB41A46CF45
                      Memory Dump Source
                      • Source File: 00000000.00000002.1758962545.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ea0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 69de55b8cac98430b9292faf0b9a7d3bcee88df7fe93e6a9ae6b71053fdde145
                      • Instruction ID: e62d532e06202f9fa1cce0264ecd3716dfc601b71f9d03a8e3ae0a79c517039d
                      • Opcode Fuzzy Hash: 69de55b8cac98430b9292faf0b9a7d3bcee88df7fe93e6a9ae6b71053fdde145
                      • Instruction Fuzzy Hash: 10A18C70D05328CFEB54DFA5C8447EEBBF6FB49304F00A169D519AB290EBB42A468F44
                      Memory Dump Source
                      • Source File: 00000000.00000002.1758962545.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ea0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 76cda1ad11875eba980c5a9d15a5f3edb945ccb20d1a3ea8dacf2dfe2de1adbe
                      • Instruction ID: ad1b6e263e76cb2efb3c392f351eddd2186caada1456a3a7a747018d7f6a89bc
                      • Opcode Fuzzy Hash: 76cda1ad11875eba980c5a9d15a5f3edb945ccb20d1a3ea8dacf2dfe2de1adbe
                      • Instruction Fuzzy Hash: E821DAB0D057189BEB58CFA6C9543DEBBB6AF89300F04D06AD409AA265DB741946CF90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 819 a0d369-a0d407 GetCurrentProcess 823 a0d410-a0d444 GetCurrentThread 819->823 824 a0d409-a0d40f 819->824 825 a0d446-a0d44c 823->825 826 a0d44d-a0d481 GetCurrentProcess 823->826 824->823 825->826 828 a0d483-a0d489 826->828 829 a0d48a-a0d4a5 call a0d548 826->829 828->829 832 a0d4ab-a0d4da GetCurrentThreadId 829->832 833 a0d4e3-a0d545 832->833 834 a0d4dc-a0d4e2 832->834 834->833
                      APIs
                      • GetCurrentProcess.KERNEL32 ref: 00A0D3F6
                      • GetCurrentThread.KERNEL32 ref: 00A0D433
                      • GetCurrentProcess.KERNEL32 ref: 00A0D470
                      • GetCurrentThreadId.KERNEL32 ref: 00A0D4C9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1751648759.0000000000A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_a00000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: Current$ProcessThread
                      • String ID:
                      • API String ID: 2063062207-0
                      • Opcode ID: 9304632af50579a3a4516d21a82b9e98c97ce14b3ed12f544b7ad4a07ff40cd2
                      • Instruction ID: b46fa91759ceca3ed48d6c8c35bbfa74cb7601afa2afb95862a32b19635054dc
                      • Opcode Fuzzy Hash: 9304632af50579a3a4516d21a82b9e98c97ce14b3ed12f544b7ad4a07ff40cd2
                      • Instruction Fuzzy Hash: 035166B09003498FDB18DFA9E548BDEBBF1FF88315F208459E00AA73A1D7756944CB25

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 841 a0d378-a0d407 GetCurrentProcess 845 a0d410-a0d444 GetCurrentThread 841->845 846 a0d409-a0d40f 841->846 847 a0d446-a0d44c 845->847 848 a0d44d-a0d481 GetCurrentProcess 845->848 846->845 847->848 850 a0d483-a0d489 848->850 851 a0d48a-a0d4a5 call a0d548 848->851 850->851 854 a0d4ab-a0d4da GetCurrentThreadId 851->854 855 a0d4e3-a0d545 854->855 856 a0d4dc-a0d4e2 854->856 856->855
                      APIs
                      • GetCurrentProcess.KERNEL32 ref: 00A0D3F6
                      • GetCurrentThread.KERNEL32 ref: 00A0D433
                      • GetCurrentProcess.KERNEL32 ref: 00A0D470
                      • GetCurrentThreadId.KERNEL32 ref: 00A0D4C9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1751648759.0000000000A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_a00000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: Current$ProcessThread
                      • String ID:
                      • API String ID: 2063062207-0
                      • Opcode ID: 892c902a72d7bbc10822fc9962b49a53c011e6e56502b5376fb5afcba7938772
                      • Instruction ID: 747d3efb97f1df9a23654ddeac50c87c9e0a3c618003fab427d9e357bf2ca02b
                      • Opcode Fuzzy Hash: 892c902a72d7bbc10822fc9962b49a53c011e6e56502b5376fb5afcba7938772
                      • Instruction Fuzzy Hash: 295145B09003498FDB58DFAAD548BDEBBF1FF88315F208459E009A73A0DB756984CB65

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 936 6eae9fc-6eaea9d 939 6eaea9f-6eaeaa9 936->939 940 6eaead6-6eaeaf6 936->940 939->940 941 6eaeaab-6eaeaad 939->941 945 6eaeaf8-6eaeb02 940->945 946 6eaeb2f-6eaeb5e 940->946 943 6eaeaaf-6eaeab9 941->943 944 6eaead0-6eaead3 941->944 947 6eaeabb 943->947 948 6eaeabd-6eaeacc 943->948 944->940 945->946 950 6eaeb04-6eaeb06 945->950 954 6eaeb60-6eaeb6a 946->954 955 6eaeb97-6eaec51 CreateProcessA 946->955 947->948 948->948 949 6eaeace 948->949 949->944 951 6eaeb08-6eaeb12 950->951 952 6eaeb29-6eaeb2c 950->952 956 6eaeb16-6eaeb25 951->956 957 6eaeb14 951->957 952->946 954->955 958 6eaeb6c-6eaeb6e 954->958 968 6eaec5a-6eaece0 955->968 969 6eaec53-6eaec59 955->969 956->956 959 6eaeb27 956->959 957->956 960 6eaeb70-6eaeb7a 958->960 961 6eaeb91-6eaeb94 958->961 959->952 963 6eaeb7e-6eaeb8d 960->963 964 6eaeb7c 960->964 961->955 963->963 965 6eaeb8f 963->965 964->963 965->961 979 6eaece2-6eaece6 968->979 980 6eaecf0-6eaecf4 968->980 969->968 979->980 981 6eaece8 979->981 982 6eaecf6-6eaecfa 980->982 983 6eaed04-6eaed08 980->983 981->980 982->983 984 6eaecfc 982->984 985 6eaed0a-6eaed0e 983->985 986 6eaed18-6eaed1c 983->986 984->983 985->986 989 6eaed10 985->989 987 6eaed2e-6eaed35 986->987 988 6eaed1e-6eaed24 986->988 990 6eaed4c 987->990 991 6eaed37-6eaed46 987->991 988->987 989->986 993 6eaed4d 990->993 991->990 993->993
                      APIs
                      • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 06EAEC3E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1758962545.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ea0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 0c17fb7ac4807cfef0e7aee1c927e43151265427f91f8fdfb8b27c893522d162
                      • Instruction ID: 7c87a44f9d13552a46bcd97099dc49af35a7ccaf4aa59ba40dab87167b3687c2
                      • Opcode Fuzzy Hash: 0c17fb7ac4807cfef0e7aee1c927e43151265427f91f8fdfb8b27c893522d162
                      • Instruction Fuzzy Hash: 06A17C71D003198FDB60CF68C845BEEBBB2BF48314F148569D809AB280DB74A985DF91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 994 6eaea08-6eaea9d 996 6eaea9f-6eaeaa9 994->996 997 6eaead6-6eaeaf6 994->997 996->997 998 6eaeaab-6eaeaad 996->998 1002 6eaeaf8-6eaeb02 997->1002 1003 6eaeb2f-6eaeb5e 997->1003 1000 6eaeaaf-6eaeab9 998->1000 1001 6eaead0-6eaead3 998->1001 1004 6eaeabb 1000->1004 1005 6eaeabd-6eaeacc 1000->1005 1001->997 1002->1003 1007 6eaeb04-6eaeb06 1002->1007 1011 6eaeb60-6eaeb6a 1003->1011 1012 6eaeb97-6eaec51 CreateProcessA 1003->1012 1004->1005 1005->1005 1006 6eaeace 1005->1006 1006->1001 1008 6eaeb08-6eaeb12 1007->1008 1009 6eaeb29-6eaeb2c 1007->1009 1013 6eaeb16-6eaeb25 1008->1013 1014 6eaeb14 1008->1014 1009->1003 1011->1012 1015 6eaeb6c-6eaeb6e 1011->1015 1025 6eaec5a-6eaece0 1012->1025 1026 6eaec53-6eaec59 1012->1026 1013->1013 1016 6eaeb27 1013->1016 1014->1013 1017 6eaeb70-6eaeb7a 1015->1017 1018 6eaeb91-6eaeb94 1015->1018 1016->1009 1020 6eaeb7e-6eaeb8d 1017->1020 1021 6eaeb7c 1017->1021 1018->1012 1020->1020 1022 6eaeb8f 1020->1022 1021->1020 1022->1018 1036 6eaece2-6eaece6 1025->1036 1037 6eaecf0-6eaecf4 1025->1037 1026->1025 1036->1037 1038 6eaece8 1036->1038 1039 6eaecf6-6eaecfa 1037->1039 1040 6eaed04-6eaed08 1037->1040 1038->1037 1039->1040 1041 6eaecfc 1039->1041 1042 6eaed0a-6eaed0e 1040->1042 1043 6eaed18-6eaed1c 1040->1043 1041->1040 1042->1043 1046 6eaed10 1042->1046 1044 6eaed2e-6eaed35 1043->1044 1045 6eaed1e-6eaed24 1043->1045 1047 6eaed4c 1044->1047 1048 6eaed37-6eaed46 1044->1048 1045->1044 1046->1043 1050 6eaed4d 1047->1050 1048->1047 1050->1050
                      APIs
                      • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 06EAEC3E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1758962545.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ea0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 1eb1ff174f614dcfb5a6533ccc6af02ef2aa8c8c2c91ef91db271613f063cd14
                      • Instruction ID: c59f2b692af0fe59af620cb8d6b9d646a4bdc03cdadc445af8e982616203da06
                      • Opcode Fuzzy Hash: 1eb1ff174f614dcfb5a6533ccc6af02ef2aa8c8c2c91ef91db271613f063cd14
                      • Instruction Fuzzy Hash: B2916A71D003198FEF64CF68C845BEEBBB2BF48314F148569D809AB284DB74A985DF91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1051 a0ace8-a0acf7 1052 a0ad23-a0ad27 1051->1052 1053 a0acf9-a0ad06 call a09314 1051->1053 1054 a0ad29-a0ad33 1052->1054 1055 a0ad3b-a0ad7c 1052->1055 1058 a0ad08 1053->1058 1059 a0ad1c 1053->1059 1054->1055 1062 a0ad89-a0ad97 1055->1062 1063 a0ad7e-a0ad86 1055->1063 1106 a0ad0e call a0af80 1058->1106 1107 a0ad0e call a0af70 1058->1107 1059->1052 1065 a0ad99-a0ad9e 1062->1065 1066 a0adbb-a0adbd 1062->1066 1063->1062 1064 a0ad14-a0ad16 1064->1059 1067 a0ae58-a0af18 1064->1067 1069 a0ada0-a0ada7 call a0a050 1065->1069 1070 a0ada9 1065->1070 1068 a0adc0-a0adc7 1066->1068 1101 a0af20-a0af4b GetModuleHandleW 1067->1101 1102 a0af1a-a0af1d 1067->1102 1073 a0add4-a0addb 1068->1073 1074 a0adc9-a0add1 1068->1074 1072 a0adab-a0adb9 1069->1072 1070->1072 1072->1068 1076 a0ade8-a0adf1 call a0a060 1073->1076 1077 a0addd-a0ade5 1073->1077 1074->1073 1082 a0adf3-a0adfb 1076->1082 1083 a0adfe-a0ae03 1076->1083 1077->1076 1082->1083 1084 a0ae21-a0ae25 1083->1084 1085 a0ae05-a0ae0c 1083->1085 1090 a0ae2b-a0ae2e 1084->1090 1085->1084 1087 a0ae0e-a0ae1e call a0a070 call a0a080 1085->1087 1087->1084 1092 a0ae30-a0ae4e 1090->1092 1093 a0ae51-a0ae57 1090->1093 1092->1093 1103 a0af54-a0af68 1101->1103 1104 a0af4d-a0af53 1101->1104 1102->1101 1104->1103 1106->1064 1107->1064
                      APIs
                      • GetModuleHandleW.KERNEL32(00000000), ref: 00A0AF3E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1751648759.0000000000A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_a00000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: 2ab484bd7a92b38c8309c980175fd990f7dfecbba10915a6c3dae9929f14e9d3
                      • Instruction ID: edfad6a86860e149c9ea49860d6d29600ca0b46a144d74c4c36ebcd433aa8b20
                      • Opcode Fuzzy Hash: 2ab484bd7a92b38c8309c980175fd990f7dfecbba10915a6c3dae9929f14e9d3
                      • Instruction Fuzzy Hash: 17815970A00B098FDB24DF29E45575ABBF1FF98300F10892DE48ADBA90DB35E945CB91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1216 a058ed-a059b9 CreateActCtxA 1218 a059c2-a05a1c 1216->1218 1219 a059bb-a059c1 1216->1219 1226 a05a2b-a05a2f 1218->1226 1227 a05a1e-a05a21 1218->1227 1219->1218 1228 a05a40 1226->1228 1229 a05a31-a05a3d 1226->1229 1227->1226 1230 a05a41 1228->1230 1229->1228 1230->1230
                      APIs
                      • CreateActCtxA.KERNEL32(?), ref: 00A059A9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1751648759.0000000000A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_a00000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: 2110f7b768799cfe47df89506c105c0c96cee5ddf83b9b93164ecd11a28813d4
                      • Instruction ID: 2a00f38640efd1fbe86e4d645a65cfc3b08d0f29e33759c6c11561a627e15060
                      • Opcode Fuzzy Hash: 2110f7b768799cfe47df89506c105c0c96cee5ddf83b9b93164ecd11a28813d4
                      • Instruction Fuzzy Hash: 6641E2B0C0071DCEDB24CFA9C8846DEBBB2BF49314F20815AD409AB251DB756A46CF51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1232 a044f0-a059b9 CreateActCtxA 1235 a059c2-a05a1c 1232->1235 1236 a059bb-a059c1 1232->1236 1243 a05a2b-a05a2f 1235->1243 1244 a05a1e-a05a21 1235->1244 1236->1235 1245 a05a40 1243->1245 1246 a05a31-a05a3d 1243->1246 1244->1243 1247 a05a41 1245->1247 1246->1245 1247->1247
                      APIs
                      • CreateActCtxA.KERNEL32(?), ref: 00A059A9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1751648759.0000000000A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_a00000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: a6db632d385d5a35273338454bb5d5da01b4785d125049aeba7047883bb8212c
                      • Instruction ID: 7ccc8cb5159629d8682cffaad161d4c0cf7eb285675030acbd8fc526ff441c66
                      • Opcode Fuzzy Hash: a6db632d385d5a35273338454bb5d5da01b4785d125049aeba7047883bb8212c
                      • Instruction Fuzzy Hash: 454101B0C0071DCBDB24CFA9C844B9EBBF1BF48304F20806AD409AB251DB756945CF91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1249 6eae778-6eae7ce 1252 6eae7de-6eae81d WriteProcessMemory 1249->1252 1253 6eae7d0-6eae7dc 1249->1253 1255 6eae81f-6eae825 1252->1255 1256 6eae826-6eae856 1252->1256 1253->1252 1255->1256
                      APIs
                      • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 06EAE810
                      Memory Dump Source
                      • Source File: 00000000.00000002.1758962545.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ea0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID:
                      • API String ID: 3559483778-0
                      • Opcode ID: 8e5b7ccdc82f2ad1abfaee8575bdc0d0f616af458d7e2c95e3503aa3bde97d5f
                      • Instruction ID: 2e29091d1055d3b8648284e8dcc09fae1308e88eaca484f05161a1328fe2661d
                      • Opcode Fuzzy Hash: 8e5b7ccdc82f2ad1abfaee8575bdc0d0f616af458d7e2c95e3503aa3bde97d5f
                      • Instruction Fuzzy Hash: BD2137759003499FCB10DFA9C885BDEBBF5FF48320F148429E558A7241C778A944DBA1
                      APIs
                      • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 06EAE810
                      Memory Dump Source
                      • Source File: 00000000.00000002.1758962545.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ea0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID:
                      • API String ID: 3559483778-0
                      • Opcode ID: 48834c063fa717f71609d04f543a1ab8aed29865e501e8e87703dfba4f091bcc
                      • Instruction ID: a0d099be814fd0d82a4de2068b338bfce6a29162149fda3e022d79b0ac49aa10
                      • Opcode Fuzzy Hash: 48834c063fa717f71609d04f543a1ab8aed29865e501e8e87703dfba4f091bcc
                      • Instruction Fuzzy Hash: 552146B1D003099FCB10CFAAC885BDEBBF5FF48310F108429E918A7240C778A944DBA0
                      APIs
                      • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 06EAE8F0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1758962545.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ea0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: MemoryProcessRead
                      • String ID:
                      • API String ID: 1726664587-0
                      • Opcode ID: e07e4cf81a9968885bd4e6b93b9098621c162788478982fc03c93a40207a3bd7
                      • Instruction ID: d5f21f158afe595d6085328e6ea5b95c86827ed0d7fcd8578f275b191818dd30
                      • Opcode Fuzzy Hash: e07e4cf81a9968885bd4e6b93b9098621c162788478982fc03c93a40207a3bd7
                      • Instruction Fuzzy Hash: AE2124B18003499FCB10DFAAC885AEEFBF5FF48320F548429E559A7241C778A954DBA1
                      APIs
                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06EAE22E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1758962545.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ea0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: ContextThreadWow64
                      • String ID:
                      • API String ID: 983334009-0
                      • Opcode ID: da8dc87c1f93568986863c50aa76ac7ab8e7347c861a0046db56d9315fd0ee43
                      • Instruction ID: 1d896f06d43fa8cbdb382e42984d069629595201984c6c14eb21946965ce77ef
                      • Opcode Fuzzy Hash: da8dc87c1f93568986863c50aa76ac7ab8e7347c861a0046db56d9315fd0ee43
                      • Instruction Fuzzy Hash: 9F214971D003099FDB10DFAAC885BEEBBF4EF48324F548429D459A7280CB78A945CFA5
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00A0D647
                      Memory Dump Source
                      • Source File: 00000000.00000002.1751648759.0000000000A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_a00000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 0889b9a91328f6a9b6538b1ddeb57b0c5d4d91256543be61a59a2b7a4e562fc4
                      • Instruction ID: e0bf942266731de70d2f4bcc0ec248772b927264f32fb72febfe5b9eca2eb7c6
                      • Opcode Fuzzy Hash: 0889b9a91328f6a9b6538b1ddeb57b0c5d4d91256543be61a59a2b7a4e562fc4
                      • Instruction Fuzzy Hash: BC2114B5800248DFDB10CFAAD884AEEBFF5FB48320F14841AE958A3350C379A944DF65
                      APIs
                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06EAE22E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1758962545.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ea0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: ContextThreadWow64
                      • String ID:
                      • API String ID: 983334009-0
                      • Opcode ID: 3e5df1b90e9196617665f9bb255ab239a74c276472dcc27554bbc81221c19eda
                      • Instruction ID: 06b681af5995be933f34dc2f30efb4939dbde2712971bd06b9a0b29e3bc8bcf7
                      • Opcode Fuzzy Hash: 3e5df1b90e9196617665f9bb255ab239a74c276472dcc27554bbc81221c19eda
                      • Instruction Fuzzy Hash: 43214971D003098FDB10DFAAC4857EEBBF4EF48324F148429D459A7240CB78A945CFA5
                      APIs
                      • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 06EAE8F0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1758962545.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ea0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: MemoryProcessRead
                      • String ID:
                      • API String ID: 1726664587-0
                      • Opcode ID: 91686977ed22c7364cd748aa954841f8a7301cc7680519f5ba0c6511e7dc4fa5
                      • Instruction ID: a3be1acfa393ce1ee2cff64edafdc54455c0b4f3c94a6422002dd5ea19f412fa
                      • Opcode Fuzzy Hash: 91686977ed22c7364cd748aa954841f8a7301cc7680519f5ba0c6511e7dc4fa5
                      • Instruction Fuzzy Hash: E42128B1D003599FCB10DFAAC845AEEFBF5FF48310F508429E559A7240C738A954DBA5
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00A0D647
                      Memory Dump Source
                      • Source File: 00000000.00000002.1751648759.0000000000A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_a00000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: b3b7610ed3c4216ec35253957f706c69ed97305ab5751c2e3c6aa64ec488acaf
                      • Instruction ID: 18be752e784c465ad3d96b5fb350792275efd2a0a3be86863ada1a3fb9cb0638
                      • Opcode Fuzzy Hash: b3b7610ed3c4216ec35253957f706c69ed97305ab5751c2e3c6aa64ec488acaf
                      • Instruction Fuzzy Hash: A121E4B59002089FDB10CF9AD884ADEBFF4FB48310F14841AE918A3350D375A954CF65
                      APIs
                      • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 06EAE72E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1758962545.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ea0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 032444fad2e9abf8c1e14a91f76e7869accc59c55d5592a44d3a4ca8a3d187a8
                      • Instruction ID: 620bd556a6c0394521c04b0cf6579d568a245cccaff0bbf71ac64996033d1893
                      • Opcode Fuzzy Hash: 032444fad2e9abf8c1e14a91f76e7869accc59c55d5592a44d3a4ca8a3d187a8
                      • Instruction Fuzzy Hash: 3D1156758003499FCB10DFAAC845AEFBFF5EF88320F248819E519A7250CB35A950DFA1
                      APIs
                      • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 06EAE72E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1758962545.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ea0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 341cd0c08645599d0ab3b0e0c3b71718c00cf10eef1312095c29727dad5d8146
                      • Instruction ID: 457128b04ca33a94cb99c00e1182256631cec3b62a3cdcd2332a7c9aa2d6dc42
                      • Opcode Fuzzy Hash: 341cd0c08645599d0ab3b0e0c3b71718c00cf10eef1312095c29727dad5d8146
                      • Instruction Fuzzy Hash: 091167718003099FCB10DFAAC845AEFBFF5EF88320F248819E519A7250CB35A950DFA1
                      APIs
                      • ResumeThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,F0476404), ref: 06EAE162
                      Memory Dump Source
                      • Source File: 00000000.00000002.1758962545.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ea0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: ResumeThread
                      • String ID:
                      • API String ID: 947044025-0
                      • Opcode ID: c9738fbc6f1febc34b28a3e630e79e6338159473660f41a691561fe6d8436bfe
                      • Instruction ID: e9105055ff8f44355b31f76c5fdb3f542e6e00d4e170c11e8faf2f5198bc28b2
                      • Opcode Fuzzy Hash: c9738fbc6f1febc34b28a3e630e79e6338159473660f41a691561fe6d8436bfe
                      • Instruction Fuzzy Hash: EB1158B19003488BCB10DFAAC8457EFFBF5EB88324F208419D419A7240CA39A944CFA5
                      APIs
                      • ResumeThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,F0476404), ref: 06EAE162
                      Memory Dump Source
                      • Source File: 00000000.00000002.1758962545.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ea0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: ResumeThread
                      • String ID:
                      • API String ID: 947044025-0
                      • Opcode ID: 9d4ec885e4685dfdaf9a56c6ca25b1e98007b739833579ba923cf3dcc8a63c8b
                      • Instruction ID: 6131bde97d749ee2102f8f45aa2d8c625ec105ef167ebcca2f3e08829f4e6921
                      • Opcode Fuzzy Hash: 9d4ec885e4685dfdaf9a56c6ca25b1e98007b739833579ba923cf3dcc8a63c8b
                      • Instruction Fuzzy Hash: 101125B19003498BDB10DFAAC8457AEFBF5EB89324F248419D519A7240CA79A944CFA5
                      APIs
                      • PostMessageW.USER32(?,?,?,?), ref: 046D32DD
                      Memory Dump Source
                      • Source File: 00000000.00000002.1757450679.00000000046D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 046D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_46d0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: MessagePost
                      • String ID:
                      • API String ID: 410705778-0
                      • Opcode ID: 517c4ecf4e17f8accdc2c0d19a5620a2974ba07dddbe97cc926c5a9b6618a20b
                      • Instruction ID: d18ce2ba0b700b57d6b8a0154dcc30bd2cbce7a1255159f0f87ac85694663723
                      • Opcode Fuzzy Hash: 517c4ecf4e17f8accdc2c0d19a5620a2974ba07dddbe97cc926c5a9b6618a20b
                      • Instruction Fuzzy Hash: BE1125B58003499FDB10DF9AD885BDEBFF8FB48310F108459E918A3200D375A584CFA1
                      APIs
                      • GetModuleHandleW.KERNEL32(00000000), ref: 00A0AF3E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1751648759.0000000000A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_a00000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: 299020677156573c55a91a8a30d2ba51cf1e3dcceea6fd411399947d366e47b9
                      • Instruction ID: 7a028dfe8d861b03695286add5c31f5ab5a361b7a7781d35f47a3cf81af769e0
                      • Opcode Fuzzy Hash: 299020677156573c55a91a8a30d2ba51cf1e3dcceea6fd411399947d366e47b9
                      • Instruction Fuzzy Hash: 7F1122B6C003498FCB10CF9AD444ADEFBF4EF88324F10841AD519A7250C779A545CFA1
                      APIs
                      • PostMessageW.USER32(?,?,?,?), ref: 046D32DD
                      Memory Dump Source
                      • Source File: 00000000.00000002.1757450679.00000000046D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 046D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_46d0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: MessagePost
                      • String ID:
                      • API String ID: 410705778-0
                      • Opcode ID: 84c1fb020ed76c515ace9143234290ff8704f8fdbb61059d195cbbaba6858e0b
                      • Instruction ID: 1cf8cc2b7d8890f77b7dc7abced9fcb0242580e8d8b42d4761936ec4408acaa2
                      • Opcode Fuzzy Hash: 84c1fb020ed76c515ace9143234290ff8704f8fdbb61059d195cbbaba6858e0b
                      • Instruction Fuzzy Hash: 7911F2B58003499FDB10DF9AD885BDEBBF8EB48320F108419D918A3200D375A984CFA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1750953169.00000000009AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009AD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_9ad000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3b76640d795dce29e90dfb6e58d02de248fa18aabb3a51e9bb9c27831c3b2a50
                      • Instruction ID: 940364cf6e9b22463b8b7ef95555018292ece15f146df62d003cf6be4ac3dbb5
                      • Opcode Fuzzy Hash: 3b76640d795dce29e90dfb6e58d02de248fa18aabb3a51e9bb9c27831c3b2a50
                      • Instruction Fuzzy Hash: 2E2103B1505200DFDB05DF14D8C4B2ABFA5FB99310F24CA69ED1A0B646C33AD816CBA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1751123206.00000000009BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009BD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_9bd000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c9437e066ea4db02dae8ebcbcb086f5152ae6841f6e50269d46ead26ad8efe69
                      • Instruction ID: a5b04473dfc098dccc419f085e69a28b9e4caa58ad40d18d23f1181f148986ec
                      • Opcode Fuzzy Hash: c9437e066ea4db02dae8ebcbcb086f5152ae6841f6e50269d46ead26ad8efe69
                      • Instruction Fuzzy Hash: 7621F275605204DFDB14EF14DAC4B66BBA5FB98324F24C96DD80A4B386D33AD807CA61
                      Memory Dump Source
                      • Source File: 00000000.00000002.1751123206.00000000009BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009BD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_9bd000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9a5e2802fd8ce6b50addf3cb655e44e625cd814f3bbf2f3df60b93198bfe538e
                      • Instruction ID: 8ef120c44fcf32564df1b8a02dad60c37da90554e0d3fbd65bee2fd5c13416da
                      • Opcode Fuzzy Hash: 9a5e2802fd8ce6b50addf3cb655e44e625cd814f3bbf2f3df60b93198bfe538e
                      • Instruction Fuzzy Hash: 84214971604344EFDB05DF14CAC0B25BBA5FB84324F20CA6DD81A4B381D33AD806CB61
                      Memory Dump Source
                      • Source File: 00000000.00000002.1750953169.00000000009AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009AD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_9ad000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3660dfe55a9ec3abc1fd528c2c7e977daaa4d4c3ae68719e8bb560421c7628fc
                      • Instruction ID: 63a44e2f1e7031b76095a096f5277eb200cc42f4896772c65d6629e2a45f7f34
                      • Opcode Fuzzy Hash: 3660dfe55a9ec3abc1fd528c2c7e977daaa4d4c3ae68719e8bb560421c7628fc
                      • Instruction Fuzzy Hash: 3821B176504240DFDB06CF50D9C4B16BF72FB85314F24C5A9DD4A0B656C33AD82ACBA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1751123206.00000000009BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009BD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_9bd000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5bc96cb8dbab4a459d35c79ebbe5ba2a9dff6c5f08df11ade35b896c854f64ae
                      • Instruction ID: 3f495b8b9a04e5757cf5d160ba467a47df855b6c473b1ed0b75f2011500739af
                      • Opcode Fuzzy Hash: 5bc96cb8dbab4a459d35c79ebbe5ba2a9dff6c5f08df11ade35b896c854f64ae
                      • Instruction Fuzzy Hash: 3F11BB75904284DFDB02CF10C6C4B15BBB2FB84324F24C6ADD8494B296C33AD80ACB61
                      Memory Dump Source
                      • Source File: 00000000.00000002.1751123206.00000000009BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009BD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_9bd000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5bc96cb8dbab4a459d35c79ebbe5ba2a9dff6c5f08df11ade35b896c854f64ae
                      • Instruction ID: c62573a3cce9026dbff21067dc3b4edcd42036f25a870d6890e734c1db2c146d
                      • Opcode Fuzzy Hash: 5bc96cb8dbab4a459d35c79ebbe5ba2a9dff6c5f08df11ade35b896c854f64ae
                      • Instruction Fuzzy Hash: 5C11BE75504280CFCB11DF14D6C4B15BB62FB44324F24C6A9D8094B656C33AD80ACB61
                      Memory Dump Source
                      • Source File: 00000000.00000002.1750953169.00000000009AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009AD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_9ad000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b0b8b94e1564ed1a0005ad30accca50e7b5d8744496e1641ecbcc918b243b1aa
                      • Instruction ID: ec5fb478147b46b6a730c38d8ceef3e69f1172a4067eaebf5c1a1d11a0d3e531
                      • Opcode Fuzzy Hash: b0b8b94e1564ed1a0005ad30accca50e7b5d8744496e1641ecbcc918b243b1aa
                      • Instruction Fuzzy Hash: F801DBB10063449AE7145A15DCC4B67FFECDF52325F18C91AED0E0A686C7799840C6F1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1750953169.00000000009AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009AD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_9ad000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5e2d1a41caf980550fc070031702f076ea2180a0ef651c5a4bc63706bb3d56e4
                      • Instruction ID: c54539b50204e539b59871c716ab4e5db2e612d36879acbe1672c23db9b91325
                      • Opcode Fuzzy Hash: 5e2d1a41caf980550fc070031702f076ea2180a0ef651c5a4bc63706bb3d56e4
                      • Instruction Fuzzy Hash: D3F0F6720053449EE7248A06CC88B63FFECEF52735F18C45AED090B686C379AC40CAB1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1757450679.00000000046D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 046D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_46d0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ccbf392e47a86853f6a63347c5d51f7cceb1b3f80c171eed2693bc3d223113af
                      • Instruction ID: 4a66f2a542c961d30823b9209e84e922e7aa440765421c1a0cd3756f100d2afd
                      • Opcode Fuzzy Hash: ccbf392e47a86853f6a63347c5d51f7cceb1b3f80c171eed2693bc3d223113af
                      • Instruction Fuzzy Hash: 63D19A70B01704AFEB29EB75C550B6EB7F6AF89300F24446DE1469BB91EB35E801CB52
                      Memory Dump Source
                      • Source File: 00000000.00000002.1758962545.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ea0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cdce98201baf81d9938dd2d0044ad036dc1771a94049298f37aed2f3dbe9656c
                      • Instruction ID: 47ad21f9fac7da26ec5199ca90374ec58130e19ec9de3e15364979b1f889435b
                      • Opcode Fuzzy Hash: cdce98201baf81d9938dd2d0044ad036dc1771a94049298f37aed2f3dbe9656c
                      • Instruction Fuzzy Hash: 1EE1F774E002198FDB54DFA9C5909AEFBF2FF89304F249169D814AB35AD730A941DFA0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1758962545.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ea0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e6fa17a460e8dd16ccc63fa56f87c3512e2250491d7a11e2bac26edbc03573e8
                      • Instruction ID: 26df4e391d1eb1ab125e03fa9fe87c83b5b8dc8fa085c7e9a09b3ac750a5f059
                      • Opcode Fuzzy Hash: e6fa17a460e8dd16ccc63fa56f87c3512e2250491d7a11e2bac26edbc03573e8
                      • Instruction Fuzzy Hash: 47E1D974E002198FDB54DFA9C5909AEFBF2FF89304F249169D814AB359D731A942CFA0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1758962545.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ea0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: eb29ea66d0c415f9793cd18c4a2a0b2e3ec0a23d2c61638188344bbd1b28958f
                      • Instruction ID: 712a51c5ce16f29961aae78313085bde7da9cfb71ef360e3837a93c459266204
                      • Opcode Fuzzy Hash: eb29ea66d0c415f9793cd18c4a2a0b2e3ec0a23d2c61638188344bbd1b28958f
                      • Instruction Fuzzy Hash: 3BE1F8B4E002198FCB54DFA9C5909AEFBB2FF89304F249169D814AB359D731A941CFA0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1758962545.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ea0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 25255dad8490eee4a7f34a7019fd197ccfc014db6548b2660207e6fc965fc411
                      • Instruction ID: ec22d70d4cef875b8a75dae6f80ea264d8807200d38135c22209f8e73f6ab159
                      • Opcode Fuzzy Hash: 25255dad8490eee4a7f34a7019fd197ccfc014db6548b2660207e6fc965fc411
                      • Instruction Fuzzy Hash: 35E1E974E002198FCB14DFA9C9909AEFBF2FF89304F249169D815AB759D730A941CFA0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1758962545.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ea0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 76d591f79245da79fc0f60d9c7e611c757e792abd38059a6e4927546d88f1e41
                      • Instruction ID: aa3c0ca45da1e404159b79baa756a6f15bcc2e89bc57b20d71441d727a4864a2
                      • Opcode Fuzzy Hash: 76d591f79245da79fc0f60d9c7e611c757e792abd38059a6e4927546d88f1e41
                      • Instruction Fuzzy Hash: A3E1EA74E002598FDB54DFA9C590AAEFBF2FF89304F249169D814AB359D730A941CFA0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1758962545.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ea0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: aab8f57bc8c57d57bb604978fd0c1804f1af11e0257af36e07ef15b1b75cb80c
                      • Instruction ID: 249b6a2b45a82d38df689f305eb4f4541ff0e6b44b633f878655ea5fd5b7f47c
                      • Opcode Fuzzy Hash: aab8f57bc8c57d57bb604978fd0c1804f1af11e0257af36e07ef15b1b75cb80c
                      • Instruction Fuzzy Hash: 73D10735D1075A8ACB10FF64D95069EB7B1FF96300F21DB9AE4093B264EB706AC4CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1751648759.0000000000A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_a00000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 49aa26b8ef6af99ca72452912b943b5b9c4e0358230db3a869751d4b491408cb
                      • Instruction ID: 07d82c3412094c9756b8162798e4e1418d6d2d1966490e93fe4b3f4750f3d442
                      • Opcode Fuzzy Hash: 49aa26b8ef6af99ca72452912b943b5b9c4e0358230db3a869751d4b491408cb
                      • Instruction Fuzzy Hash: DAA14E32E002198FCF19DFB4D94459EBBB2FF85300B15857AE805BB2A5DB71E956CB80
                      Memory Dump Source
                      • Source File: 00000000.00000002.1758962545.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ea0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 54161bee2f3cee6c7accbc642645c674abfb0b7f14840281401fbb8da7e41326
                      • Instruction ID: c1f7e203e6073ce930170804db7653b3107f32d7c4489e1a9e348bdfd5697a46
                      • Opcode Fuzzy Hash: 54161bee2f3cee6c7accbc642645c674abfb0b7f14840281401fbb8da7e41326
                      • Instruction Fuzzy Hash: 1ED1E635D1075A8ACB10FF64D95069EB7B1FF96300F20DB9AE5093B254EB706AC4CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1758962545.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ea0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ba149eed3eb7474a566039f629879e03aea2e86cbdee4a0de5359dd9ad74bb57
                      • Instruction ID: abbafca1321707dd32653ef61d7d291d911dc0990740ae1821e0bd4f2054e28a
                      • Opcode Fuzzy Hash: ba149eed3eb7474a566039f629879e03aea2e86cbdee4a0de5359dd9ad74bb57
                      • Instruction Fuzzy Hash: 5D81EF70C06718DFEB54DFAAD8847EDBBF2EB49304F10912AD419AB265DB742986CF40
                      Memory Dump Source
                      • Source File: 00000000.00000002.1758962545.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ea0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5834d11f9d7c730b8b1c2bfcd1086e7ad37caf9ddb0ca245b8d2393c4648e6d4
                      • Instruction ID: ad4ad32f6b5c44619891a8be4f9098d345df862ac5001cc4be8afde9b499419c
                      • Opcode Fuzzy Hash: 5834d11f9d7c730b8b1c2bfcd1086e7ad37caf9ddb0ca245b8d2393c4648e6d4
                      • Instruction Fuzzy Hash: 6081FE70C05718DFEB54DFAAC8847EDBBF2EB49304F10912AD419AB265DB742986CF40
                      Memory Dump Source
                      • Source File: 00000000.00000002.1758962545.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ea0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c9c7d61660208f84bf9e401c025a7d8b39c67fd66a29aa8c9359876ea5b78469
                      • Instruction ID: 3f6e3f787f4df3483c50f64bd4cd8c5c5205d7a44b59778ebb88f579c103f1f8
                      • Opcode Fuzzy Hash: c9c7d61660208f84bf9e401c025a7d8b39c67fd66a29aa8c9359876ea5b78469
                      • Instruction Fuzzy Hash: FB511D74E002198FCB14DF69CA905AEFBF2FF89304F149169D418AB355D731A942CFA0

                      Execution Graph

                      Execution Coverage:11.5%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:1.9%
                      Total number of Nodes:159
                      Total number of Limit Nodes:14
                      execution_graph 39406 67f242b 39408 67f2430 GetModuleHandleW 39406->39408 39409 67f24a5 39408->39409 39410 27d0848 39412 27d084e 39410->39412 39411 27d091b 39412->39411 39414 27d1390 39412->39414 39415 27d1376 39414->39415 39417 27d1393 39414->39417 39415->39412 39416 27d14c6 39416->39412 39417->39416 39421 27d8d80 39417->39421 39426 67f0448 39417->39426 39432 67f0438 39417->39432 39422 27d8d8a 39421->39422 39423 27d8da4 39422->39423 39438 686f6e0 39422->39438 39442 686f6d1 39422->39442 39423->39417 39427 67f045a 39426->39427 39430 67f050b 39427->39430 39446 67f02d4 39427->39446 39429 67f04d1 39451 67f02f4 39429->39451 39430->39417 39433 67f043c 39432->39433 39434 67f02d4 2 API calls 39433->39434 39436 67f050b 39433->39436 39435 67f04d1 39434->39435 39437 67f02f4 KiUserCallbackDispatcher 39435->39437 39436->39417 39437->39436 39440 686f6e2 39438->39440 39439 686f90a 39439->39423 39440->39439 39441 686fd28 GlobalMemoryStatusEx GlobalMemoryStatusEx 39440->39441 39441->39440 39444 686f6d4 39442->39444 39443 686f90a 39443->39423 39444->39443 39445 686fd28 GlobalMemoryStatusEx GlobalMemoryStatusEx 39444->39445 39445->39444 39447 67f02df 39446->39447 39455 67f1608 39447->39455 39466 67f15f3 39447->39466 39448 67f06aa 39448->39429 39452 67f02ff 39451->39452 39454 67f82cb 39452->39454 39502 67f6d6c 39452->39502 39454->39430 39456 67f160e 39455->39456 39477 67f0a34 39456->39477 39459 67f16b6 39462 67f16e2 39459->39462 39485 67f0a44 39459->39485 39464 67f0a34 GetModuleHandleW 39464->39459 39467 67f1608 39466->39467 39468 67f0a34 GetModuleHandleW 39467->39468 39469 67f169a 39468->39469 39475 67f1ae7 GetModuleHandleW 39469->39475 39476 67f0a34 GetModuleHandleW 39469->39476 39470 67f16b6 39471 67f0a44 GetModuleHandleW 39470->39471 39473 67f16e2 39470->39473 39472 67f1726 39471->39472 39472->39473 39474 67f34cf CreateWindowExW 39472->39474 39474->39473 39475->39470 39476->39470 39479 67f0a3f 39477->39479 39478 67f169a 39478->39464 39481 67f1ae7 39478->39481 39479->39478 39494 67f2157 39479->39494 39482 67f1ae8 39481->39482 39483 67f1af3 39482->39483 39484 67f2157 GetModuleHandleW 39482->39484 39483->39459 39484->39483 39487 67f2430 GetModuleHandleW 39485->39487 39488 67f1726 39487->39488 39488->39462 39489 67f34cf 39488->39489 39490 67f34d2 CreateWindowExW 39489->39490 39491 67f349c 39489->39491 39493 67f35fc 39490->39493 39491->39462 39493->39493 39495 67f2162 39494->39495 39496 67f0a44 GetModuleHandleW 39495->39496 39497 67f2282 39496->39497 39498 67f0a44 GetModuleHandleW 39497->39498 39501 67f22fc 39497->39501 39499 67f22d0 39498->39499 39500 67f0a44 GetModuleHandleW 39499->39500 39499->39501 39500->39501 39501->39478 39503 67f82e0 KiUserCallbackDispatcher 39502->39503 39505 67f834e 39503->39505 39505->39452 39506 27d7ee8 39507 27d7eec CheckRemoteDebuggerPresent 39506->39507 39509 27d7f6e 39507->39509 39384 67f8b58 39385 67f8b63 39384->39385 39387 67f8b73 39385->39387 39388 67f6eb4 39385->39388 39389 67f8ba8 OleInitialize 39388->39389 39390 67f8c0c 39389->39390 39390->39387 39391 67f7118 DuplicateHandle 39392 67f71ae 39391->39392 39510 67fa7e8 39511 67fa82c SetWindowsHookExA 39510->39511 39513 67fa872 39511->39513 39514 dfd044 39515 dfd05c 39514->39515 39516 dfd0b6 39515->39516 39523 67f1da4 39515->39523 39527 67f1db4 39515->39527 39535 67f37bf 39515->39535 39539 67f7d1f 39515->39539 39547 67f3690 39515->39547 39553 67f3683 39515->39553 39524 67f1daf 39523->39524 39559 67f1ddc 39524->39559 39526 67f37c7 39526->39516 39528 67f1dbf 39527->39528 39529 67f7d81 39528->39529 39531 67f7d71 39528->39531 39573 67f6d14 39529->39573 39565 67f7ea8 39531->39565 39569 67f7e98 39531->39569 39532 67f7d7f 39536 67f37c0 39535->39536 39537 67f1ddc GetModuleHandleW 39536->39537 39538 67f37c7 39537->39538 39538->39516 39540 67f7d20 39539->39540 39541 67f7d81 39540->39541 39544 67f7d71 39540->39544 39542 67f6d14 2 API calls 39541->39542 39543 67f7d7f 39542->39543 39545 67f7ea8 2 API calls 39544->39545 39546 67f7e98 2 API calls 39544->39546 39545->39543 39546->39543 39548 67f36b6 39547->39548 39549 67f1da4 GetModuleHandleW 39548->39549 39550 67f36c2 39549->39550 39551 67f1db4 2 API calls 39550->39551 39552 67f36d7 39551->39552 39552->39516 39554 67f36b6 39553->39554 39555 67f1da4 GetModuleHandleW 39554->39555 39556 67f36c2 39555->39556 39557 67f1db4 2 API calls 39556->39557 39558 67f36d7 39557->39558 39558->39516 39560 67f1de7 39559->39560 39561 67f0a34 GetModuleHandleW 39560->39561 39562 67f3829 39561->39562 39563 67f0a44 GetModuleHandleW 39562->39563 39564 67f3897 39562->39564 39563->39564 39566 67f7eb6 39565->39566 39567 67f6d14 2 API calls 39566->39567 39568 67f7f92 39566->39568 39567->39566 39568->39532 39571 67f7ea8 39569->39571 39570 67f6d14 2 API calls 39570->39571 39571->39570 39572 67f7f92 39571->39572 39572->39532 39574 67f6d1f 39573->39574 39575 67f8042 CallWindowProcW 39574->39575 39576 67f7ff1 39574->39576 39575->39576 39576->39532 39577 67f8321 KiUserCallbackDispatcher 39576->39577 39578 67f834e 39577->39578 39578->39532 39393 67f8cf0 39394 67f8d4a OleGetClipboard 39393->39394 39395 67f8d8a 39394->39395 39396 67f6ed0 39397 67f6f16 GetCurrentProcess 39396->39397 39399 67f6f68 GetCurrentThread 39397->39399 39400 67f6f61 39397->39400 39401 67f6f9e 39399->39401 39402 67f6fa5 GetCurrentProcess 39399->39402 39400->39399 39401->39402 39403 67f6fdb 39402->39403 39404 67f7003 GetCurrentThreadId 39403->39404 39405 67f7034 39404->39405

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 126 6863130-6863151 127 6863153-6863156 126->127 128 68638f7-68638fa 127->128 129 686315c-686317b 127->129 130 6863920-6863922 128->130 131 68638fc-686391b 128->131 139 6863194-686319e 129->139 140 686317d-6863180 129->140 132 6863924 130->132 133 6863929-686392c 130->133 131->130 132->133 133->127 136 6863932-686393b 133->136 143 68631a4-68631b3 139->143 140->139 141 6863182-6863192 140->141 141->143 252 68631b5 call 6863950 143->252 253 68631b5 call 6863948 143->253 145 68631ba-68631bf 146 68631c1-68631c7 145->146 147 68631cc-68634a9 145->147 146->136 168 68634af-686355e 147->168 169 68638e9-68638f6 147->169 178 6863587 168->178 179 6863560-6863585 168->179 181 6863590-68635a3 178->181 179->181 183 68638d0-68638dc 181->183 184 68635a9-68635cb 181->184 183->168 185 68638e2 183->185 184->183 187 68635d1-68635db 184->187 185->169 187->183 188 68635e1-68635ec 187->188 188->183 189 68635f2-68636c8 188->189 201 68636d6-6863706 189->201 202 68636ca-68636cc 189->202 206 6863714-6863720 201->206 207 6863708-686370a 201->207 202->201 208 6863722-6863726 206->208 209 6863780-6863784 206->209 207->206 208->209 212 6863728-6863752 208->212 210 68638c1-68638ca 209->210 211 686378a-68637c6 209->211 210->183 210->189 223 68637d4-68637e2 211->223 224 68637c8-68637ca 211->224 219 6863754-6863756 212->219 220 6863760-686377d 212->220 219->220 220->209 226 68637e4-68637ef 223->226 227 68637f9-6863804 223->227 224->223 226->227 230 68637f1 226->230 231 6863806-686380c 227->231 232 686381c-686382d 227->232 230->227 233 6863810-6863812 231->233 234 686380e 231->234 236 6863845-6863851 232->236 237 686382f-6863835 232->237 233->232 234->232 241 6863853-6863859 236->241 242 6863869-68638ba 236->242 238 6863837 237->238 239 6863839-686383b 237->239 238->236 239->236 243 686385d-686385f 241->243 244 686385b 241->244 242->210 243->242 244->242 252->145 253->145
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID: $dq$$dq$$dq$$dq$$dq$$dq
                      • API String ID: 0-2331353128
                      • Opcode ID: c41916001f4439a8bb791a2ae5b779b7e8d02c9a377d168bd37bf483a00b0c11
                      • Instruction ID: ca0336e0c2c16762c29448e93b99c46fd4db0917cf43a8ec10964f766d0b3c90
                      • Opcode Fuzzy Hash: c41916001f4439a8bb791a2ae5b779b7e8d02c9a377d168bd37bf483a00b0c11
                      • Instruction Fuzzy Hash: D2321E31E10619CFCB54EF79C95459DB7B2FFC9300F6096A9D409A7264EF30AA85CB90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 801 686e458-686e471 805 686e473-686e476 801->805 806 686e486-686e489 805->806 807 686e478 805->807 808 686e4a6-686e4a9 806->808 809 686e48b-686e494 806->809 814 686e47e-686e481 807->814 812 686e4b3-686e4b6 808->812 813 686e4ab-686e4b0 808->813 810 686e6fc-686e70a 809->810 811 686e49a-686e4a1 809->811 821 686e712 810->821 822 686e70c-686e711 810->822 811->808 815 686e4b8-686e4d4 812->815 816 686e4d9-686e4dc 812->816 813->812 814->806 815->816 818 686e6e2-686e6eb 816->818 819 686e4e2-686e4e4 816->819 818->809 820 686e6f1-686e6fb 818->820 824 686e4e6 819->824 825 686e4eb-686e4ee 819->825 826 686e714-686e719 821->826 827 686e71a-686e733 821->827 822->821 824->825 825->805 828 686e4f0-686e5a4 825->828 826->827 830 686e735-686e738 827->830 951 686e6a0-686e6c4 828->951 952 686e5aa-686e5b5 828->952 832 686e751-686e754 830->832 833 686e73a-686e74c 830->833 834 686e756-686e759 832->834 835 686e75e-686e761 832->835 833->832 834->835 836 686e763-686e766 835->836 837 686e778-686e77b 835->837 840 686e925-686e936 836->840 841 686e76c-686e773 836->841 842 686e783-686e786 837->842 843 686e77d-686e77e 837->843 855 686e93e 840->855 856 686e938 840->856 841->837 845 686e792-686e795 842->845 846 686e788-686e78b 842->846 843->842 848 686e797-686e79d 845->848 849 686e7af-686e7b2 845->849 846->836 847 686e78d 846->847 847->845 848->840 852 686e7a3-686e7aa 848->852 853 686e7b4-686e7c3 849->853 854 686e7ca-686e7cd 849->854 852->849 865 686e804-686e805 853->865 866 686e7c5 853->866 859 686e7f0-686e7f3 854->859 860 686e7cf-686e7eb 854->860 857 686e946-686e95e 855->857 858 686e940-686e945 855->858 856->855 861 686e960-686e963 857->861 858->857 859->846 862 686e7f5-686e7f8 859->862 860->859 867 686e965-686e97e 861->867 868 686e983-686e986 861->868 870 686e7ff-686e802 862->870 871 686e7fa-686e7fc 862->871 874 686e80a-686e80d 865->874 866->854 867->868 872 686e99d-686e9a0 868->872 873 686e988-686e996 868->873 870->865 870->874 871->870 880 686e9a2-686e9ac 872->880 881 686e9ad-686e9b0 872->881 893 686e9e5-686ea12 873->893 894 686e998 873->894 878 686e837-686e83a 874->878 879 686e80f-686e832 874->879 884 686e863-686e866 878->884 885 686e83c-686e858 878->885 879->878 882 686e9b2-686e9ce 881->882 883 686e9d3-686e9d5 881->883 882->883 888 686e9d7 883->888 889 686e9dc-686e9df 883->889 891 686e887-686e88a 884->891 892 686e868-686e882 884->892 885->843 916 686e85e 885->916 888->889 889->861 889->893 897 686e89c-686e89f 891->897 898 686e88c-686e897 891->898 892->891 929 686eba1-686eba6 893->929 930 686ea18-686ea3a 893->930 894->872 902 686e8b2-686e8b5 897->902 903 686e8a1-686e8a7 897->903 898->897 910 686e8b7-686e8dd 902->910 911 686e8e2-686e8e5 902->911 903->848 909 686e8ad 903->909 909->902 910->911 911->903 914 686e8e7-686e8ea 911->914 918 686e8f1-686e8f4 914->918 919 686e8ec-686e8ee 914->919 916->884 922 686e8f6-686e8fc 918->922 923 686e901-686e903 918->923 919->918 922->923 926 686e905 923->926 927 686e90a-686e90d 923->927 926->927 927->830 931 686e913-686e924 927->931 937 686ebab-686ebb5 929->937 936 686ea40-686ea49 930->936 930->937 936->929 939 686ea4f-686ea57 936->939 941 686eb8d-686eb99 939->941 942 686ea5d-686ea76 939->942 941->936 943 686eb9f 941->943 948 686eb83-686eb88 942->948 949 686ea7c-686eaa3 942->949 943->937 948->941 949->948 965 686eaa9-686ead1 949->965 963 686e6c6 951->963 964 686e6ce 951->964 957 686e5b7-686e5bd 952->957 958 686e5cd-686e69a call 6866268 952->958 961 686e5c1-686e5c3 957->961 962 686e5bf 957->962 958->951 958->952 961->958 962->958 963->964 969 686e6cf 964->969 965->948 972 686ead7-686eaf1 965->972 969->969 972->948 976 686eaf7-686eb13 972->976 976->948 982 686eb15-686eb34 976->982 982->948 987 686eb36-686eb81 call 6866268 982->987 987->941
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID: 0oGp$DqGp$PHdq
                      • API String ID: 0-1641917722
                      • Opcode ID: b3e49f8870e3736298398895bf29bae8a3e0864176fd711810c205dc9fe93c10
                      • Instruction ID: 654e280165ea00a8a6f2563238b28dd9c8151a781112faf1ca4cb25645aa86a2
                      • Opcode Fuzzy Hash: b3e49f8870e3736298398895bf29bae8a3e0864176fd711810c205dc9fe93c10
                      • Instruction Fuzzy Hash: 1622C334B142148FDB64DB69D488B6EB7F2EF89310F208569E50ADB3A5DB31EC41CB91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1262 6867a40-6867a5e 1264 6867a60-6867a63 1262->1264 1265 6867a65-6867a6f 1264->1265 1266 6867a70-6867a73 1264->1266 1267 6867a94-6867a97 1266->1267 1268 6867a75-6867a8f 1266->1268 1269 6867aae-6867ab1 1267->1269 1270 6867a99-6867aa7 1267->1270 1268->1267 1271 6867ad4-6867ad6 1269->1271 1272 6867ab3-6867acf 1269->1272 1277 6867ae6-6867afc 1270->1277 1278 6867aa9 1270->1278 1274 6867add-6867ae0 1271->1274 1275 6867ad8 1271->1275 1272->1271 1274->1264 1274->1277 1275->1274 1283 6867d17-6867d21 1277->1283 1284 6867b02-6867b0b 1277->1284 1278->1269 1285 6867d22-6867d57 1284->1285 1286 6867b11-6867b2e 1284->1286 1289 6867d59-6867d5c 1285->1289 1293 6867d04-6867d11 1286->1293 1294 6867b34-6867b5c 1286->1294 1291 6867d5e-6867d7a 1289->1291 1292 6867d7f-6867d82 1289->1292 1291->1292 1295 6867fb7-6867fba 1292->1295 1296 6867d88-6867d97 1292->1296 1293->1283 1293->1284 1294->1293 1318 6867b62-6867b6b 1294->1318 1298 6868065-6868067 1295->1298 1299 6867fc0-6867fcc 1295->1299 1307 6867db6-6867dfa 1296->1307 1308 6867d99-6867db4 1296->1308 1300 686806e-6868071 1298->1300 1301 6868069 1298->1301 1304 6867fd7-6867fd9 1299->1304 1300->1289 1305 6868077-6868080 1300->1305 1301->1300 1309 6867ff1-6867ff5 1304->1309 1310 6867fdb-6867fe1 1304->1310 1320 6867e00-6867e11 1307->1320 1321 6867f8b-6867fa1 1307->1321 1308->1307 1315 6867ff7-6868001 1309->1315 1316 6868003 1309->1316 1313 6867fe5-6867fe7 1310->1313 1314 6867fe3 1310->1314 1313->1309 1314->1309 1319 6868008-686800a 1315->1319 1316->1319 1318->1285 1322 6867b71-6867b8d 1318->1322 1324 686800c-686800f 1319->1324 1325 686801b-6868054 1319->1325 1330 6867f76-6867f85 1320->1330 1331 6867e17-6867e34 1320->1331 1321->1295 1333 6867cf2-6867cfe 1322->1333 1334 6867b93-6867bbd 1322->1334 1324->1305 1325->1296 1345 686805a-6868064 1325->1345 1330->1320 1330->1321 1331->1330 1342 6867e3a-6867f30 call 6866268 1331->1342 1333->1293 1333->1318 1347 6867bc3-6867beb 1334->1347 1348 6867ce8-6867ced 1334->1348 1396 6867f32-6867f3c 1342->1396 1397 6867f3e 1342->1397 1347->1348 1354 6867bf1-6867c1f 1347->1354 1348->1333 1354->1348 1360 6867c25-6867c2e 1354->1360 1360->1348 1361 6867c34-6867c66 1360->1361 1369 6867c71-6867c8d 1361->1369 1370 6867c68-6867c6c 1361->1370 1369->1333 1372 6867c8f-6867ce6 call 6866268 1369->1372 1370->1348 1371 6867c6e 1370->1371 1371->1369 1372->1333 1398 6867f43-6867f45 1396->1398 1397->1398 1398->1330 1399 6867f47-6867f4c 1398->1399 1400 6867f4e-6867f58 1399->1400 1401 6867f5a 1399->1401 1402 6867f5f-6867f61 1400->1402 1401->1402 1402->1330 1403 6867f63-6867f6f 1402->1403 1403->1330
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID: $dq$$dq
                      • API String ID: 0-2340669324
                      • Opcode ID: 4e240cc94f3e10708ed246140144c2c392a3a308b70c8732ca5d43eaeba25f23
                      • Instruction ID: 0e42400f0ff1a38c504ab78e684bed08af18d19ebe44370daa144322e1f6ca2a
                      • Opcode Fuzzy Hash: 4e240cc94f3e10708ed246140144c2c392a3a308b70c8732ca5d43eaeba25f23
                      • Instruction Fuzzy Hash: 4D02BD30B002159FDB54DB69D950AAEB7F2FF84318F208969E505DB395DB34ED82CB90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1405 68659ab-68659be 1406 68659c6-68659d0 1405->1406 1407 68659c0-68659c5 1405->1407 1408 68659d2-68659d5 1406->1408 1407->1406 1409 68659d7-68659dd 1408->1409 1410 68659e4-68659e7 1408->1410 1411 6865a04-6865a23 1409->1411 1412 68659df 1409->1412 1410->1409 1413 68659e9-68659ec 1410->1413 1423 6865a25 1411->1423 1424 6865a28-6865a2e 1411->1424 1412->1410 1414 68659f3-68659f6 1413->1414 1415 68659ee-68659f0 1413->1415 1417 68659ff-6865a02 1414->1417 1418 68659f8-68659fa 1414->1418 1415->1414 1417->1411 1419 6865a39-6865a3c 1417->1419 1418->1417 1421 6865a3e-6865a43 1419->1421 1422 6865a5a-6865a5c 1419->1422 1425 6865a45 1421->1425 1426 6865a48-6865a55 1421->1426 1427 6865a63-6865a66 1422->1427 1428 6865a5e 1422->1428 1423->1424 1430 6865a75-6865ab2 1424->1430 1431 6865a30-6865a34 1424->1431 1425->1426 1426->1422 1427->1408 1429 6865a6c-6865a74 1427->1429 1428->1427 1434 6865ab4-6865ab7 1430->1434 1431->1419 1435 6865c31-6865c34 1434->1435 1436 6865abd-6865ac4 1434->1436 1437 6865c36-6865c3f 1435->1437 1438 6865c42-6865c45 1435->1438 1439 6865c12-6865c25 1436->1439 1440 6865aca-6865b11 1436->1440 1441 6865c47-6865c55 1438->1441 1442 6865c5a-6865c5d 1438->1442 1460 6865b13-6865b22 1440->1460 1441->1442 1445 6865c71-6865c74 1442->1445 1446 6865c5f-6865c66 1442->1446 1449 6865c76-6865c8b 1445->1449 1450 6865c90-6865c92 1445->1450 1446->1436 1448 6865c6c 1446->1448 1448->1445 1449->1450 1451 6865c94 1450->1451 1452 6865c99-6865c9c 1450->1452 1451->1452 1452->1434 1454 6865ca2-6865cac 1452->1454 1462 6865caf-6865cea 1460->1462 1463 6865b28-6865b3e 1460->1463 1467 6865cec-6865cef 1462->1467 1463->1462 1466 6865b44-6865b4c 1463->1466 1466->1460 1468 6865b4e-6865b54 1466->1468 1469 6865d03-6865d06 1467->1469 1470 6865cf1-6865cfe 1467->1470 1471 6865b56-6865b59 1468->1471 1472 6865bb4-6865c04 call 68647a8 1468->1472 1473 6865d20-6865d23 1469->1473 1474 6865d08-6865d1b 1469->1474 1470->1469 1471->1462 1477 6865b5f-6865b6a 1471->1477 1522 6865c06 1472->1522 1523 6865c0f 1472->1523 1475 6865db4-6865db7 1473->1475 1476 6865d29-6865d30 1473->1476 1474->1473 1483 6865dcf-6865dd2 1475->1483 1484 6865db9-6865dca 1475->1484 1481 6865d36-6865da1 1476->1481 1482 6865e44-6865e57 1476->1482 1477->1462 1485 6865b70-6865b7a 1477->1485 1528 6865daa-6865db1 1481->1528 1486 6865dd4-6865de3 1483->1486 1487 6865de8-6865deb 1483->1487 1484->1483 1485->1462 1488 6865b80-6865b8a 1485->1488 1486->1487 1489 6865dfe-6865e01 1487->1489 1490 6865ded-6865df9 1487->1490 1488->1462 1496 6865b90-6865ba5 1488->1496 1497 6865e03-6865e22 1489->1497 1498 6865e3f-6865e42 1489->1498 1490->1489 1496->1462 1500 6865bab-6865bb2 1496->1500 1518 6865e99-6865ea3 1497->1518 1498->1482 1504 6865e5a-6865e5d 1498->1504 1500->1471 1500->1472 1506 6865e70-6865e73 1504->1506 1507 6865e5f-6865e6b 1504->1507 1508 6865e87-6865e89 1506->1508 1509 6865e75-6865e7c 1506->1509 1507->1506 1514 6865e90-6865e93 1508->1514 1515 6865e8b 1508->1515 1509->1476 1513 6865e82 1509->1513 1513->1508 1514->1467 1514->1518 1515->1514 1522->1523 1523->1439
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID: XPiq$\Oiq
                      • API String ID: 0-4187271475
                      • Opcode ID: 7d8d53e0d4a8538265d0925e5a0d6778dc73f4b7762fdb5bb6082b8d2d2a7c71
                      • Instruction ID: 68e52f6cd523f869498b9124862094d1f6de57676451af78bee3c1af603c67ec
                      • Opcode Fuzzy Hash: 7d8d53e0d4a8538265d0925e5a0d6778dc73f4b7762fdb5bb6082b8d2d2a7c71
                      • Instruction Fuzzy Hash: 2EE1E331B101148FDB64DB6AD494AAEBBF2FF89310F25856AF146DB391CA31DC41C7A2
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID: $
                      • API String ID: 0-3993045852
                      • Opcode ID: d5acf60ef33e67f7081da84a3ca1af55087fabe6baf07e084117aef6b8b8423d
                      • Instruction ID: 0f231b26ab3c422edcc8abd051bdf12054d02e7b48acc14f682b2ac547174647
                      • Opcode Fuzzy Hash: d5acf60ef33e67f7081da84a3ca1af55087fabe6baf07e084117aef6b8b8423d
                      • Instruction Fuzzy Hash: 5722F471F002058FDF60DBA6C5846AEB7B2EF89310F208469EA05EB395DB71DD41CB92
                      APIs
                      • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 027D7F5F
                      Memory Dump Source
                      • Source File: 00000008.00000002.4148561130.00000000027D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_27d0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: CheckDebuggerPresentRemote
                      • String ID:
                      • API String ID: 3662101638-0
                      • Opcode ID: f63ae2d5481c99fda43aa4a989b166f1831430d927226495cf7747c741a4aca4
                      • Instruction ID: 7700c6ac1392c4ffd0a15d0c2e923fb4c9b6bc3e271c9ddab74c24bccc5aad94
                      • Opcode Fuzzy Hash: f63ae2d5481c99fda43aa4a989b166f1831430d927226495cf7747c741a4aca4
                      • Instruction Fuzzy Hash: 122139B18002598FCB14CF9AD444BEEFBF4EF49310F15846AE459A7351D778A944CF61
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8d398b7d2daeda7338257930982307fd046876e0a0e692adf27cdfdaaff90906
                      • Instruction ID: b8dac81912d148d9c0ea56e3b2e06d3ca644d26b3128cbcfa1dd7faed63838c2
                      • Opcode Fuzzy Hash: 8d398b7d2daeda7338257930982307fd046876e0a0e692adf27cdfdaaff90906
                      • Instruction Fuzzy Hash: 52925434E002048FDBA0DB69C598A6DBBF2FB45314F5488A9E509EB365DB35ED85CB80
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 84264084558980b8903d1fb7e4d52821dbc98bd417fa5fef5bc4429e08f211cd
                      • Instruction ID: 9b4c22b6049e3c95e70bbbee57054a37985fe9bfc2b12e45ff188b8b450be9b9
                      • Opcode Fuzzy Hash: 84264084558980b8903d1fb7e4d52821dbc98bd417fa5fef5bc4429e08f211cd
                      • Instruction Fuzzy Hash: 4662F030B002449FDB54DB69D550BADB7F2EF84314F148469E906EB395EB31ED82CB92
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cb1687321abc6d3a5b0c3dd4832199d04c1af953d0c193f19713e924bfd1aad6
                      • Instruction ID: 5d98acff2a86dc4a2c04862996338447505e9aa455ef6e181cf0caed0066e4f1
                      • Opcode Fuzzy Hash: cb1687321abc6d3a5b0c3dd4832199d04c1af953d0c193f19713e924bfd1aad6
                      • Instruction Fuzzy Hash: 4F328030B002199FDB60DB69D984BADB7F2FB89310F108969E549EB395DB34EC41CB91
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 16533aab98a138d3c11a60f4cc4d30e18e3416cfae63a54dd08b562c83b10e15
                      • Instruction ID: 8bef87583e0da4b61d618420f0de3e98904d3eff2e36c75fde3325e7c7fbb427
                      • Opcode Fuzzy Hash: 16533aab98a138d3c11a60f4cc4d30e18e3416cfae63a54dd08b562c83b10e15
                      • Instruction Fuzzy Hash: 64226F70E102098BDF64DB6AD5847AEB7F2EB89318F608425F609EB391DB34DC91CB51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 686ad90-686adae 2 686adb0-686adb3 0->2 3 686add6-686add9 2->3 4 686adb5-686add1 2->4 5 686adf3-686adf6 3->5 6 686addb-686ade4 3->6 4->3 9 686ae00-686ae03 5->9 10 686adf8-686adfd 5->10 7 686afc7-686affe 6->7 8 686adea-686adee 6->8 21 686b000-686b003 7->21 8->5 12 686ae05-686ae0e 9->12 13 686ae13-686ae16 9->13 10->9 12->13 14 686ae1c-686ae1f 13->14 15 686afad-686afb6 13->15 18 686ae21-686ae34 14->18 19 686ae39-686ae3c 14->19 15->6 20 686afbc-686afc6 15->20 18->19 24 686ae50-686ae53 19->24 25 686ae3e-686ae4b 19->25 22 686b26c-686b26f 21->22 23 686b009-686b044 21->23 28 686b271 call 686b2e7 22->28 29 686b27e-686b281 22->29 42 686b237-686b24a 23->42 43 686b04a-686b056 23->43 26 686ae64-686ae66 24->26 27 686ae55-686ae59 24->27 25->24 32 686ae6d-686ae70 26->32 33 686ae68 26->33 27->20 31 686ae5f 27->31 39 686b277-686b279 28->39 34 686b283-686b28d 29->34 35 686b28e-686b291 29->35 31->26 32->2 38 686ae76-686ae9a 32->38 33->32 40 686b2a2-686b2a5 35->40 41 686b293-686b297 35->41 60 686aea0-686aeaf 38->60 61 686afaa 38->61 39->29 45 686b2a7-686b2c3 40->45 46 686b2c8-686b2ca 40->46 41->23 44 686b29d 41->44 47 686b24c-686b24d 42->47 52 686b076-686b0ba 43->52 53 686b058-686b071 43->53 44->40 45->46 49 686b2d1-686b2d4 46->49 50 686b2cc 46->50 47->22 49->21 56 686b2da-686b2e4 49->56 50->49 74 686b0d6-686b115 52->74 75 686b0bc-686b0ce 52->75 53->47 64 686aec7-686af02 call 6866268 60->64 65 686aeb1-686aeb7 60->65 61->15 85 686af04-686af0a 64->85 86 686af1a-686af31 64->86 67 686aebb-686aebd 65->67 68 686aeb9 65->68 67->64 68->64 80 686b1fc-686b211 74->80 81 686b11b-686b1f6 call 6866268 74->81 75->74 80->42 81->80 88 686af0e-686af10 85->88 89 686af0c 85->89 95 686af33-686af39 86->95 96 686af49-686af5a 86->96 88->86 89->86 97 686af3d-686af3f 95->97 98 686af3b 95->98 102 686af72-686afa3 96->102 103 686af5c-686af62 96->103 97->96 98->96 102->61 104 686af66-686af68 103->104 105 686af64 103->105 104->102 105->102
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID: $dq$$dq$$dq$$dq$$dq$$dq$$dq$$dq
                      • API String ID: 0-634254105
                      • Opcode ID: cc0703c55cd556c02141a5b6a99a910efd1e71d1deb7e28a2f4c85d7954ca778
                      • Instruction ID: 1efb35e0d68daf9ac0c44405f95dee4c839750a7b9148e186b20b8009d79f448
                      • Opcode Fuzzy Hash: cc0703c55cd556c02141a5b6a99a910efd1e71d1deb7e28a2f4c85d7954ca778
                      • Instruction Fuzzy Hash: E0E1A130E102198FCB69DF6AD5806AEB7F3FF89305F208929E505EB354DB709946CB91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 254 686b708-686b728 255 686b72a-686b72d 254->255 256 686b754-686b757 255->256 257 686b72f-686b733 255->257 260 686b769-686b76c 256->260 261 686b759 256->261 258 686baab-686bae6 257->258 259 686b739-686b749 257->259 273 686bae8-686baeb 258->273 271 686b74f 259->271 272 686b7dc-686b7e0 259->272 262 686b76e-686b777 260->262 263 686b77c-686b77f 260->263 267 686b761-686b764 261->267 262->263 264 686b781-686b784 263->264 265 686b789-686b78c 263->265 264->265 269 686b78e-686b7aa 265->269 270 686b7af-686b7b2 265->270 267->260 269->270 276 686b7b4-686b7b5 270->276 277 686b7ba-686b7bd 270->277 271->256 272->258 278 686b7e6-686b7f6 272->278 274 686bd57-686bd5a 273->274 275 686baf1-686bb19 273->275 282 686bd5c-686bd78 274->282 283 686bd7d-686bd7f 274->283 311 686bb23-686bb67 275->311 312 686bb1b-686bb1e 275->312 276->277 280 686b7d7-686b7da 277->280 281 686b7bf-686b7c5 277->281 291 686b7fc 278->291 292 686ba6d-686ba71 278->292 280->272 289 686b801-686b804 280->289 281->258 288 686b7cb-686b7d2 281->288 282->283 286 686bd86-686bd89 283->286 287 686bd81 283->287 286->273 296 686bd8f-686bd98 286->296 287->286 288->280 293 686b806-686b80f 289->293 294 686b821-686b824 289->294 291->289 292->258 297 686ba73-686ba83 292->297 293->258 299 686b815-686b81c 293->299 300 686b826-686b874 call 6866268 294->300 301 686b879-686b87c 294->301 297->264 310 686ba89 297->310 299->294 300->301 303 686b87e-686b88a 301->303 304 686b88f-686b892 301->304 303->304 308 686b894-686b89d 304->308 309 686b8a2-686b8a5 304->309 308->309 315 686b8a7-686b8b0 309->315 316 686b8b5-686b8b8 309->316 317 686ba8e-686ba90 310->317 342 686bd4c-686bd56 311->342 343 686bb6d-686bb76 311->343 312->296 315->316 319 686b8c2-686b8c5 316->319 320 686b8ba-686b8bf 316->320 323 686ba97-686ba9a 317->323 324 686ba92 317->324 321 686b8c7-686b8c9 319->321 322 686b8cc-686b8cf 319->322 320->319 321->322 326 686b8d1-686b8e6 322->326 327 686b90d-686b910 322->327 323->255 328 686baa0-686baaa 323->328 324->323 326->258 335 686b8ec-686b908 326->335 327->264 330 686b916-686b919 327->330 330->264 333 686b91f-686b922 330->333 336 686b924-686b92a 333->336 337 686b92f-686b932 333->337 335->327 336->337 340 686b934-686b949 337->340 341 686b971-686b974 337->341 340->258 354 686b94f-686b96c 340->354 346 686ba02-686ba08 341->346 347 686b97a-686b97d 341->347 344 686bd42-686bd47 343->344 345 686bb7c-686bbe8 call 6866268 343->345 344->342 388 686bce2-686bcf7 345->388 389 686bbee-686bbf3 345->389 346->281 350 686ba0e 346->350 351 686b97f-686b985 347->351 352 686b98a-686b98d 347->352 356 686ba13-686ba16 350->356 351->352 357 686b9a4-686b9a7 352->357 358 686b98f-686b993 352->358 354->341 361 686ba38-686ba3b 356->361 362 686ba18-686ba33 356->362 364 686ba3d-686ba46 357->364 365 686b9ad-686b9b0 357->365 358->258 363 686b999-686b99f 358->363 361->364 370 686ba51-686ba54 361->370 362->361 363->357 364->293 371 686ba4c 364->371 368 686b9c7-686b9ca 365->368 369 686b9b2-686b9b6 365->369 376 686b9e1-686b9e4 368->376 377 686b9cc-686b9d0 368->377 369->258 375 686b9bc-686b9c2 369->375 372 686ba56-686ba5d 370->372 373 686ba68-686ba6b 370->373 371->370 372->315 378 686ba63 372->378 373->292 373->317 375->368 379 686b9e6-686b9ef 376->379 380 686b9f4-686b9f7 376->380 377->258 382 686b9d6-686b9dc 377->382 378->373 379->380 380->264 383 686b9fd-686ba00 380->383 382->376 383->346 383->356 388->344 391 686bbf5-686bbfb 389->391 392 686bc0f 389->392 394 686bc01-686bc03 391->394 395 686bbfd-686bbff 391->395 393 686bc11-686bc17 392->393 396 686bc2c-686bc39 393->396 397 686bc19-686bc1f 393->397 398 686bc0d 394->398 395->398 405 686bc51-686bc5e 396->405 406 686bc3b-686bc41 396->406 399 686bc25 397->399 400 686bccd-686bcdc 397->400 398->393 399->396 401 686bc94-686bca1 399->401 402 686bc60-686bc6d 399->402 400->388 400->389 413 686bca3-686bca9 401->413 414 686bcb9-686bcc6 401->414 411 686bc85-686bc92 402->411 412 686bc6f-686bc75 402->412 405->400 408 686bc45-686bc47 406->408 409 686bc43 406->409 408->405 409->405 411->400 416 686bc77 412->416 417 686bc79-686bc7b 412->417 418 686bcad-686bcaf 413->418 419 686bcab 413->419 414->400 416->411 417->411 418->414 419->414
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID: $dq$$dq$$dq$$dq$$dq$$dq
                      • API String ID: 0-2331353128
                      • Opcode ID: b474e826a09c55c8a5da7fa1b6f00d651cbdc0156db295508e81e25bc59d5cb2
                      • Instruction ID: dd38e5893c7fee7a71e366db11659305039cd425bc9e666191224554f30500e8
                      • Opcode Fuzzy Hash: b474e826a09c55c8a5da7fa1b6f00d651cbdc0156db295508e81e25bc59d5cb2
                      • Instruction Fuzzy Hash: 60029F30E102198FDBA4DF6AD4806ADB7B2FF45319F20892AE516EB351DB30DD91CB91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 422 67f6ec1-67f6f5f GetCurrentProcess 426 67f6f68-67f6f9c GetCurrentThread 422->426 427 67f6f61-67f6f67 422->427 428 67f6f9e-67f6fa4 426->428 429 67f6fa5-67f6fd9 GetCurrentProcess 426->429 427->426 428->429 430 67f6fdb-67f6fe1 429->430 431 67f6fe2-67f6ffd call 67f70a0 429->431 430->431 435 67f7003-67f7032 GetCurrentThreadId 431->435 436 67f703b-67f709d 435->436 437 67f7034-67f703a 435->437 437->436
                      APIs
                      • GetCurrentProcess.KERNEL32 ref: 067F6F4E
                      • GetCurrentThread.KERNEL32 ref: 067F6F8B
                      • GetCurrentProcess.KERNEL32 ref: 067F6FC8
                      • GetCurrentThreadId.KERNEL32 ref: 067F7021
                      Memory Dump Source
                      • Source File: 00000008.00000002.4162660725.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67f0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: Current$ProcessThread
                      • String ID:
                      • API String ID: 2063062207-0
                      • Opcode ID: 9f05f65822c655a27e2628cf626d3c75357e3a348e94e5df61ea5c5feacc7c39
                      • Instruction ID: c3ece73b340ba13b184483a5aa342348de058164ac3a44f459a2855c7648f5bf
                      • Opcode Fuzzy Hash: 9f05f65822c655a27e2628cf626d3c75357e3a348e94e5df61ea5c5feacc7c39
                      • Instruction Fuzzy Hash: FF5186B09013498FDB98DFA9C948BAEBBF1EF48314F20845DE109A7391D7359984CF21

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 444 67f6ed0-67f6f5f GetCurrentProcess 448 67f6f68-67f6f9c GetCurrentThread 444->448 449 67f6f61-67f6f67 444->449 450 67f6f9e-67f6fa4 448->450 451 67f6fa5-67f6fd9 GetCurrentProcess 448->451 449->448 450->451 452 67f6fdb-67f6fe1 451->452 453 67f6fe2-67f6ffd call 67f70a0 451->453 452->453 457 67f7003-67f7032 GetCurrentThreadId 453->457 458 67f703b-67f709d 457->458 459 67f7034-67f703a 457->459 459->458
                      APIs
                      • GetCurrentProcess.KERNEL32 ref: 067F6F4E
                      • GetCurrentThread.KERNEL32 ref: 067F6F8B
                      • GetCurrentProcess.KERNEL32 ref: 067F6FC8
                      • GetCurrentThreadId.KERNEL32 ref: 067F7021
                      Memory Dump Source
                      • Source File: 00000008.00000002.4162660725.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67f0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: Current$ProcessThread
                      • String ID:
                      • API String ID: 2063062207-0
                      • Opcode ID: 9cd44595b5cca9d0fb6e5babe8029a2f0b65b40b86c81fd2aa4fd63b61267136
                      • Instruction ID: adf17adccaa10574ff22b1cafb2237e724e7c61aeac18fa7464192ce48273bdc
                      • Opcode Fuzzy Hash: 9cd44595b5cca9d0fb6e5babe8029a2f0b65b40b86c81fd2aa4fd63b61267136
                      • Instruction Fuzzy Hash: 215188B0901309CFDB58DFAAD948BAEBBF5EF48314F208459E119A7390DB359984CF61

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 466 6868e10-6868e35 467 6868e37-6868e3a 466->467 468 6868e40-6868e55 467->468 469 68696f8-68696fb 467->469 476 6868e57-6868e5d 468->476 477 6868e6d-6868e83 468->477 470 6869721-6869723 469->470 471 68696fd-686971c 469->471 472 6869725 470->472 473 686972a-686972d 470->473 471->470 472->473 473->467 475 6869733-686973d 473->475 479 6868e61-6868e63 476->479 480 6868e5f 476->480 483 6868e8e-6868e90 477->483 479->477 480->477 484 6868e92-6868e98 483->484 485 6868ea8-6868f19 483->485 486 6868e9c-6868e9e 484->486 487 6868e9a 484->487 496 6868f45-6868f61 485->496 497 6868f1b-6868f3e 485->497 486->485 487->485 502 6868f63-6868f86 496->502 503 6868f8d-6868fa8 496->503 497->496 502->503 508 6868fd3-6868fee 503->508 509 6868faa-6868fcc 503->509 514 6869013-6869021 508->514 515 6868ff0-686900c 508->515 509->508 516 6869023-686902c 514->516 517 6869031-68690ab 514->517 515->514 516->475 523 68690ad-68690cb 517->523 524 68690f8-686910d 517->524 528 68690e7-68690f6 523->528 529 68690cd-68690dc 523->529 524->469 528->523 528->524 529->528
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID: $dq$$dq$$dq$$dq
                      • API String ID: 0-185584874
                      • Opcode ID: ff1328154b9f1f4862ded6ee365dedd9869afd5c696f5a6f0410cd95aba18f64
                      • Instruction ID: 577a68766be1ed6db5ad2ef1ceb8ebe07c660776b7edd9d8bd38ebc0a7fe8cd4
                      • Opcode Fuzzy Hash: ff1328154b9f1f4862ded6ee365dedd9869afd5c696f5a6f0410cd95aba18f64
                      • Instruction Fuzzy Hash: BD919230B0021A9FDF54DF69D9507AEB3F6AF84300F108569D909EB384EE70AD428B91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 532 686d000-686d01b 534 686d01d-686d020 532->534 535 686d022-686d064 534->535 536 686d069-686d06c 534->536 535->536 537 686d0b5-686d0b8 536->537 538 686d06e-686d0b0 536->538 540 686d101-686d104 537->540 541 686d0ba-686d0fc 537->541 538->537 543 686d106-686d115 540->543 544 686d14d-686d150 540->544 541->540 546 686d117-686d11c 543->546 547 686d124-686d130 543->547 549 686d152-686d194 544->549 550 686d199-686d19c 544->550 546->547 552 686d136-686d148 547->552 553 686da19-686da22 547->553 549->550 554 686d1e5-686d1e8 550->554 555 686d19e-686d1e0 550->555 552->544 573 686da24-686da26 553->573 574 686da2a 553->574 557 686d231-686d234 554->557 558 686d1ea-686d22c 554->558 555->554 561 686d236-686d252 557->561 562 686d257-686d25a 557->562 558->557 561->562 569 686d25c-686d25e 562->569 570 686d269-686d26c 562->570 577 686d264 569->577 578 686d4e5 569->578 579 686d26e-686d284 570->579 580 686d289-686d28c 570->580 581 686da2e 573->581 582 686da28 573->582 583 686da32-686da35 574->583 584 686da2c-686da2d 574->584 577->570 593 686d4e8-686d4f4 578->593 579->580 586 686d2d5-686d2d8 580->586 587 686d28e-686d2d0 580->587 591 686da36-686da4e 581->591 592 686da30-686da31 581->592 582->574 583->591 584->581 596 686d321-686d324 586->596 597 686d2da-686d2e9 586->597 587->586 598 686da50-686da53 591->598 592->583 593->543 599 686d4fa-686d7e7 593->599 610 686d326-686d328 596->610 611 686d32f-686d332 596->611 606 686d2eb-686d2f0 597->606 607 686d2f8-686d304 597->607 608 686da86-686da89 598->608 609 686da55-686da81 598->609 753 686da0e-686da18 599->753 754 686d7ed-686d7f3 599->754 606->607 607->553 614 686d30a-686d31c 607->614 615 686da8b call 686db6d 608->615 616 686da98-686da9b 608->616 609->608 617 686d3a3-686d3ac 610->617 618 686d32a 610->618 620 686d334-686d376 611->620 621 686d37b-686d37e 611->621 614->596 637 686da91-686da93 615->637 630 686dabe-686dac0 616->630 631 686da9d-686dab9 616->631 626 686d3ae-686d3b3 617->626 627 686d3bb-686d3c7 617->627 618->611 620->621 623 686d380-686d385 621->623 624 686d388-686d38b 621->624 623->624 624->593 633 686d391-686d393 624->633 626->627 634 686d3cd-686d3e1 627->634 635 686d4d8-686d4dd 627->635 640 686dac7-686daca 630->640 641 686dac2 630->641 631->630 643 686d395 633->643 644 686d39a-686d39d 633->644 634->578 654 686d3e7-686d3f9 634->654 635->578 637->616 640->598 642 686dacc-686dadb 640->642 641->640 656 686db42-686db57 642->656 657 686dadd-686db40 call 6866268 642->657 643->644 644->534 644->617 665 686d41d-686d41f 654->665 666 686d3fb-686d401 654->666 657->656 669 686d429-686d435 665->669 670 686d405-686d411 666->670 671 686d403 666->671 681 686d437-686d441 669->681 682 686d443 669->682 675 686d413-686d41b 670->675 671->675 675->669 683 686d448-686d44a 681->683 682->683 683->578 686 686d450-686d46c call 6866268 683->686 694 686d46e-686d473 686->694 695 686d47b-686d487 686->695 694->695 695->635 696 686d489-686d4d6 695->696 696->578 755 686d7f5-686d7fa 754->755 756 686d802-686d80b 754->756 755->756 756->553 757 686d811-686d824 756->757 759 686d9fe-686da08 757->759 760 686d82a-686d830 757->760 759->753 759->754 761 686d832-686d837 760->761 762 686d83f-686d848 760->762 761->762 762->553 763 686d84e-686d86f 762->763 766 686d871-686d876 763->766 767 686d87e-686d887 763->767 766->767 767->553 768 686d88d-686d8aa 767->768 768->759 771 686d8b0-686d8b6 768->771 771->553 772 686d8bc-686d8d5 771->772 774 686d9f1-686d9f8 772->774 775 686d8db-686d902 772->775 774->759 774->771 775->553 778 686d908-686d912 775->778 778->553 779 686d918-686d92f 778->779 781 686d931-686d93c 779->781 782 686d93e-686d959 779->782 781->782 782->774 787 686d95f-686d978 call 6866268 782->787 791 686d987-686d990 787->791 792 686d97a-686d97f 787->792 791->553 793 686d996-686d9ea 791->793 792->791 793->774
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID: $dq$$dq$$dq
                      • API String ID: 0-2861643491
                      • Opcode ID: fe199c7a09977cede901f0302c32c49fa8b1cdd4c34c8cab0b525dbfbf7c7f38
                      • Instruction ID: 4a3662ab4e0189a9459146118ecdc9cdd7ccf8eb88c863c979abcfef1f710987
                      • Opcode Fuzzy Hash: fe199c7a09977cede901f0302c32c49fa8b1cdd4c34c8cab0b525dbfbf7c7f38
                      • Instruction Fuzzy Hash: 8E622C30B006158FCB65EB69D580A5EB7F2FF94305F208A68E4099F359DB71ED86CB90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1005 686e442-686e44c 1006 686e466-686e471 1005->1006 1007 686e44e 1005->1007 1010 686e473-686e476 1006->1010 1008 686e456 1007->1008 1009 686e450-686e452 1007->1009 1013 686e457-686e459 1008->1013 1014 686e45e-686e463 1008->1014 1011 686e454-686e455 1009->1011 1012 686e45a-686e45d 1009->1012 1015 686e486-686e489 1010->1015 1016 686e478 1010->1016 1011->1008 1012->1014 1013->1012 1014->1006 1017 686e4a6-686e4a9 1015->1017 1018 686e48b-686e494 1015->1018 1024 686e47e-686e481 1016->1024 1022 686e4b3-686e4b6 1017->1022 1023 686e4ab-686e4b0 1017->1023 1020 686e6fc-686e70a 1018->1020 1021 686e49a-686e4a1 1018->1021 1031 686e712 1020->1031 1032 686e70c-686e711 1020->1032 1021->1017 1025 686e4b8-686e4d4 1022->1025 1026 686e4d9-686e4dc 1022->1026 1023->1022 1024->1015 1025->1026 1028 686e6e2-686e6eb 1026->1028 1029 686e4e2-686e4e4 1026->1029 1028->1018 1030 686e6f1-686e6fb 1028->1030 1034 686e4e6 1029->1034 1035 686e4eb-686e4ee 1029->1035 1036 686e714-686e719 1031->1036 1037 686e71a-686e733 1031->1037 1032->1031 1034->1035 1035->1010 1038 686e4f0-686e5a4 1035->1038 1036->1037 1040 686e735-686e738 1037->1040 1161 686e6a0-686e6c4 1038->1161 1162 686e5aa-686e5b5 1038->1162 1042 686e751-686e754 1040->1042 1043 686e73a-686e74c 1040->1043 1044 686e756-686e759 1042->1044 1045 686e75e-686e761 1042->1045 1043->1042 1044->1045 1046 686e763-686e766 1045->1046 1047 686e778-686e77b 1045->1047 1050 686e925-686e936 1046->1050 1051 686e76c-686e773 1046->1051 1052 686e783-686e786 1047->1052 1053 686e77d-686e77e 1047->1053 1065 686e93e 1050->1065 1066 686e938 1050->1066 1051->1047 1055 686e792-686e795 1052->1055 1056 686e788-686e78b 1052->1056 1053->1052 1058 686e797-686e79d 1055->1058 1059 686e7af-686e7b2 1055->1059 1056->1046 1057 686e78d 1056->1057 1057->1055 1058->1050 1062 686e7a3-686e7aa 1058->1062 1063 686e7b4-686e7c3 1059->1063 1064 686e7ca-686e7cd 1059->1064 1062->1059 1075 686e804-686e805 1063->1075 1076 686e7c5 1063->1076 1069 686e7f0-686e7f3 1064->1069 1070 686e7cf-686e7eb 1064->1070 1067 686e946-686e95e 1065->1067 1068 686e940-686e945 1065->1068 1066->1065 1071 686e960-686e963 1067->1071 1068->1067 1069->1056 1072 686e7f5-686e7f8 1069->1072 1070->1069 1077 686e965-686e97e 1071->1077 1078 686e983-686e986 1071->1078 1080 686e7ff-686e802 1072->1080 1081 686e7fa-686e7fc 1072->1081 1084 686e80a-686e80d 1075->1084 1076->1064 1077->1078 1082 686e99d-686e9a0 1078->1082 1083 686e988-686e996 1078->1083 1080->1075 1080->1084 1081->1080 1090 686e9a2-686e9ac 1082->1090 1091 686e9ad-686e9b0 1082->1091 1103 686e9e5-686ea12 1083->1103 1104 686e998 1083->1104 1088 686e837-686e83a 1084->1088 1089 686e80f-686e832 1084->1089 1094 686e863-686e866 1088->1094 1095 686e83c-686e858 1088->1095 1089->1088 1092 686e9b2-686e9ce 1091->1092 1093 686e9d3-686e9d5 1091->1093 1092->1093 1098 686e9d7 1093->1098 1099 686e9dc-686e9df 1093->1099 1101 686e887-686e88a 1094->1101 1102 686e868-686e882 1094->1102 1095->1053 1126 686e85e 1095->1126 1098->1099 1099->1071 1099->1103 1107 686e89c-686e89f 1101->1107 1108 686e88c-686e897 1101->1108 1102->1101 1139 686eba1-686eba6 1103->1139 1140 686ea18-686ea3a 1103->1140 1104->1082 1112 686e8b2-686e8b5 1107->1112 1113 686e8a1-686e8a7 1107->1113 1108->1107 1120 686e8b7-686e8dd 1112->1120 1121 686e8e2-686e8e5 1112->1121 1113->1058 1119 686e8ad 1113->1119 1119->1112 1120->1121 1121->1113 1124 686e8e7-686e8ea 1121->1124 1128 686e8f1-686e8f4 1124->1128 1129 686e8ec-686e8ee 1124->1129 1126->1094 1132 686e8f6-686e8fc 1128->1132 1133 686e901-686e903 1128->1133 1129->1128 1132->1133 1136 686e905 1133->1136 1137 686e90a-686e90d 1133->1137 1136->1137 1137->1040 1141 686e913-686e924 1137->1141 1147 686ebab-686ebb5 1139->1147 1146 686ea40-686ea49 1140->1146 1140->1147 1146->1139 1149 686ea4f-686ea57 1146->1149 1151 686eb8d-686eb99 1149->1151 1152 686ea5d-686ea76 1149->1152 1151->1146 1153 686eb9f 1151->1153 1158 686eb83-686eb88 1152->1158 1159 686ea7c-686eaa3 1152->1159 1153->1147 1158->1151 1159->1158 1175 686eaa9-686ead1 1159->1175 1173 686e6c6 1161->1173 1174 686e6ce 1161->1174 1167 686e5b7-686e5bd 1162->1167 1168 686e5cd-686e69a call 6866268 1162->1168 1171 686e5c1-686e5c3 1167->1171 1172 686e5bf 1167->1172 1168->1161 1168->1162 1171->1168 1172->1168 1173->1174 1179 686e6cf 1174->1179 1175->1158 1182 686ead7-686eaf1 1175->1182 1179->1179 1182->1158 1186 686eaf7-686eb13 1182->1186 1186->1158 1192 686eb15-686eb34 1186->1192 1192->1158 1197 686eb36-686eb81 call 6866268 1192->1197 1197->1151
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID: 0oGp$DqGp$PHdq
                      • API String ID: 0-1641917722
                      • Opcode ID: 4c2f2c75a185e28ada650f8c35fbcc4d7fecc33c0da2de7ceceefa6a02d90925
                      • Instruction ID: d81383d74294b3bf3e75d5257ea16890b9dd76017d4be8aab007e8b79511cdfb
                      • Opcode Fuzzy Hash: 4c2f2c75a185e28ada650f8c35fbcc4d7fecc33c0da2de7ceceefa6a02d90925
                      • Instruction Fuzzy Hash: A8817A347106048FCBA4DF3AD498A6DBBF2EF89311B2185A9E606DB365DB71EC41CB50

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1215 6864830-6864854 1216 6864856-6864859 1215->1216 1217 686485f-6864957 1216->1217 1218 6864f38-6864f3b 1216->1218 1238 686495d-68649aa call 68650d9 1217->1238 1239 68649da-68649e1 1217->1239 1219 6864f5c-6864f5e 1218->1219 1220 6864f3d-6864f57 1218->1220 1221 6864f65-6864f68 1219->1221 1222 6864f60 1219->1222 1220->1219 1221->1216 1225 6864f6e-6864f7b 1221->1225 1222->1221 1252 68649b0-68649cc 1238->1252 1240 68649e7-6864a57 1239->1240 1241 6864a65-6864a6e 1239->1241 1258 6864a62 1240->1258 1259 6864a59 1240->1259 1241->1225 1255 68649d7-68649d8 1252->1255 1256 68649ce 1252->1256 1255->1239 1256->1255 1258->1241 1259->1258
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID: fiq$XPiq$\Oiq
                      • API String ID: 0-1639307521
                      • Opcode ID: bb4117989f7c863e4d694c4d1c6426483a2c6094fdc7972f329a445ca9943cf6
                      • Instruction ID: ded0d2950f1ad5f5145c5bb44b36cb06bda70c449a6f0d712539134e65d28a5d
                      • Opcode Fuzzy Hash: bb4117989f7c863e4d694c4d1c6426483a2c6094fdc7972f329a445ca9943cf6
                      • Instruction Fuzzy Hash: 0B615071F002189FEB54DFA9C8147AEBAF6EF88310F208429E109EB395DB758D458F95

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2296 6868e01-6868e35 2298 6868e37-6868e3a 2296->2298 2299 6868e40-6868e55 2298->2299 2300 68696f8-68696fb 2298->2300 2307 6868e57-6868e5d 2299->2307 2308 6868e6d-6868e83 2299->2308 2301 6869721-6869723 2300->2301 2302 68696fd-686971c 2300->2302 2303 6869725 2301->2303 2304 686972a-686972d 2301->2304 2302->2301 2303->2304 2304->2298 2306 6869733-686973d 2304->2306 2310 6868e61-6868e63 2307->2310 2311 6868e5f 2307->2311 2314 6868e8e-6868e90 2308->2314 2310->2308 2311->2308 2315 6868e92-6868e98 2314->2315 2316 6868ea8-6868f19 2314->2316 2317 6868e9c-6868e9e 2315->2317 2318 6868e9a 2315->2318 2327 6868f45-6868f61 2316->2327 2328 6868f1b-6868f3e 2316->2328 2317->2316 2318->2316 2333 6868f63-6868f86 2327->2333 2334 6868f8d-6868fa8 2327->2334 2328->2327 2333->2334 2339 6868fd3-6868fee 2334->2339 2340 6868faa-6868fcc 2334->2340 2345 6869013-6869021 2339->2345 2346 6868ff0-686900c 2339->2346 2340->2339 2347 6869023-686902c 2345->2347 2348 6869031-68690ab 2345->2348 2346->2345 2347->2306 2354 68690ad-68690cb 2348->2354 2355 68690f8-686910d 2348->2355 2359 68690e7-68690f6 2354->2359 2360 68690cd-68690dc 2354->2360 2355->2300 2359->2354 2359->2355 2360->2359
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID: $dq$$dq
                      • API String ID: 0-2340669324
                      • Opcode ID: cd0482e09405ffb48f49dfe42a46857761c2917ba03fefda7c93f4878e3f8e13
                      • Instruction ID: 84af807313e25861b06d853da791d66c8c5dcf52a53322088c9618071b9a6b79
                      • Opcode Fuzzy Hash: cd0482e09405ffb48f49dfe42a46857761c2917ba03fefda7c93f4878e3f8e13
                      • Instruction Fuzzy Hash: 6F519570B002159FDF54EB79D850B6FB7F6AF84600F108469D909D7384EA70AC02CB91
                      Memory Dump Source
                      • Source File: 00000008.00000002.4148561130.00000000027D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_27d0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4835746b725f5c294ff2a443feae1638b8cb0fb4280eecf155c61e2c6a4edf45
                      • Instruction ID: 5efa78776c955888fdcbbc7180414c23fdbeba1afbe9b829cce23f1d6b495130
                      • Opcode Fuzzy Hash: 4835746b725f5c294ff2a443feae1638b8cb0fb4280eecf155c61e2c6a4edf45
                      • Instruction Fuzzy Hash: 93415672D047958FCB11CF69D8042AEBFF1AF89310F0585AAD44AE7791DB349845CBE1
                      APIs
                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 067F35EA
                      Memory Dump Source
                      • Source File: 00000008.00000002.4162660725.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67f0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: CreateWindow
                      • String ID:
                      • API String ID: 716092398-0
                      • Opcode ID: 2938139cc7eeaa40b3c8d1584d610de26671f0b94cb46fcf0b49460ba2428d02
                      • Instruction ID: e887e1cdd364c28b45359f66b239543e86b48edc300bf0a3eb14a489463490b9
                      • Opcode Fuzzy Hash: 2938139cc7eeaa40b3c8d1584d610de26671f0b94cb46fcf0b49460ba2428d02
                      • Instruction Fuzzy Hash: 5151D2B1C10209AFDF15CFA9D884ADDBBB5BF49310F24852AE919AB210D7719945CF90
                      APIs
                      • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,067F82B5), ref: 067F833F
                      Memory Dump Source
                      • Source File: 00000008.00000002.4162660725.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67f0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: CallbackDispatcherUser
                      • String ID:
                      • API String ID: 2492992576-0
                      • Opcode ID: cf837b3dfa0ecbf09f07d653c2e94c6c38977af01e28c203f8a809f543b99ca2
                      • Instruction ID: c9ecd72692caab53b107f3df8cb6c7ed59777e7854a4d959d78e670259622087
                      • Opcode Fuzzy Hash: cf837b3dfa0ecbf09f07d653c2e94c6c38977af01e28c203f8a809f543b99ca2
                      • Instruction Fuzzy Hash: 8E4187B58143498FCB50CF99C844BEABBF4EF88320F24885AD518A7351C375A844CFA6
                      APIs
                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 067F35EA
                      Memory Dump Source
                      • Source File: 00000008.00000002.4162660725.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67f0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: CreateWindow
                      • String ID:
                      • API String ID: 716092398-0
                      • Opcode ID: c80b5de8fc7ef63579a357f576380e8dbf9bf63597dfceba76f2b6a1fd179db8
                      • Instruction ID: b90f39d2017d6804d99c546b305424985e070eacbb5eb1f8eb45e9667a481adb
                      • Opcode Fuzzy Hash: c80b5de8fc7ef63579a357f576380e8dbf9bf63597dfceba76f2b6a1fd179db8
                      • Instruction Fuzzy Hash: F141B0B1D10349DFDB14CF9AC884ADEBBB5BF88310F24852AE919AB310D7719885CF90
                      APIs
                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 067F8069
                      Memory Dump Source
                      • Source File: 00000008.00000002.4162660725.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67f0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: CallProcWindow
                      • String ID:
                      • API String ID: 2714655100-0
                      • Opcode ID: 894dd1f105a2cc50b27287c6f0cd0c5c2457b4873191e9fb4b67a58e9a6baee1
                      • Instruction ID: 5ae917541ecd5660197ee46da6d0199972deb3ec356443072d9631efe7e8b87e
                      • Opcode Fuzzy Hash: 894dd1f105a2cc50b27287c6f0cd0c5c2457b4873191e9fb4b67a58e9a6baee1
                      • Instruction Fuzzy Hash: F04138B4910305CFDB54CF59C848EAABBF5FB88314F24C459D619A7321D375A940CFA1
                      APIs
                      Memory Dump Source
                      • Source File: 00000008.00000002.4162660725.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67f0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: Clipboard
                      • String ID:
                      • API String ID: 220874293-0
                      • Opcode ID: bf1c40334091a3120bc8c71177873657fa3cf04b9e864b8366f1420083456ea6
                      • Instruction ID: 1421399f21090a151ff77b9ddb972756c3e3e9a03acd63c815adbffd4bbc6dd8
                      • Opcode Fuzzy Hash: bf1c40334091a3120bc8c71177873657fa3cf04b9e864b8366f1420083456ea6
                      • Instruction Fuzzy Hash: 2F31DEB0D11208DFDB54DF99C984B9EBBF5AF48304F20845AE509BB390DB74A945CB62
                      APIs
                      Memory Dump Source
                      • Source File: 00000008.00000002.4162660725.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67f0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: Clipboard
                      • String ID:
                      • API String ID: 220874293-0
                      • Opcode ID: fd338d5f9cf69f6f0c6c2d889cf094e1c72de07f78df70921f358a8718c04f7e
                      • Instruction ID: ce9b51253248f4e375602e61b3dbe9c7f347f95006e970736bc867d620ca6877
                      • Opcode Fuzzy Hash: fd338d5f9cf69f6f0c6c2d889cf094e1c72de07f78df70921f358a8718c04f7e
                      • Instruction Fuzzy Hash: 7331F1B0D11208DFDB14DF99C984B9EBBF5AF48304F20805AE504BB390DB74A845CB56
                      APIs
                      • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 027D7F5F
                      Memory Dump Source
                      • Source File: 00000008.00000002.4148561130.00000000027D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_27d0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: CheckDebuggerPresentRemote
                      • String ID:
                      • API String ID: 3662101638-0
                      • Opcode ID: 40a976e66f705df7f586f2ac658ec7ae4f698c20e093defe0f87e7e00da4bd26
                      • Instruction ID: 9a26bfd8635e152fb92a83f6b88645934632bec74813d8988c6dd0ed85a4917e
                      • Opcode Fuzzy Hash: 40a976e66f705df7f586f2ac658ec7ae4f698c20e093defe0f87e7e00da4bd26
                      • Instruction Fuzzy Hash: 442169B18002598FCB14CFAAC845BEEFBF4EF49310F14846AE459A7340C738A944CF60
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 067F719F
                      Memory Dump Source
                      • Source File: 00000008.00000002.4162660725.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67f0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 04684f7e24e53cddbed973966caa0bbe8bab006536187b0343d4d34e1fcea295
                      • Instruction ID: 58a3ca240f0b69cd059e3cc0111cfde4339d1396f32a56461ab4e7f8dfc20a93
                      • Opcode Fuzzy Hash: 04684f7e24e53cddbed973966caa0bbe8bab006536187b0343d4d34e1fcea295
                      • Instruction Fuzzy Hash: 812116B5D003489FDB10CFAAD884ADEBFF9EB48310F14841AE954A3311C374A944CFA1
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 067F719F
                      Memory Dump Source
                      • Source File: 00000008.00000002.4162660725.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67f0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 9e403058d9aacad11bc8326c716c0e817c014fc8fae7fa38237f56680340d8d6
                      • Instruction ID: 8f750fb9508201e0cd45a8faca759df63877fc6cf5b32fa6dd06b3cf36867fc7
                      • Opcode Fuzzy Hash: 9e403058d9aacad11bc8326c716c0e817c014fc8fae7fa38237f56680340d8d6
                      • Instruction Fuzzy Hash: EA21E2B5D002489FDB10CFAAD884ADEBBF9EB48320F14841AE918A3350D374A944CFA5
                      APIs
                      • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 067FA863
                      Memory Dump Source
                      • Source File: 00000008.00000002.4162660725.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67f0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: HookWindows
                      • String ID:
                      • API String ID: 2559412058-0
                      • Opcode ID: ee03ba6bc5aaf938485a5159083431d0b74f9b1e18549bb26ea76e790e086d1f
                      • Instruction ID: 40dc4f444b330797d8d903be2f25fbe5f2f50d869f374363a1ee9eeb0e4877ea
                      • Opcode Fuzzy Hash: ee03ba6bc5aaf938485a5159083431d0b74f9b1e18549bb26ea76e790e086d1f
                      • Instruction Fuzzy Hash: 152102B5D002499FCB54DF9AC844BEEBBF5AB88310F10842AD419A7390C774A945CFA1
                      APIs
                      • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 067FA863
                      Memory Dump Source
                      • Source File: 00000008.00000002.4162660725.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67f0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: HookWindows
                      • String ID:
                      • API String ID: 2559412058-0
                      • Opcode ID: 9e5aa1121c2cdfc9aab36c9422d67619b79da90f36ca378c8ecd4cbde6fbf60e
                      • Instruction ID: b616bb2bf1abbe0a9723dbdffb30073dc9996fd31d159bcfda589927259ddf31
                      • Opcode Fuzzy Hash: 9e5aa1121c2cdfc9aab36c9422d67619b79da90f36ca378c8ecd4cbde6fbf60e
                      • Instruction Fuzzy Hash: CD2102B5D00249DFCB54DF9AC848BEEBBF5AB88310F10842AE419A7290C774A945CFA1
                      APIs
                      • GlobalMemoryStatusEx.KERNEL32 ref: 027DF6F7
                      Memory Dump Source
                      • Source File: 00000008.00000002.4148561130.00000000027D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_27d0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: GlobalMemoryStatus
                      • String ID:
                      • API String ID: 1890195054-0
                      • Opcode ID: 7ec9b91383303bc554ee1c96c6cb3ba1d533e30ccdd62a8fdf7079783e43a262
                      • Instruction ID: 10ae4056fc6a57bd0cf591847692d620d77f4ad4ae05db0d45482d29d2079226
                      • Opcode Fuzzy Hash: 7ec9b91383303bc554ee1c96c6cb3ba1d533e30ccdd62a8fdf7079783e43a262
                      • Instruction Fuzzy Hash: ED1112B1C006599BCB10DF9AC844BDEFBF4EF48320F11816AD818B7240D778A944CFA5
                      APIs
                      • GetModuleHandleW.KERNEL32(00000000), ref: 067F2496
                      Memory Dump Source
                      • Source File: 00000008.00000002.4162660725.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67f0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: 9fb3d046e825f4ba365b332221ac326d51973c8bacefde31468ec81ba867f5ce
                      • Instruction ID: 95e11d09fc120fa5d9d5c0011ca9ee5b997855df65e74192d6eee329df046b85
                      • Opcode Fuzzy Hash: 9fb3d046e825f4ba365b332221ac326d51973c8bacefde31468ec81ba867f5ce
                      • Instruction Fuzzy Hash: 061132B5C007498FCB10DF9AC844ADEFBF4EB89220F10852AD429B7251C375A645CFA1
                      APIs
                      • GetModuleHandleW.KERNEL32(00000000), ref: 067F2496
                      Memory Dump Source
                      • Source File: 00000008.00000002.4162660725.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67f0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: a0fc27b0ecda402abf04a79fe46f2bd58888c710e5ce21ac84d9f421c6fa71eb
                      • Instruction ID: 63613a070709f4f1e6872fb7e7c913b9675e03761a251572be775e8fe2ace9c8
                      • Opcode Fuzzy Hash: a0fc27b0ecda402abf04a79fe46f2bd58888c710e5ce21ac84d9f421c6fa71eb
                      • Instruction Fuzzy Hash: 3011F3B5C107498FDB50DF9AC444AAEFBF4EB48214F10842AD529B7311C3B5AA45CFA5
                      APIs
                      • OleInitialize.OLE32(00000000), ref: 067F8BFD
                      Memory Dump Source
                      • Source File: 00000008.00000002.4162660725.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67f0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: Initialize
                      • String ID:
                      • API String ID: 2538663250-0
                      • Opcode ID: acd3069ced3aacc7fea5436eea9f2682e15db999ba07e007cde307d95f07f5a3
                      • Instruction ID: 7f1c89ad6af7e90ef362010c172199ce182668228c2da04d3b5ff31abd3ca19d
                      • Opcode Fuzzy Hash: acd3069ced3aacc7fea5436eea9f2682e15db999ba07e007cde307d95f07f5a3
                      • Instruction Fuzzy Hash: DD1133B08007488FDB20DF9AD449BDEBBF4EB48320F108859D529A7300C374A944CFA5
                      APIs
                      • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,067F82B5), ref: 067F833F
                      Memory Dump Source
                      • Source File: 00000008.00000002.4162660725.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67f0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: CallbackDispatcherUser
                      • String ID:
                      • API String ID: 2492992576-0
                      • Opcode ID: 0e20fcc2fe27cd50bfd377b6ca22761614bb4245debdb1f72efae9858aac76ef
                      • Instruction ID: 95d20f0634ae6db1ed45182aed2c1e44f09358a87f69772926a60f4be5e066c3
                      • Opcode Fuzzy Hash: 0e20fcc2fe27cd50bfd377b6ca22761614bb4245debdb1f72efae9858aac76ef
                      • Instruction Fuzzy Hash: 581106B58047498FCB50DF9AC849BDEBBF4EB48310F10845AD519A7350C775A944CFA5
                      APIs
                      • OleInitialize.OLE32(00000000), ref: 067F8BFD
                      Memory Dump Source
                      • Source File: 00000008.00000002.4162660725.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67f0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: Initialize
                      • String ID:
                      • API String ID: 2538663250-0
                      • Opcode ID: cd73f636116b502e12c009166d773b977d0e30e3918580a783bc8525f1c5a099
                      • Instruction ID: 287133a2130ba9fa1139e775b0711e5b379bbf3a751bd6a903055e0edea0a026
                      • Opcode Fuzzy Hash: cd73f636116b502e12c009166d773b977d0e30e3918580a783bc8525f1c5a099
                      • Instruction Fuzzy Hash: 7D11F2B58007488FCB20DFAAD449BDABBF4EB48320F20855AD569A7241C774A544CFA5
                      APIs
                      • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,067F82B5), ref: 067F833F
                      Memory Dump Source
                      • Source File: 00000008.00000002.4162660725.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67f0000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID: CallbackDispatcherUser
                      • String ID:
                      • API String ID: 2492992576-0
                      • Opcode ID: 6ceeafbc31bff6ee5c13f935ee695367efee45f475ce5fc1214875a7b45d376d
                      • Instruction ID: 9031073edf1dea27e6f65c30508d132cbf6cb5060b1cae2ac3a2f6ce84956171
                      • Opcode Fuzzy Hash: 6ceeafbc31bff6ee5c13f935ee695367efee45f475ce5fc1214875a7b45d376d
                      • Instruction Fuzzy Hash: BA11FEB58003498FCB10DF9AC949BDEBBF4AB48324F24881AD519A7350D374A944CFA5
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID: PHdq
                      • API String ID: 0-2991842255
                      • Opcode ID: ba813c4eab9963b153a7e2ea711e605fdd896bbb260cfe62059b6ef9980c5fbf
                      • Instruction ID: b0130a72a0d05aab39b1fddad893cf7ce625a998df92dce4c3ac313f1fb5a407
                      • Opcode Fuzzy Hash: ba813c4eab9963b153a7e2ea711e605fdd896bbb260cfe62059b6ef9980c5fbf
                      • Instruction Fuzzy Hash: 6441AF70F007499FDB61DF6AC8547AEBBB2AF85300F148929E506EB340EB71D946CB91
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID: XPiq
                      • API String ID: 0-3497805733
                      • Opcode ID: 2d8c9eb3a73726b3c27c36962bb73c8b4a77daef5bbfe950674b4ccc683031ac
                      • Instruction ID: defd02a1f5374df102463036e8faba7e5e8c2ce4852a02c82eb3d13a14f935e7
                      • Opcode Fuzzy Hash: 2d8c9eb3a73726b3c27c36962bb73c8b4a77daef5bbfe950674b4ccc683031ac
                      • Instruction Fuzzy Hash: 79416D71F002089FDB55DFA9C814BAEBAF6EF88300F20856AE105EB395DA759C418F95
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID: PHdq
                      • API String ID: 0-2991842255
                      • Opcode ID: f865549321cac29a9ac2d514fcd1bd36946a9d81996463878417e5e1349cd93b
                      • Instruction ID: 062c1960ae3a0df2fbb7916f439c1bf2fa808487a3bfbd67ccc380c7de3d6987
                      • Opcode Fuzzy Hash: f865549321cac29a9ac2d514fcd1bd36946a9d81996463878417e5e1349cd93b
                      • Instruction Fuzzy Hash: 1B31CE30B003058FDB44AF36956466F7BA7EB89700F1048A9E406EB395DF35DE46CBA0
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID: PHdq
                      • API String ID: 0-2991842255
                      • Opcode ID: 34065505f573fc2bcb1806c27c04c0cd11ce633312de4ce4b66525b5289a1780
                      • Instruction ID: d2271b2d79e6e882b2f15e2e41ceb476fcc4225c6329f801c0c918a4dc793514
                      • Opcode Fuzzy Hash: 34065505f573fc2bcb1806c27c04c0cd11ce633312de4ce4b66525b5289a1780
                      • Instruction Fuzzy Hash: 6431B030B003058FDB54AB7AD96466E7AE7AB89300F1048A9E406EB394DF31DD46C7A1
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID: $dq
                      • API String ID: 0-847773763
                      • Opcode ID: ead9485e4d86c677076012484ac7323875b34adf30577dbd3cea136544139d45
                      • Instruction ID: 8a13b6251c00732f7bdedb873cf956580a3a591ceac9daea6114cb3584591fdb
                      • Opcode Fuzzy Hash: ead9485e4d86c677076012484ac7323875b34adf30577dbd3cea136544139d45
                      • Instruction Fuzzy Hash: 5DF0ED76B01205CFEFB48A56ED819BD7374EB60368F1048A3FE09C3154D771CA01C6A2
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a9cee07d6af00babff3c0e10467509a66e82a99c6e77d0501c97c9e65048e701
                      • Instruction ID: cebeb1b41d94ea1d9fd3af10785f7f4cda5c674bb9c472333c06cb6ba65d3196
                      • Opcode Fuzzy Hash: a9cee07d6af00babff3c0e10467509a66e82a99c6e77d0501c97c9e65048e701
                      • Instruction Fuzzy Hash: 22C1A030E002458FDB64DF69D594AADB7F2EF84310F248569E605DB395EB30ED82CB52
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e5d945d2f7641a14578a3bde86a96f5fe714371e74406aa5b8c5fbb88ea709f0
                      • Instruction ID: bb3da0f5a6057ed799c9aeec0b40f697e2c0f296163e4892766b53b3ebed7c34
                      • Opcode Fuzzy Hash: e5d945d2f7641a14578a3bde86a96f5fe714371e74406aa5b8c5fbb88ea709f0
                      • Instruction Fuzzy Hash: E4A16B70B002158FDB54EF79C95076EB7F2EF89200F1085A9E509EB395DB319D82CBA1
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dda79079987a07ffa13f415eef9e8733196efad8413809a6712e37888bab20a9
                      • Instruction ID: b1c141fd99057f075ced00531e84f8e361d88e1b0eababe00d1b8e954f30dae5
                      • Opcode Fuzzy Hash: dda79079987a07ffa13f415eef9e8733196efad8413809a6712e37888bab20a9
                      • Instruction Fuzzy Hash: 0761C371F001214FDF509A7EC88066FBADBAFD4620B254439E90EDB364DEA5ED4287D2
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cb0c0c55e305d538b0012cc43bbce1635dd4c1f83e84cf5f5f0095f903650c8c
                      • Instruction ID: a2c7c30918f1acfffc3e4d0979a97b8e01462f98dcfa913333de1fce0ea8640b
                      • Opcode Fuzzy Hash: cb0c0c55e305d538b0012cc43bbce1635dd4c1f83e84cf5f5f0095f903650c8c
                      • Instruction Fuzzy Hash: 10817030B006099FDB94DFA9C5547AEB7F3EF99314F208529E51ADB394DA30DC428B91
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c61229f41c6f8878bac5dc1eccb0a195772e8849e1a855eca50a961e79a2ac0f
                      • Instruction ID: 478f40666bfd9452c04bc3d403086ae8fa170f5e0223ccd500ed62317066a000
                      • Opcode Fuzzy Hash: c61229f41c6f8878bac5dc1eccb0a195772e8849e1a855eca50a961e79a2ac0f
                      • Instruction Fuzzy Hash: 1B913B34E002198BDF60DF69C840B9DB7B1FF89310F208699E549EB295DB70AA85CF91
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 121e2055f5b73919e89055d06f2e80178a8643124e397ad48cb1cab0712a9588
                      • Instruction ID: b057fe2f7ed6b7deb94e0529bf0b8a6322b010f7a4c768ed0fa32826537585af
                      • Opcode Fuzzy Hash: 121e2055f5b73919e89055d06f2e80178a8643124e397ad48cb1cab0712a9588
                      • Instruction Fuzzy Hash: 1C912A74E002198BDF60DF69C880B9DB7B1FF89310F208599E549FB295DB70AA85CF90
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0272d6b6c493d66a627cb0dbcd0371843fb24979cb05107a64e09b92b587e84f
                      • Instruction ID: fac6e4094d586a468cc6a14af1e1c9f42483e3fa43ac9c9f19635e0f42f92bfe
                      • Opcode Fuzzy Hash: 0272d6b6c493d66a627cb0dbcd0371843fb24979cb05107a64e09b92b587e84f
                      • Instruction Fuzzy Hash: 20713D74E042089FDB54DFAAD984AAEBBF6EF84300F148469E006EB355DB30ED46CB50
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e925d647217206d87286b60921ed3f46195fc055b6e3f87a37e47015e2a68339
                      • Instruction ID: c61781e4bc658ba93322a864d2e46c9b0d1203c4bc9296a92ea9147ce264247d
                      • Opcode Fuzzy Hash: e925d647217206d87286b60921ed3f46195fc055b6e3f87a37e47015e2a68339
                      • Instruction Fuzzy Hash: 07712D74A002099FDB54DFAAD984AAEBBF6FF84300F148469E406EB355DB30ED46CB50
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 57cd1f50fe786679447fe238b97ce4ccfebd247967fb6b3eb63d42d2816e69c4
                      • Instruction ID: 87f21319b1d0ede36d68e0ca4157c6ab4c18950e2955d571a450f4c97e4b5c53
                      • Opcode Fuzzy Hash: 57cd1f50fe786679447fe238b97ce4ccfebd247967fb6b3eb63d42d2816e69c4
                      • Instruction Fuzzy Hash: 3051D031E001059FDB64AB7AF4446ADBBB3FB85315F108869E306EB291DF31D956CB81
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3c68f26710fef94ea2aafb7a862f5d49b7ed6d6fcefdb01fdd40857ede4bfce2
                      • Instruction ID: 6fde86b1666424f1fd63f4f9b2cc318c4ec30e1e783c27f34641c4af48a4a224
                      • Opcode Fuzzy Hash: 3c68f26710fef94ea2aafb7a862f5d49b7ed6d6fcefdb01fdd40857ede4bfce2
                      • Instruction Fuzzy Hash: 5951C570B202145BEFA4666DE85473E36ABD789311F20846AF70AD73A4CF68CC4157A2
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8c073dd755cda2e5dc097f5646901a5892c8716decd52a8db00d64955331c01a
                      • Instruction ID: 50c5cdb0010ea5bddc3274b448ec85c59dd85ce6e6267db5ee2ad5360b1323ee
                      • Opcode Fuzzy Hash: 8c073dd755cda2e5dc097f5646901a5892c8716decd52a8db00d64955331c01a
                      • Instruction Fuzzy Hash: 1951A670B202145BEF64666DE89472F36ABD789311F208469F70ED73E4CF68CC8157A2
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 528108a95f9c398d2369b61944c5bec5879da9cdbe3a611baef90f169e7ea242
                      • Instruction ID: 60b1cce965fd839ee945f3870093c29788af05032753966cfc83b3c2b59bab6b
                      • Opcode Fuzzy Hash: 528108a95f9c398d2369b61944c5bec5879da9cdbe3a611baef90f169e7ea242
                      • Instruction Fuzzy Hash: A1414E71E006098FDF70CE9AD881ABFF7B2FB48310F10492AE256D7640D730A9458B92
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 090ab41a3ef57355469d6b047fb1f4f11652ec80d0d30e55e34d806dbb29f5b3
                      • Instruction ID: 03061107c1213d7c0eed6e6125ebf07dd71292cd18b86648386a5ea0d8531aae
                      • Opcode Fuzzy Hash: 090ab41a3ef57355469d6b047fb1f4f11652ec80d0d30e55e34d806dbb29f5b3
                      • Instruction Fuzzy Hash: AD31C030E146069BCB45CF65C46469EB7B2EF89300F10C969EA16EB350DB71AD42CB50
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8e0a901b07520c20ab62b37ed2c3763326366ed7c6d740e6dcb0f85bea5a30d8
                      • Instruction ID: 9d16d321c43714dbf3ffe6f08de9fa35b159fa5db619f2bb5dd31bd666446dff
                      • Opcode Fuzzy Hash: 8e0a901b07520c20ab62b37ed2c3763326366ed7c6d740e6dcb0f85bea5a30d8
                      • Instruction Fuzzy Hash: D331AE30E1461A9FCB18CF65C86469EB7B2FF89310F10C929EA16EB350DB71AD42CB50
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f5f331eaf48220cb803dc13ef10a89356ad81537b663eb51c1f4ca847934dcfb
                      • Instruction ID: 31342b20556fda12b8d620656009c8f51c09c931ff53cda27b45df904f3c07a0
                      • Opcode Fuzzy Hash: f5f331eaf48220cb803dc13ef10a89356ad81537b663eb51c1f4ca847934dcfb
                      • Instruction Fuzzy Hash: 38318D75E01A159FDB60DF69D880AAEBBF5AB48320F148169F905E7298EB30D8418B94
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9b76ecee6896da591e1f00320012785556b9b0819c730187d5e7785f516541fe
                      • Instruction ID: 12bb1cba62da44b7c7119e75e9af2be14673297247aae49dff618cceb7390654
                      • Opcode Fuzzy Hash: 9b76ecee6896da591e1f00320012785556b9b0819c730187d5e7785f516541fe
                      • Instruction Fuzzy Hash: 90218E75F016199FEB90DF6AD980AAEB7F6FB88710F108065E905E7358EB30D8418B94
                      Memory Dump Source
                      • Source File: 00000008.00000002.4147857627.0000000000DFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_dfd000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d3fa4ad9e451ed1b1696a3643e7e8ec6bdaba26ff9853b92814965cee0c6d566
                      • Instruction ID: c8a91146184c53b6fdee8281c21483ff9cd66a3e90a72950222d33255376be51
                      • Opcode Fuzzy Hash: d3fa4ad9e451ed1b1696a3643e7e8ec6bdaba26ff9853b92814965cee0c6d566
                      • Instruction Fuzzy Hash: B921F571604348AFCB15DF14D9C4B26BBA7FB84314F24C96DEA4A4B381CB36D846DA71
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 835b4229082d748002b9d6445ffc89329e06554e8503e911455b29f8db560a8a
                      • Instruction ID: 0c38cb75bebca796a74fe75de26b0fd6283d3b0f55fecdf20fd1e67cac4a40d3
                      • Opcode Fuzzy Hash: 835b4229082d748002b9d6445ffc89329e06554e8503e911455b29f8db560a8a
                      • Instruction Fuzzy Hash: 8421E471E042054FCF618FABC5C077EFBB1EB46210F15887AE159DB242D2B4D9408792
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7f9090ada7d591b82ca29e2714e9e9ae054e8833d359ad95dc81d03b6b1b3456
                      • Instruction ID: 51c9aaae148c99ef288da6fefae430d88956b2234d9a667d62b8bf020e61cf1a
                      • Opcode Fuzzy Hash: 7f9090ada7d591b82ca29e2714e9e9ae054e8833d359ad95dc81d03b6b1b3456
                      • Instruction Fuzzy Hash: B5112C31F041158FCF51DA6DE850B6EB3E6EB86714F11C466F209D7280DAB1DC058792
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 44373eefa971db222bec87419a684625f3bcab30946a06daad3c7fd43d91bf82
                      • Instruction ID: 26af5904998968174a08235bc944e0ed9c82f81742217aaca5e1ecf8d501e7de
                      • Opcode Fuzzy Hash: 44373eefa971db222bec87419a684625f3bcab30946a06daad3c7fd43d91bf82
                      • Instruction Fuzzy Hash: 1D110431B000289FDB949A79C9106AE77FAEBC8701F008439E80BE7348EE34DC028BD1
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e8ca11fb79a30123d67357f2d71dc9243fd9f3f25ca81a6ca25ca74801473a2b
                      • Instruction ID: 9b1bc33ca15c6c2eabca989715ac482590fe6147fcd2b57eba02e760a3242fa2
                      • Opcode Fuzzy Hash: e8ca11fb79a30123d67357f2d71dc9243fd9f3f25ca81a6ca25ca74801473a2b
                      • Instruction Fuzzy Hash: D411E535F101145FEF60DB29D8507AE7BB6DB85310F0044B9E10ED7284CB319D428FA2
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e43719434fc8a60225b9667216c1f55c33549c7452be2e08d0a4ee2bd4b9719d
                      • Instruction ID: 7908f42a8ac17bc94409450db2c21b602807cf6098bb021f6de4fc5ff0d087a4
                      • Opcode Fuzzy Hash: e43719434fc8a60225b9667216c1f55c33549c7452be2e08d0a4ee2bd4b9719d
                      • Instruction Fuzzy Hash: 61019E31B141100FDB65DABE985472FB7EADBD5720F24C82AF20EC7395E966DC4283A1
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8fd613cd5beb877c92853d6e4b813a74e037a9937f84b21c6b89d708bd19a5f1
                      • Instruction ID: 89333a265d51e1751cd25f1d1acb9a755e32f0fda0eb45c00632c8a628dfdcea
                      • Opcode Fuzzy Hash: 8fd613cd5beb877c92853d6e4b813a74e037a9937f84b21c6b89d708bd19a5f1
                      • Instruction Fuzzy Hash: 1C01F235B181204FDB619A7D945877E67E7DBCA610F18CC2AF20EC7381ED21DC028394
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 768be317d4858cf36d81d91fe002f09b470669525fb5d569fb20a1a175921b77
                      • Instruction ID: 8d762b8f1ed1373b6879b56dce945dcf38c46ac2b0ecf8a391348874fdfec448
                      • Opcode Fuzzy Hash: 768be317d4858cf36d81d91fe002f09b470669525fb5d569fb20a1a175921b77
                      • Instruction Fuzzy Hash: 2E2103B5D00259AFCB00DF9AD884ADEFFB4FB49310F10812AE918A7341C774A944CFA4
                      Memory Dump Source
                      • Source File: 00000008.00000002.4147857627.0000000000DFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_dfd000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5bc96cb8dbab4a459d35c79ebbe5ba2a9dff6c5f08df11ade35b896c854f64ae
                      • Instruction ID: 89a3d56faf61419b3710b468ef6ea4d34ae8c3d5c1c75465403d4d93520a7d9f
                      • Opcode Fuzzy Hash: 5bc96cb8dbab4a459d35c79ebbe5ba2a9dff6c5f08df11ade35b896c854f64ae
                      • Instruction Fuzzy Hash: DD11D075504288DFCB11CF10C5C4B25BB72FB44314F28C6ADD9494B252C73AD84ACF61
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c917bda80f40469604e6ffe99555c48bfaa7529f5da3039a12b81c7459e5fe26
                      • Instruction ID: f2073f2525ee0bb5f7d4c0423d795b776f0ddd8047acabf96316a5cc3b073123
                      • Opcode Fuzzy Hash: c917bda80f40469604e6ffe99555c48bfaa7529f5da3039a12b81c7459e5fe26
                      • Instruction Fuzzy Hash: 5D01DF32B1402A6BEB949A6ACC146AF76BADBC9614F00413AE50AD3285EE64CD0247D1
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6e7e9079986099861db9cb74ca844e2bf5bcbe3ae07a4c4228025889db356bad
                      • Instruction ID: c3b3dd2145ce3c41bfae5929a116634ea3c767067b21bd58aca0e9847feab3fd
                      • Opcode Fuzzy Hash: 6e7e9079986099861db9cb74ca844e2bf5bcbe3ae07a4c4228025889db356bad
                      • Instruction Fuzzy Hash: EA11D0B5D01259AFCB00DF9AD884ACEFFB4FB49310F10852AE918A7340C774A954CFA5
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 236dee69683350b7947b0bf45d1e61ed1e51acd7bed3df6cdc3f4161ba2db23a
                      • Instruction ID: 7ad191f84f04499168277a9f138a553361c90c3be733cc5155907f00e3ccc58f
                      • Opcode Fuzzy Hash: 236dee69683350b7947b0bf45d1e61ed1e51acd7bed3df6cdc3f4161ba2db23a
                      • Instruction Fuzzy Hash: E8018131B101204BDB6495BEA45472FB2EBDBD9720F20D83AF20EC7394EDA2DC424391
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 725e7af12c79d775d17f5b17625071a347cc0eb5c7f27522921cd81162e43995
                      • Instruction ID: 0dd38869ad4fc51978f2e803808f931369d82ce6bff3e7e62c0bd37e5a16bd60
                      • Opcode Fuzzy Hash: 725e7af12c79d775d17f5b17625071a347cc0eb5c7f27522921cd81162e43995
                      • Instruction Fuzzy Hash: 7701FC31E242655FDB349A76EC416ADBBB6EB86314F10866DE5C5E73C4CB319802C780
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72e01795d04450c11cf137fdee3740a7252f3195441447f3c1e95aef5e07d983
                      • Instruction ID: 1f747561fbefb98fffa02f0fa6010a2c8599b4c96b9e62c64fec1256117bbe9c
                      • Opcode Fuzzy Hash: 72e01795d04450c11cf137fdee3740a7252f3195441447f3c1e95aef5e07d983
                      • Instruction Fuzzy Hash: FF018C75B140200BDB659A6E9458B2F63DBDBC9A21F14C829F20AC7384EE21DC024395
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3d0fe3dc4eb77a9b78945b3eb7840cdbeb8d290a2a6eb8fa72b3c5c0e582dfab
                      • Instruction ID: 633bb121875d5768764c8165023e4b015d69bb87f72ce246607c839ad3159ef3
                      • Opcode Fuzzy Hash: 3d0fe3dc4eb77a9b78945b3eb7840cdbeb8d290a2a6eb8fa72b3c5c0e582dfab
                      • Instruction Fuzzy Hash: 9A013130B105154FDB64EA7DD55172EB3D6EB89714F10C869F60AD7384EA72DC018791
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 81d5d4ef0da4d2ae8b5d728281cadddf3754030a8440711e015a0a45fe9463cf
                      • Instruction ID: 28706b7a766a8df0b7ab8b7dafa4a334c8d8d0443870004f8988abf82e5aca55
                      • Opcode Fuzzy Hash: 81d5d4ef0da4d2ae8b5d728281cadddf3754030a8440711e015a0a45fe9463cf
                      • Instruction Fuzzy Hash: 97012D31F202249BDF24DA66E84169DB776F785314F108439F905E7344DB31A801C7C0
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1bbda28d0bfe146ad4e141b851edd85a982a52c26b972b8281fbcc31a7219b3e
                      • Instruction ID: a1ff4d9cf7cb8beade4e295b9717699bd47c8eec7bd4b62922c048c857d85100
                      • Opcode Fuzzy Hash: 1bbda28d0bfe146ad4e141b851edd85a982a52c26b972b8281fbcc31a7219b3e
                      • Instruction Fuzzy Hash: C8F022B0E082C9ABDF11CB718D1579E7BE99B02208F2084A6E444C7143F136CA418342
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID: $dq$$dq$$dq$$dq$$dq$$dq$$dq$$dq$$dq$$dq
                      • API String ID: 0-3623093008
                      • Opcode ID: 31509758f23856e76800474c5d8864f8ce56bbf6bf8df1bc2ae71c5ce66a330e
                      • Instruction ID: 4a33e626406eb7024b428c977717affbc9b62e71a38706a124974898a344c7d2
                      • Opcode Fuzzy Hash: 31509758f23856e76800474c5d8864f8ce56bbf6bf8df1bc2ae71c5ce66a330e
                      • Instruction Fuzzy Hash: A0121D30A012198FDB64DF69C944A9EB7F2FF88309F2095A9D509EB365DB359D81CF80
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID: $dq$$dq$$dq$$dq$$dq$$dq$$dq$$dq
                      • API String ID: 0-634254105
                      • Opcode ID: 1d198cbaacbab5f089a743fcc6eb0376bf95b13e83fb2ce5869389bcea7d160a
                      • Instruction ID: fc61ef044f4eaafff153fefce59c42179de9ee21fba608dae4768f079d159d2a
                      • Opcode Fuzzy Hash: 1d198cbaacbab5f089a743fcc6eb0376bf95b13e83fb2ce5869389bcea7d160a
                      • Instruction Fuzzy Hash: D8916D70A002099FEB68EF6AD555B6EB7B3FF84305F208429E806F7294DB759D41CB90
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID: .5|q$$dq$$dq$$dq$$dq$$dq$$dq
                      • API String ID: 0-3447281907
                      • Opcode ID: a39ccd9e69c78a469a033b5fee619d482bbec2850ecd3ff4e1fa87c0448c3cfa
                      • Instruction ID: dd93169d0a3f1005421d6461dc26947e4c69f7e13cbeed83c0316222823aa96f
                      • Opcode Fuzzy Hash: a39ccd9e69c78a469a033b5fee619d482bbec2850ecd3ff4e1fa87c0448c3cfa
                      • Instruction Fuzzy Hash: 67F15F30A01208CFDB55EFA9D554B6EB7B3FF88305F648569E4059B398DB31AC82CB91
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID: $dq$$dq$$dq$$dq
                      • API String ID: 0-185584874
                      • Opcode ID: d3806524b9a1110a140d314f8da60636ae2aa0453bde708d57ec5a5286bc40b5
                      • Instruction ID: d04ff34842e01a93e279fb6f8319e03c3eba90b2f489df253971b2f5d9a28030
                      • Opcode Fuzzy Hash: d3806524b9a1110a140d314f8da60636ae2aa0453bde708d57ec5a5286bc40b5
                      • Instruction Fuzzy Hash: 20B15D70A012188FDB64EB6AC55476EB7B2FF84301F248869E509EB394DB71DC82CB90
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID: LRdq$LRdq$$dq$$dq
                      • API String ID: 0-340319088
                      • Opcode ID: 9446cb9c29d27ab819e177c0e84f60fff56c558c3ebda7a5494ad398e2fea21e
                      • Instruction ID: 6eb9eb17ba46cd9fed4f9a767ba8714b7bd1f27d894c93f8550452a9c2f2a188
                      • Opcode Fuzzy Hash: 9446cb9c29d27ab819e177c0e84f60fff56c558c3ebda7a5494ad398e2fea21e
                      • Instruction Fuzzy Hash: 4C51C570B002158FDB54EB29D949A6E77F2FF84304F148559F50ADB3A5DA70EC41CBA1
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4163278431.0000000006860000.00000040.00000800.00020000.00000000.sdmp, Offset: 06860000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_6860000_F#U0130YAT TEKL#U0130F#U0130-2400.jbxd
                      Similarity
                      • API ID:
                      • String ID: $dq$$dq$$dq$$dq
                      • API String ID: 0-185584874
                      • Opcode ID: dec50e3fb156129d41d2742016b566da894e097b4103a7fef8b39a318283e66b
                      • Instruction ID: a6244cba56e5b2c2d801fb86fab68a927c08df2eed42e3207a077140a915bf5a
                      • Opcode Fuzzy Hash: dec50e3fb156129d41d2742016b566da894e097b4103a7fef8b39a318283e66b
                      • Instruction Fuzzy Hash: F9518170E112048FDF69EB6AE5806AEB7F3EB89311F208569E905E7344DB71EC41CB91

                      Execution Graph

                      Execution Coverage:8.7%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:26
                      Total number of Limit Nodes:4
                      execution_graph 19976 2e0d5c0 DuplicateHandle 19977 2e0d656 19976->19977 19988 2e0abf0 19991 2e0ace8 19988->19991 19989 2e0abff 19992 2e0ad1c 19991->19992 19993 2e0acf9 19991->19993 19992->19989 19993->19992 19994 2e0af20 GetModuleHandleW 19993->19994 19995 2e0af4d 19994->19995 19995->19989 19978 2df1e58 19979 2df1fe3 19978->19979 19980 2df1e7e 19978->19980 19980->19979 19983 2df24d8 19980->19983 19986 2df24e0 PostMessageW 19980->19986 19984 2df24e0 PostMessageW 19983->19984 19985 2df254c 19984->19985 19985->19980 19987 2df254c 19986->19987 19987->19980 19996 2e0d378 19997 2e0d3be GetCurrentProcess 19996->19997 19999 2e0d410 GetCurrentThread 19997->19999 20000 2e0d409 19997->20000 20001 2e0d446 19999->20001 20002 2e0d44d GetCurrentProcess 19999->20002 20000->19999 20001->20002 20003 2e0d483 20002->20003 20004 2e0d4ab GetCurrentThreadId 20003->20004 20005 2e0d4dc 20004->20005

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 297 2e0d369-2e0d407 GetCurrentProcess 301 2e0d410-2e0d444 GetCurrentThread 297->301 302 2e0d409-2e0d40f 297->302 303 2e0d446-2e0d44c 301->303 304 2e0d44d-2e0d481 GetCurrentProcess 301->304 302->301 303->304 306 2e0d483-2e0d489 304->306 307 2e0d48a-2e0d4a5 call 2e0d548 304->307 306->307 310 2e0d4ab-2e0d4da GetCurrentThreadId 307->310 311 2e0d4e3-2e0d545 310->311 312 2e0d4dc-2e0d4e2 310->312 312->311
                      APIs
                      • GetCurrentProcess.KERNEL32 ref: 02E0D3F6
                      • GetCurrentThread.KERNEL32 ref: 02E0D433
                      • GetCurrentProcess.KERNEL32 ref: 02E0D470
                      • GetCurrentThreadId.KERNEL32 ref: 02E0D4C9
                      Memory Dump Source
                      • Source File: 00000009.00000002.1794001580.0000000002E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_2e00000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: Current$ProcessThread
                      • String ID:
                      • API String ID: 2063062207-0
                      • Opcode ID: 7135b64bc8fdaf7a8ea31b3763de891b3dc157e85dc86d56f9495f7fade037bf
                      • Instruction ID: 18e7bfeff067c665b9a338c0f1020da0fd9df4f14b6372d84751252d6d690d89
                      • Opcode Fuzzy Hash: 7135b64bc8fdaf7a8ea31b3763de891b3dc157e85dc86d56f9495f7fade037bf
                      • Instruction Fuzzy Hash: 3A5168B09003498FDB58DFA9D949BDEBBF1EF48319F20C459E009A72A0DB746984CB25

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 319 2e0d378-2e0d407 GetCurrentProcess 323 2e0d410-2e0d444 GetCurrentThread 319->323 324 2e0d409-2e0d40f 319->324 325 2e0d446-2e0d44c 323->325 326 2e0d44d-2e0d481 GetCurrentProcess 323->326 324->323 325->326 328 2e0d483-2e0d489 326->328 329 2e0d48a-2e0d4a5 call 2e0d548 326->329 328->329 332 2e0d4ab-2e0d4da GetCurrentThreadId 329->332 333 2e0d4e3-2e0d545 332->333 334 2e0d4dc-2e0d4e2 332->334 334->333
                      APIs
                      • GetCurrentProcess.KERNEL32 ref: 02E0D3F6
                      • GetCurrentThread.KERNEL32 ref: 02E0D433
                      • GetCurrentProcess.KERNEL32 ref: 02E0D470
                      • GetCurrentThreadId.KERNEL32 ref: 02E0D4C9
                      Memory Dump Source
                      • Source File: 00000009.00000002.1794001580.0000000002E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_2e00000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: Current$ProcessThread
                      • String ID:
                      • API String ID: 2063062207-0
                      • Opcode ID: 77027de91eab0a6eeebaea28c70d86e87ddc2a93d1a1d61911f847c9a26fc2ea
                      • Instruction ID: a077a29a726420a7d6c0c9de5b248cb6ee6a5405505decaf4717ad3687cfa84c
                      • Opcode Fuzzy Hash: 77027de91eab0a6eeebaea28c70d86e87ddc2a93d1a1d61911f847c9a26fc2ea
                      • Instruction Fuzzy Hash: 945147B09003498FDB18DFA9D989BDEBBF1EF48314F20C459E409A73A0DB746985CB65

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 407 2e0ace8-2e0acf7 408 2e0ad23-2e0ad27 407->408 409 2e0acf9-2e0ad06 call 2e09314 407->409 411 2e0ad29-2e0ad33 408->411 412 2e0ad3b-2e0ad7c 408->412 415 2e0ad08 409->415 416 2e0ad1c 409->416 411->412 418 2e0ad89-2e0ad97 412->418 419 2e0ad7e-2e0ad86 412->419 463 2e0ad0e call 2e0af80 415->463 464 2e0ad0e call 2e0af70 415->464 416->408 420 2e0ad99-2e0ad9e 418->420 421 2e0adbb-2e0adbd 418->421 419->418 423 2e0ada0-2e0ada7 call 2e0a050 420->423 424 2e0ada9 420->424 426 2e0adc0-2e0adc7 421->426 422 2e0ad14-2e0ad16 422->416 425 2e0ae58-2e0af18 422->425 428 2e0adab-2e0adb9 423->428 424->428 458 2e0af20-2e0af4b GetModuleHandleW 425->458 459 2e0af1a-2e0af1d 425->459 429 2e0add4-2e0addb 426->429 430 2e0adc9-2e0add1 426->430 428->426 433 2e0ade8-2e0adf1 call 2e0a060 429->433 434 2e0addd-2e0ade5 429->434 430->429 438 2e0adf3-2e0adfb 433->438 439 2e0adfe-2e0ae03 433->439 434->433 438->439 440 2e0ae21-2e0ae25 439->440 441 2e0ae05-2e0ae0c 439->441 446 2e0ae2b-2e0ae2e 440->446 441->440 443 2e0ae0e-2e0ae1e call 2e0a070 call 2e0a080 441->443 443->440 448 2e0ae30-2e0ae4e 446->448 449 2e0ae51-2e0ae57 446->449 448->449 460 2e0af54-2e0af68 458->460 461 2e0af4d-2e0af53 458->461 459->458 461->460 463->422 464->422
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 02E0AF3E
                      Memory Dump Source
                      • Source File: 00000009.00000002.1794001580.0000000002E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_2e00000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: 8ff33e788bf3655d629ee87d338d5879221c2a5d0bd36caee309c1cd85317650
                      • Instruction ID: f048ceeb0cfd1fd2b3c3d970037143eac1b0bc2d2182f0cb202389c68e141565
                      • Opcode Fuzzy Hash: 8ff33e788bf3655d629ee87d338d5879221c2a5d0bd36caee309c1cd85317650
                      • Instruction Fuzzy Hash: BB712770A007098FD724DF29D48575ABBF1FF88308F10892DD58A97B90DB75E886CB90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 465 2e044f0-2e059b9 CreateActCtxA 468 2e059c2-2e05a1c 465->468 469 2e059bb-2e059c1 465->469 476 2e05a2b-2e05a2f 468->476 477 2e05a1e-2e05a21 468->477 469->468 478 2e05a40-2e05a70 476->478 479 2e05a31-2e05a3d 476->479 477->476 483 2e05a22-2e05a2a 478->483 484 2e05a72-2e05af4 478->484 479->478 483->476
                      APIs
                      • CreateActCtxA.KERNEL32(?), ref: 02E059A9
                      Memory Dump Source
                      • Source File: 00000009.00000002.1794001580.0000000002E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_2e00000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: 5f5bc22fc9b4a5e506ee8eefde3d10719da3074ba9ad6249bbb56ab913c688fa
                      • Instruction ID: 1c3e45add6a0409ff404b6824037699d536fec5edf95dc34469f03421e800c80
                      • Opcode Fuzzy Hash: 5f5bc22fc9b4a5e506ee8eefde3d10719da3074ba9ad6249bbb56ab913c688fa
                      • Instruction Fuzzy Hash: 9141F4B0C00719CBDB24DFA9C884BDDBBB1BF48304F60806AD409AB251DB756A4ACF91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 486 2e058ed-2e059b9 CreateActCtxA 488 2e059c2-2e05a1c 486->488 489 2e059bb-2e059c1 486->489 496 2e05a2b-2e05a2f 488->496 497 2e05a1e-2e05a21 488->497 489->488 498 2e05a40-2e05a70 496->498 499 2e05a31-2e05a3d 496->499 497->496 503 2e05a22-2e05a2a 498->503 504 2e05a72-2e05af4 498->504 499->498 503->496
                      APIs
                      • CreateActCtxA.KERNEL32(?), ref: 02E059A9
                      Memory Dump Source
                      • Source File: 00000009.00000002.1794001580.0000000002E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_2e00000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: b25dea0c00fb0ae3adf54bf48e9255a280ebad86c3cbd116f3a5b0d0688b2dcb
                      • Instruction ID: 8a4f75b45a0ce06125e9ecf070d72794e3e7e5313c870d6bd0b995dd34521c23
                      • Opcode Fuzzy Hash: b25dea0c00fb0ae3adf54bf48e9255a280ebad86c3cbd116f3a5b0d0688b2dcb
                      • Instruction Fuzzy Hash: 0E41E2B0C00719CBDB24DFA9C884BDDBBB1BF49304F60805AD419AB251DB756A4ACF91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 506 2e0d5b8-2e0d5bb 507 2e0d5c0-2e0d654 DuplicateHandle 506->507 508 2e0d656-2e0d65c 507->508 509 2e0d65d-2e0d67a 507->509 508->509
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02E0D647
                      Memory Dump Source
                      • Source File: 00000009.00000002.1794001580.0000000002E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_2e00000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: fa96bb10902b3c9e4ebcdce2bbfd80a4aa70115329c45bcff6c2c707d54afae9
                      • Instruction ID: fb7c09076edf2b9b11cc364333b48d01a2da281f29c28faaf946c17d4461f4a2
                      • Opcode Fuzzy Hash: fa96bb10902b3c9e4ebcdce2bbfd80a4aa70115329c45bcff6c2c707d54afae9
                      • Instruction Fuzzy Hash: 742116B59002089FDB10CF9AD884ADEBBF5FB48320F14801AE958A3350D378A941CFA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 512 2e0d5c0-2e0d654 DuplicateHandle 513 2e0d656-2e0d65c 512->513 514 2e0d65d-2e0d67a 512->514 513->514
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02E0D647
                      Memory Dump Source
                      • Source File: 00000009.00000002.1794001580.0000000002E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_2e00000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 585fd9fd80c935499aa5654c87f3f06476b6cde2f379c74a685b8ed08d5ddd02
                      • Instruction ID: 1df44f0c58d293c35a60395713268a811304d4c689f203089324fa0317de192f
                      • Opcode Fuzzy Hash: 585fd9fd80c935499aa5654c87f3f06476b6cde2f379c74a685b8ed08d5ddd02
                      • Instruction Fuzzy Hash: 9121C4B59002489FDB10CF9AD984ADEBBF5EB48310F14841AE918A3350D374A954CFA5

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 517 2df24d8-2df254a PostMessageW 519 2df254c-2df2552 517->519 520 2df2553-2df2567 517->520 519->520
                      APIs
                      • PostMessageW.USER32(?,?,?,?), ref: 02DF253D
                      Memory Dump Source
                      • Source File: 00000009.00000002.1793970297.0000000002DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_2df0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: MessagePost
                      • String ID:
                      • API String ID: 410705778-0
                      • Opcode ID: e1ee96948f412404c9be95b5b32fbf4d6771a46d26226e16f8fb1975538fa03c
                      • Instruction ID: 8ed718124a7d7e3fd27fd16d923b12e9eb003939500f12de81fbdbe9c7c772ec
                      • Opcode Fuzzy Hash: e1ee96948f412404c9be95b5b32fbf4d6771a46d26226e16f8fb1975538fa03c
                      • Instruction Fuzzy Hash: E71125B58003499FCB10DF9AD449BDEFBF8EB49324F10845AD958A7340C374AA84CFA1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 522 2e0aed8-2e0af18 523 2e0af20-2e0af4b GetModuleHandleW 522->523 524 2e0af1a-2e0af1d 522->524 525 2e0af54-2e0af68 523->525 526 2e0af4d-2e0af53 523->526 524->523 526->525
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 02E0AF3E
                      Memory Dump Source
                      • Source File: 00000009.00000002.1794001580.0000000002E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_2e00000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: bc2bdbdf3eb0c30f83feca2d9e1b57c617e2ea64c8fe8465ba807bf590ba8a29
                      • Instruction ID: 41783ccdaac71cfb058b3c44104f0c22694226ce0f54e2b4b58f139d03f865ce
                      • Opcode Fuzzy Hash: bc2bdbdf3eb0c30f83feca2d9e1b57c617e2ea64c8fe8465ba807bf590ba8a29
                      • Instruction Fuzzy Hash: 171102B6C003498FCB10DF9AC444ADEFBF5EB88214F10846AD529A7240C379A545CFA1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 528 2df24e0-2df254a PostMessageW 529 2df254c-2df2552 528->529 530 2df2553-2df2567 528->530 529->530
                      APIs
                      • PostMessageW.USER32(?,?,?,?), ref: 02DF253D
                      Memory Dump Source
                      • Source File: 00000009.00000002.1793970297.0000000002DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_2df0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: MessagePost
                      • String ID:
                      • API String ID: 410705778-0
                      • Opcode ID: bdffe0d58e205e970b6e849c3d776df5b1425ac19ce6a5c89b17277bf2349658
                      • Instruction ID: 0423f1e2e23a842c20b2122da97b5ad8c1bde85bda6a9add5858cda9066bea3e
                      • Opcode Fuzzy Hash: bdffe0d58e205e970b6e849c3d776df5b1425ac19ce6a5c89b17277bf2349658
                      • Instruction Fuzzy Hash: 0F11E5B58003499FDB10DF9AD949BDEFBF8EB48324F108459D918A7340C375AA44CFA5
                      Memory Dump Source
                      • Source File: 00000009.00000002.1793182771.00000000013DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013DD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_13dd000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3bb85429c62af6c35b45fbb66e2ff905b584a4a112057453a8ed46eb58f0cfde
                      • Instruction ID: 35b88f5fe6ff8700c261c936a7dfb7a66cb2b2524c0fd1f0ed636fbd8fb49ca2
                      • Opcode Fuzzy Hash: 3bb85429c62af6c35b45fbb66e2ff905b584a4a112057453a8ed46eb58f0cfde
                      • Instruction Fuzzy Hash: 572148B2504204DFDB01DF58E9C0B66BF79FB94328F20C56CD90A1B286C736E416C7A1
                      Memory Dump Source
                      • Source File: 00000009.00000002.1793182771.00000000013DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013DD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_13dd000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b1440b566782f7784e6dacea3c211b0f24270c7bcf04ac3110ebccbea8d0e503
                      • Instruction ID: 6a63522c1a95443fac9cd7026c4166837ba22e6e3d202ad01b959608211abe43
                      • Opcode Fuzzy Hash: b1440b566782f7784e6dacea3c211b0f24270c7bcf04ac3110ebccbea8d0e503
                      • Instruction Fuzzy Hash: E12128B2504244DFDB05DF58E9C0B26BF66FB8431CF64C569D9090B696C336D416C7A1
                      Memory Dump Source
                      • Source File: 00000009.00000002.1793366419.0000000002CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CDD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_2cdd000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8f305934551817f53debb4e46490ed0e466f7c5da93610992b698f0de8c571af
                      • Instruction ID: a560acebf99be41e1dff95dc686404a7fc2ef50bda29ecf466806408477c1639
                      • Opcode Fuzzy Hash: 8f305934551817f53debb4e46490ed0e466f7c5da93610992b698f0de8c571af
                      • Instruction Fuzzy Hash: C721D376A04200DFDB14DF14D9C4B26BBA5EBC4314F64C56DDA0B4B246C336E407CAA1
                      Memory Dump Source
                      • Source File: 00000009.00000002.1793366419.0000000002CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CDD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_2cdd000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cd8ec9fbf06fae7f3982ec462b56835fb9c2a215b6b6933eae29d6ce9573a86f
                      • Instruction ID: ddb7ae2047ae58cff6dbdc9cde622d5eaa82a2626e14ca0da7a1d8e8677e4399
                      • Opcode Fuzzy Hash: cd8ec9fbf06fae7f3982ec462b56835fb9c2a215b6b6933eae29d6ce9573a86f
                      • Instruction Fuzzy Hash: 7E210772A04200EFDB05DF14D9C4B26BBA5FB84314F24C6ADEA0B4B352C336D846CB61
                      Memory Dump Source
                      • Source File: 00000009.00000002.1793366419.0000000002CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CDD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_2cdd000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cc4697120a12159fb6cd9430f2ace123dc43d0a05c3346ae7eb26adfdd51156d
                      • Instruction ID: 08d503fe97cd3711fc3a6803713bbceeb0a47c9613c97b77adead4373cd68f46
                      • Opcode Fuzzy Hash: cc4697120a12159fb6cd9430f2ace123dc43d0a05c3346ae7eb26adfdd51156d
                      • Instruction Fuzzy Hash: A121A7755093C08FC712CF24D594715BF71EB86214F28C5DAD9498F6A7C33AD80ACBA2
                      Memory Dump Source
                      • Source File: 00000009.00000002.1793182771.00000000013DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013DD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_13dd000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3d7739f24a7f613363dc0741c1dd4920fb0d2c4cd1d09143030fc2081c46ff73
                      • Instruction ID: 4316cf004986cd64c4c8e603227da49c64e32b4f153441f155156687bc871353
                      • Opcode Fuzzy Hash: 3d7739f24a7f613363dc0741c1dd4920fb0d2c4cd1d09143030fc2081c46ff73
                      • Instruction Fuzzy Hash: 43112676504280CFCB12CF54D5C4B16BF72FB84328F24C6A9D8090B297C336D45ACBA1
                      Memory Dump Source
                      • Source File: 00000009.00000002.1793182771.00000000013DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013DD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_13dd000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3d7739f24a7f613363dc0741c1dd4920fb0d2c4cd1d09143030fc2081c46ff73
                      • Instruction ID: 6759f316db75e98a0c6e2a152f341b78cdc9d312666c6783787578e815fb83ec
                      • Opcode Fuzzy Hash: 3d7739f24a7f613363dc0741c1dd4920fb0d2c4cd1d09143030fc2081c46ff73
                      • Instruction Fuzzy Hash: 18110376504240DFDB12CF44D5C4B56BF72FB84328F24C2A9D9090B297C33AE45ACBA1
                      Memory Dump Source
                      • Source File: 00000009.00000002.1793366419.0000000002CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CDD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_2cdd000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5bc96cb8dbab4a459d35c79ebbe5ba2a9dff6c5f08df11ade35b896c854f64ae
                      • Instruction ID: 0ce6f51ce69ba3bcb7e2258d17001b30ce867a28c81b6e2c3a42badde3839c87
                      • Opcode Fuzzy Hash: 5bc96cb8dbab4a459d35c79ebbe5ba2a9dff6c5f08df11ade35b896c854f64ae
                      • Instruction Fuzzy Hash: 4711DD76904280DFCB02DF10C5C4B15FBB2FB84324F24C6ADD94A4B696C33AD84ACB61
                      Memory Dump Source
                      • Source File: 00000009.00000002.1793182771.00000000013DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013DD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_13dd000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e1687469b397039290b2b0d55cb95d9e2d02022e6c689e26ce1360442d782714
                      • Instruction ID: 4645d53df802ca3009a34462bbad88ee54b512a9b3900982143890010b98209c
                      • Opcode Fuzzy Hash: e1687469b397039290b2b0d55cb95d9e2d02022e6c689e26ce1360442d782714
                      • Instruction Fuzzy Hash: C101F7720093849AE7114EA9EC84B66BFD8DF51329F19C89AED0D0A2C6C3399840C6B1
                      Memory Dump Source
                      • Source File: 00000009.00000002.1793182771.00000000013DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013DD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_13dd000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a9aa1ae30b550d3139db7f49fdfc76249f18d1e38eef7e7e438f715f02cd6fe0
                      • Instruction ID: 270471258fd59faf977684c2a51c516b9699a083ed778ff10ce7c1493e2e283a
                      • Opcode Fuzzy Hash: a9aa1ae30b550d3139db7f49fdfc76249f18d1e38eef7e7e438f715f02cd6fe0
                      • Instruction Fuzzy Hash: 9FF06272405384AEE7218E5ADC84B62FFA8EF51635F19C55AFD084B2C6C379A844CAB1

                      Execution Graph

                      Execution Coverage:11.4%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:149
                      Total number of Limit Nodes:14
                      execution_graph 39119 7156ed0 39120 7156ed1 GetCurrentProcess 39119->39120 39122 7156f68 GetCurrentThread 39120->39122 39126 7156f61 39120->39126 39123 7156fa5 GetCurrentProcess 39122->39123 39124 7156f9e 39122->39124 39125 7156fdb 39123->39125 39124->39123 39127 7157003 GetCurrentThreadId 39125->39127 39126->39122 39128 7157034 39127->39128 39129 7158cf0 39130 7158d4a OleGetClipboard 39129->39130 39131 7158d8a 39130->39131 39132 18e7ee8 39133 18e7ee9 CheckRemoteDebuggerPresent 39132->39133 39135 18e7f6e 39133->39135 39136 18e0848 39138 18e0849 39136->39138 39137 18e091b 39138->39137 39140 18e1390 39138->39140 39142 18e1393 39140->39142 39141 18e14c6 39141->39138 39142->39141 39144 18e8d80 39142->39144 39145 18e8d8a 39144->39145 39146 18e8da4 39145->39146 39149 71cf6e0 39145->39149 39153 71cf6d1 39145->39153 39146->39142 39151 71cf6f5 39149->39151 39150 71cf90a 39150->39146 39151->39150 39152 71cfd28 GlobalMemoryStatusEx GlobalMemoryStatusEx 39151->39152 39152->39151 39155 71cf6f5 39153->39155 39154 71cf90a 39154->39146 39155->39154 39156 71cfd28 GlobalMemoryStatusEx GlobalMemoryStatusEx 39155->39156 39156->39155 39157 7157118 DuplicateHandle 39158 71571ae 39157->39158 39159 7158b58 39160 7158b63 39159->39160 39161 7158b73 39160->39161 39163 7156eb4 39160->39163 39164 7158ba8 OleInitialize 39163->39164 39165 7158c0c 39164->39165 39165->39161 39166 189d044 39167 189d05c 39166->39167 39168 189d0b6 39167->39168 39175 7151da4 39167->39175 39179 7157d1e 39167->39179 39187 7153682 39167->39187 39193 71537b0 39167->39193 39197 7153690 39167->39197 39203 7151db4 39167->39203 39176 7151daf 39175->39176 39211 7151ddc 39176->39211 39178 71537c7 39178->39168 39181 7157d20 39179->39181 39180 7157d81 39229 7156d14 39180->39229 39181->39180 39183 7157d71 39181->39183 39219 7157e98 39183->39219 39224 7157ea8 39183->39224 39184 7157d7f 39188 7153690 39187->39188 39189 7151da4 GetModuleHandleW 39188->39189 39190 71536c2 39189->39190 39191 7151db4 2 API calls 39190->39191 39192 71536d7 39191->39192 39192->39168 39194 71537c0 39193->39194 39195 7151ddc GetModuleHandleW 39194->39195 39196 71537c7 39195->39196 39196->39168 39198 71536b6 39197->39198 39199 7151da4 GetModuleHandleW 39198->39199 39200 71536c2 39199->39200 39201 7151db4 2 API calls 39200->39201 39202 71536d7 39201->39202 39202->39168 39204 7151dbf 39203->39204 39205 7157d81 39204->39205 39207 7157d71 39204->39207 39206 7156d14 2 API calls 39205->39206 39208 7157d7f 39206->39208 39209 7157e98 2 API calls 39207->39209 39210 7157ea8 2 API calls 39207->39210 39209->39208 39210->39208 39212 7151de7 39211->39212 39214 7153897 39212->39214 39215 7150a44 39212->39215 39216 7152430 GetModuleHandleW 39215->39216 39218 71524a5 39216->39218 39218->39214 39221 7157ea8 39219->39221 39220 7156d14 2 API calls 39220->39221 39221->39220 39222 7157f92 39221->39222 39236 7158370 39221->39236 39222->39184 39225 7157eb6 39224->39225 39226 7156d14 2 API calls 39225->39226 39227 7157f92 39225->39227 39228 7158370 KiUserCallbackDispatcher 39225->39228 39226->39225 39227->39184 39228->39225 39230 7156d1f 39229->39230 39231 7158094 39230->39231 39232 7157fea 39230->39232 39233 7151db4 KiUserCallbackDispatcher 39231->39233 39234 7158042 CallWindowProcW 39232->39234 39235 7157ff1 39232->39235 39233->39235 39234->39235 39235->39184 39237 7158303 39236->39237 39239 715837e 39236->39239 39240 7158311 KiUserCallbackDispatcher 39237->39240 39239->39221 39240->39236 39241 715a7e8 39242 715a82c SetWindowsHookExA 39241->39242 39244 715a872 39242->39244 39245 7150448 39246 715045a 39245->39246 39249 715050b 39246->39249 39251 71502d4 39246->39251 39248 71504d1 39256 71502f4 39248->39256 39252 71502df 39251->39252 39260 71515f3 39252->39260 39268 7151608 39252->39268 39253 71506aa 39253->39248 39257 71502ff 39256->39257 39259 71582cb 39257->39259 39293 7156d6c 39257->39293 39259->39249 39261 7151608 39260->39261 39276 7151b71 39261->39276 39262 71516b6 39263 7150a44 GetModuleHandleW 39262->39263 39266 71516e2 39262->39266 39264 7151726 39263->39264 39265 71534ce CreateWindowExW 39264->39265 39264->39266 39265->39266 39269 7151633 39268->39269 39274 7151b71 GetModuleHandleW 39269->39274 39270 71516b6 39271 7150a44 GetModuleHandleW 39270->39271 39273 71516e2 39270->39273 39272 7151726 39271->39272 39272->39273 39288 71534ce 39272->39288 39274->39270 39277 7151bad 39276->39277 39278 7151c2e 39277->39278 39280 7152157 39277->39280 39281 7152162 39280->39281 39282 7150a44 GetModuleHandleW 39281->39282 39283 7152282 39282->39283 39284 7150a44 GetModuleHandleW 39283->39284 39287 71522fc 39283->39287 39285 71522d0 39284->39285 39286 7150a44 GetModuleHandleW 39285->39286 39285->39287 39286->39287 39287->39278 39289 71534d2 CreateWindowExW 39288->39289 39290 715349c 39288->39290 39292 71535fc 39289->39292 39290->39273 39294 71582e0 KiUserCallbackDispatcher 39293->39294 39296 715834e 39294->39296 39296->39257 39297 715242a 39298 7152430 GetModuleHandleW 39297->39298 39300 71524a5 39298->39300

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 125 71c3130-71c3151 126 71c3153-71c3156 125->126 127 71c315c-71c317b 126->127 128 71c38f7-71c38fa 126->128 138 71c317d-71c3180 127->138 139 71c3194-71c319e 127->139 129 71c38fc-71c391b 128->129 130 71c3920-71c3922 128->130 129->130 132 71c3929-71c392c 130->132 133 71c3924 130->133 132->126 135 71c3932-71c393b 132->135 133->132 138->139 140 71c3182-71c3192 138->140 142 71c31a4-71c31b3 139->142 140->142 251 71c31b5 call 71c3948 142->251 252 71c31b5 call 71c3950 142->252 144 71c31ba-71c31bf 145 71c31cc-71c34a9 144->145 146 71c31c1-71c31c7 144->146 167 71c34af-71c355e 145->167 168 71c38e9-71c38f6 145->168 146->135 177 71c3587 167->177 178 71c3560-71c3585 167->178 180 71c3590-71c35a3 177->180 178->180 182 71c35a9-71c35cb 180->182 183 71c38d0-71c38dc 180->183 182->183 186 71c35d1-71c35db 182->186 183->167 184 71c38e2 183->184 184->168 186->183 187 71c35e1-71c35ec 186->187 187->183 188 71c35f2-71c36c8 187->188 200 71c36ca-71c36cc 188->200 201 71c36d6-71c3706 188->201 200->201 205 71c3708-71c370a 201->205 206 71c3714-71c3720 201->206 205->206 207 71c3780-71c3784 206->207 208 71c3722-71c3726 206->208 209 71c378a-71c37c6 207->209 210 71c38c1-71c38ca 207->210 208->207 211 71c3728-71c3752 208->211 222 71c37c8-71c37ca 209->222 223 71c37d4-71c37e2 209->223 210->183 210->188 218 71c3754-71c3756 211->218 219 71c3760-71c377d 211->219 218->219 219->207 222->223 225 71c37f9-71c3804 223->225 226 71c37e4-71c37ef 223->226 230 71c381c-71c382d 225->230 231 71c3806-71c380c 225->231 226->225 229 71c37f1 226->229 229->225 235 71c382f-71c3835 230->235 236 71c3845-71c3851 230->236 232 71c380e 231->232 233 71c3810-71c3812 231->233 232->230 233->230 237 71c3839-71c383b 235->237 238 71c3837 235->238 240 71c3869-71c38ba 236->240 241 71c3853-71c3859 236->241 237->236 238->236 240->210 242 71c385d-71c385f 241->242 243 71c385b 241->243 242->240 243->240 251->144 252->144
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID: $dq$$dq$$dq$$dq$$dq$$dq
                      • API String ID: 0-2331353128
                      • Opcode ID: dbfdf3bd2f835377d00e4047bddffc3ae9e486a5d07afa3645eeebca18e766fb
                      • Instruction ID: f56be6376383d08114ef026234773d968de576f04a7e64a72523795e9df2a9f7
                      • Opcode Fuzzy Hash: dbfdf3bd2f835377d00e4047bddffc3ae9e486a5d07afa3645eeebca18e766fb
                      • Instruction Fuzzy Hash: BA324F70E1071A8FDB14EFB8C9545ADB7B2FF99300F20D669D409A7264EB309E85CB91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 985 71c7a40-71c7a5e 986 71c7a60-71c7a63 985->986 987 71c7a65-71c7a6f 986->987 988 71c7a70-71c7a73 986->988 989 71c7a94-71c7a97 988->989 990 71c7a75-71c7a8f 988->990 991 71c7aae-71c7ab1 989->991 992 71c7a99-71c7aa7 989->992 990->989 993 71c7ad4-71c7ad6 991->993 994 71c7ab3-71c7acf 991->994 999 71c7ae6-71c7afc 992->999 1001 71c7aa9 992->1001 997 71c7add-71c7ae0 993->997 998 71c7ad8 993->998 994->993 997->986 997->999 998->997 1005 71c7d17-71c7d21 999->1005 1006 71c7b02-71c7b0b 999->1006 1001->991 1007 71c7b11-71c7b2e 1006->1007 1008 71c7d22-71c7d57 1006->1008 1017 71c7d04-71c7d11 1007->1017 1018 71c7b34-71c7b5c 1007->1018 1011 71c7d59-71c7d5c 1008->1011 1013 71c7d5e-71c7d7a 1011->1013 1014 71c7d7f-71c7d82 1011->1014 1013->1014 1015 71c7d88-71c7d97 1014->1015 1016 71c7fb7-71c7fba 1014->1016 1027 71c7d99-71c7db4 1015->1027 1028 71c7db6-71c7dfa 1015->1028 1019 71c8065-71c8067 1016->1019 1020 71c7fc0-71c7fcc 1016->1020 1017->1005 1017->1006 1018->1017 1040 71c7b62-71c7b6b 1018->1040 1023 71c806e-71c8071 1019->1023 1024 71c8069 1019->1024 1030 71c7fd7-71c7fd9 1020->1030 1023->1011 1029 71c8077-71c8080 1023->1029 1024->1023 1027->1028 1042 71c7f8b-71c7fa1 1028->1042 1043 71c7e00-71c7e11 1028->1043 1031 71c7fdb-71c7fe1 1030->1031 1032 71c7ff1-71c7ff5 1030->1032 1038 71c7fe5-71c7fe7 1031->1038 1039 71c7fe3 1031->1039 1034 71c7ff7-71c8001 1032->1034 1035 71c8003 1032->1035 1041 71c8008-71c800a 1034->1041 1035->1041 1038->1032 1039->1032 1040->1008 1044 71c7b71-71c7b8d 1040->1044 1046 71c800c-71c800f 1041->1046 1047 71c801b-71c8054 1041->1047 1042->1016 1052 71c7f76-71c7f85 1043->1052 1053 71c7e17-71c7e34 1043->1053 1054 71c7cf2-71c7cfe 1044->1054 1055 71c7b93-71c7bbd 1044->1055 1046->1029 1047->1015 1067 71c805a-71c8064 1047->1067 1052->1042 1052->1043 1053->1052 1064 71c7e3a-71c7f30 call 71c6268 1053->1064 1054->1017 1054->1040 1069 71c7ce8-71c7ced 1055->1069 1070 71c7bc3-71c7beb 1055->1070 1118 71c7f3e 1064->1118 1119 71c7f32-71c7f3c 1064->1119 1069->1054 1070->1069 1076 71c7bf1-71c7c1f 1070->1076 1076->1069 1082 71c7c25-71c7c2e 1076->1082 1082->1069 1083 71c7c34-71c7c66 1082->1083 1091 71c7c68-71c7c6c 1083->1091 1092 71c7c71-71c7c8d 1083->1092 1091->1069 1093 71c7c6e 1091->1093 1092->1054 1094 71c7c8f-71c7ce6 call 71c6268 1092->1094 1093->1092 1094->1054 1120 71c7f43-71c7f45 1118->1120 1119->1120 1120->1052 1121 71c7f47-71c7f4c 1120->1121 1122 71c7f4e-71c7f58 1121->1122 1123 71c7f5a 1121->1123 1124 71c7f5f-71c7f61 1122->1124 1123->1124 1124->1052 1125 71c7f63-71c7f6f 1124->1125 1125->1052
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID: $dq$$dq
                      • API String ID: 0-2340669324
                      • Opcode ID: 20d85aef58a03205ba92751e289113b0bac6d29817811a7e8a51a3dbe4f85822
                      • Instruction ID: 13eeeee7ca0fdda20ddf3b0a70c19ba9dfc92c512172e8f064bf8fc1db021118
                      • Opcode Fuzzy Hash: 20d85aef58a03205ba92751e289113b0bac6d29817811a7e8a51a3dbe4f85822
                      • Instruction Fuzzy Hash: B402BD70B002169FDB15DBA8D590AAEB7E6FF98310F248529E805DB3D4DB74ED42CB90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1127 71c59ab-71c59d0 1128 71c59d2-71c59d5 1127->1128 1129 71c59e4-71c59e7 1128->1129 1130 71c59d7-71c59dd 1128->1130 1129->1130 1133 71c59e9-71c59ec 1129->1133 1131 71c59df 1130->1131 1132 71c5a04-71c5a23 1130->1132 1131->1129 1145 71c5a28-71c5a2e 1132->1145 1146 71c5a25 1132->1146 1134 71c59ee-71c59f0 1133->1134 1135 71c59f3-71c59f6 1133->1135 1134->1135 1137 71c59ff-71c5a02 1135->1137 1138 71c59f8-71c59fa 1135->1138 1137->1132 1139 71c5a39-71c5a3c 1137->1139 1138->1137 1141 71c5a3e-71c5a43 1139->1141 1142 71c5a5a-71c5a5c 1139->1142 1147 71c5a48-71c5a55 1141->1147 1148 71c5a45 1141->1148 1143 71c5a5e 1142->1143 1144 71c5a63-71c5a66 1142->1144 1143->1144 1144->1128 1149 71c5a6c-71c5a74 1144->1149 1150 71c5a75-71c5ab2 1145->1150 1151 71c5a30-71c5a34 1145->1151 1146->1145 1147->1142 1148->1147 1154 71c5ab4-71c5ab7 1150->1154 1151->1139 1155 71c5abd-71c5ac4 1154->1155 1156 71c5c31-71c5c34 1154->1156 1159 71c5aca-71c5b11 1155->1159 1160 71c5c12-71c5c25 1155->1160 1157 71c5c36-71c5c3f 1156->1157 1158 71c5c42-71c5c45 1156->1158 1161 71c5c5a-71c5c5d 1158->1161 1162 71c5c47-71c5c55 1158->1162 1180 71c5b13-71c5b22 1159->1180 1165 71c5c5f-71c5c66 1161->1165 1166 71c5c71-71c5c74 1161->1166 1162->1161 1165->1155 1168 71c5c6c 1165->1168 1169 71c5c76-71c5c8b 1166->1169 1170 71c5c90-71c5c92 1166->1170 1168->1166 1169->1170 1171 71c5c99-71c5c9c 1170->1171 1172 71c5c94 1170->1172 1171->1154 1175 71c5ca2-71c5cac 1171->1175 1172->1171 1182 71c5caf-71c5cc0 1180->1182 1183 71c5b28-71c5b3e 1180->1183 1187 71c5cf9-71c5d01 1182->1187 1188 71c5cc2-71c5cea 1182->1188 1183->1182 1186 71c5b44-71c5b4c 1183->1186 1186->1180 1189 71c5b4e-71c5b54 1186->1189 1194 71c5d03-71c5d06 1187->1194 1190 71c5cec-71c5cef 1188->1190 1191 71c5bb4-71c5c04 call 71c47a8 1189->1191 1192 71c5b56-71c5b59 1189->1192 1193 71c5cf1-71c5cf8 1190->1193 1190->1194 1244 71c5c0f 1191->1244 1245 71c5c06 1191->1245 1192->1182 1198 71c5b5f-71c5b6a 1192->1198 1193->1187 1196 71c5d08-71c5d1b 1194->1196 1197 71c5d20-71c5d23 1194->1197 1196->1197 1200 71c5d29-71c5d30 1197->1200 1201 71c5db4-71c5db7 1197->1201 1198->1182 1202 71c5b70-71c5b7a 1198->1202 1204 71c5e44-71c5e57 1200->1204 1205 71c5d36-71c5da1 1200->1205 1206 71c5dcf-71c5dd2 1201->1206 1207 71c5db9-71c5dca 1201->1207 1202->1182 1208 71c5b80-71c5b8a 1202->1208 1250 71c5daa-71c5db1 1205->1250 1209 71c5de8-71c5deb 1206->1209 1210 71c5dd4-71c5de3 1206->1210 1207->1206 1208->1182 1212 71c5b90-71c5ba5 1208->1212 1215 71c5ded-71c5df9 1209->1215 1216 71c5dfe-71c5e01 1209->1216 1210->1209 1212->1182 1214 71c5bab-71c5bb2 1212->1214 1214->1191 1214->1192 1215->1216 1222 71c5e3f-71c5e42 1216->1222 1223 71c5e03-71c5e22 1216->1223 1222->1204 1226 71c5e5a-71c5e5d 1222->1226 1242 71c5e99-71c5ea3 1223->1242 1227 71c5e5f-71c5e6b 1226->1227 1228 71c5e70-71c5e73 1226->1228 1227->1228 1231 71c5e75-71c5e7c 1228->1231 1232 71c5e87-71c5e89 1228->1232 1231->1200 1236 71c5e82 1231->1236 1237 71c5e8b 1232->1237 1238 71c5e90-71c5e93 1232->1238 1236->1232 1237->1238 1238->1190 1238->1242 1244->1160 1245->1244
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID: XPiq$\Oiq
                      • API String ID: 0-4187271475
                      • Opcode ID: d39a4ba5881b1137ad30dc2f51e75610a803365962f25d51e69f82b38bb097ee
                      • Instruction ID: 34ba31b4d1edc9346d52fd9f5da88d68216b9cb4a3c1a59f899089393404d4f6
                      • Opcode Fuzzy Hash: d39a4ba5881b1137ad30dc2f51e75610a803365962f25d51e69f82b38bb097ee
                      • Instruction Fuzzy Hash: 11E10171B101158FCB11DBA8C490AAEBBB6FB99720F2584AED406DB391CB31EC51C7A1
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID: $
                      • API String ID: 0-3993045852
                      • Opcode ID: 684e6dccbef2adb96c40bd247d35f1b03057583f391361713f02d1ba7125ac45
                      • Instruction ID: 5ed098147237e89652054043cbe902369f3d14140ffe0438a371d09a561e400c
                      • Opcode Fuzzy Hash: 684e6dccbef2adb96c40bd247d35f1b03057583f391361713f02d1ba7125ac45
                      • Instruction Fuzzy Hash: 6022B2B1E002168FDF21DBA4C5406AEBBB3EF95310F24846AD845AB395DB75EC51CB90
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6535d5f2856ffb459333756010b475287fa0cf1462a8036f0cf37aa2df6d47f3
                      • Instruction ID: d19f7d58121b226aeb4a9b1be65ee710f65504661059040b498c1b4bd1599957
                      • Opcode Fuzzy Hash: 6535d5f2856ffb459333756010b475287fa0cf1462a8036f0cf37aa2df6d47f3
                      • Instruction Fuzzy Hash: 9B9257B4A002058FDB25DBA8C584B5DBBF2FB49315F54C4A9D419EB3A1DB35EC81CB81
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 488fae12402d02572018d63401c7c433f52aa303a16b59b3677c273ee0f2d744
                      • Instruction ID: 75b0575cfe3ca3d50fba70b908351efb32241b2d52dc5a050fc5536b7416c05c
                      • Opcode Fuzzy Hash: 488fae12402d02572018d63401c7c433f52aa303a16b59b3677c273ee0f2d744
                      • Instruction Fuzzy Hash: 3162CFB4B002159FDB15DBA8D594AADB7F2FF98310F148469E809EB394DB35EC42CB81
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 63b17c2a414ce3a173db0e4c70810d59766f07e57dbbcb221aec2e1d854516a3
                      • Instruction ID: f4e704264ce68a1dd713c0e63d0d523afa7f72666b764b53a66733183a68721c
                      • Opcode Fuzzy Hash: 63b17c2a414ce3a173db0e4c70810d59766f07e57dbbcb221aec2e1d854516a3
                      • Instruction Fuzzy Hash: EA3293B0B002158FDB15DFA8D5907ADBBF6EB89310F109529E509EB395DB34DC42CBA1
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b090f998d6fa84e358fa7fc85d80d6ac04f99f9f685de8b135159c47bf6eb5dc
                      • Instruction ID: f02510b0c470ad008e58583b8493859a220bb83941ab519c48080fb0e687d835
                      • Opcode Fuzzy Hash: b090f998d6fa84e358fa7fc85d80d6ac04f99f9f685de8b135159c47bf6eb5dc
                      • Instruction Fuzzy Hash: 762271F0A0421A8FDF35DAACD4917AEB7B6EB59310F248429E449EB3D1CB35DC818B51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 71cad90-71cadae 1 71cadb0-71cadb3 0->1 2 71cadb5-71cadd1 1->2 3 71cadd6-71cadd9 1->3 2->3 4 71caddb-71cade4 3->4 5 71cadf3-71cadf6 3->5 7 71cadea-71cadee 4->7 8 71cafc7-71caffe 4->8 9 71cadf8-71cadfd 5->9 10 71cae00-71cae03 5->10 7->5 20 71cb000-71cb003 8->20 9->10 11 71cae05-71cae0e 10->11 12 71cae13-71cae16 10->12 11->12 13 71cae1c-71cae1f 12->13 14 71cafad-71cafb6 12->14 17 71cae39-71cae3c 13->17 18 71cae21-71cae34 13->18 14->4 19 71cafbc-71cafc6 14->19 21 71cae3e-71cae4b 17->21 22 71cae50-71cae53 17->22 18->17 23 71cb26c-71cb26f 20->23 24 71cb009-71cb044 20->24 21->22 28 71cae64-71cae66 22->28 29 71cae55-71cae59 22->29 26 71cb27e-71cb281 23->26 27 71cb271 call 71cb2e7 23->27 39 71cb04a-71cb056 24->39 40 71cb237-71cb24a 24->40 30 71cb28e-71cb291 26->30 31 71cb283-71cb28d 26->31 38 71cb277-71cb279 27->38 35 71cae6d-71cae70 28->35 36 71cae68 28->36 29->19 34 71cae5f 29->34 41 71cb2a2-71cb2a5 30->41 42 71cb293-71cb297 30->42 34->28 35->1 37 71cae76-71cae9a 35->37 36->35 58 71cafaa 37->58 59 71caea0-71caeaf 37->59 38->26 54 71cb058-71cb071 39->54 55 71cb076-71cb0ba 39->55 43 71cb24c-71cb24d 40->43 45 71cb2c8-71cb2ca 41->45 46 71cb2a7-71cb2c3 41->46 42->24 44 71cb29d 42->44 43->23 44->41 48 71cb2cc 45->48 49 71cb2d1-71cb2d4 45->49 46->45 48->49 49->20 53 71cb2da-71cb2e4 49->53 54->43 74 71cb0bc-71cb0ce 55->74 75 71cb0d6-71cb115 55->75 58->14 63 71caec7-71caf02 call 71c6268 59->63 64 71caeb1-71caeb7 59->64 84 71caf1a-71caf31 63->84 85 71caf04-71caf0a 63->85 65 71caeb9 64->65 66 71caebb-71caebd 64->66 65->63 66->63 74->75 79 71cb1fc-71cb211 75->79 80 71cb11b-71cb1f6 call 71c6268 75->80 79->40 80->79 94 71caf49-71caf5a 84->94 95 71caf33-71caf39 84->95 87 71caf0c 85->87 88 71caf0e-71caf10 85->88 87->84 88->84 101 71caf5c-71caf62 94->101 102 71caf72-71cafa3 94->102 96 71caf3d-71caf3f 95->96 97 71caf3b 95->97 96->94 97->94 103 71caf64 101->103 104 71caf66-71caf68 101->104 102->58 103->102 104->102
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID: $dq$$dq$$dq$$dq$$dq$$dq$$dq$$dq
                      • API String ID: 0-634254105
                      • Opcode ID: 655acc8695339f687eaeefc722aa5ed06ef0357d5f7e1d5dda9c010b19865b32
                      • Instruction ID: f8703e13cfe3880bc5f6fb01990a62bcf2b620abd308b6140c21a614be4865a8
                      • Opcode Fuzzy Hash: 655acc8695339f687eaeefc722aa5ed06ef0357d5f7e1d5dda9c010b19865b32
                      • Instruction Fuzzy Hash: 32E184B0A0021A8FCB26DBA8D5406AEB7F6FF99311F20852DD405EB394DB74DD46CB91
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID: $dq$$dq$$dq$$dq$$dq$$dq
                      • API String ID: 0-2331353128
                      • Opcode ID: 6f76c8e0fa806bd183aedb66c6362ec4a82c9a07e0bd9af54cb2dc229494848e
                      • Instruction ID: 949494eeff33a31339dffa5b3da2d1f6f2e9a7025a473cc883f1001ee93d9012
                      • Opcode Fuzzy Hash: 6f76c8e0fa806bd183aedb66c6362ec4a82c9a07e0bd9af54cb2dc229494848e
                      • Instruction Fuzzy Hash: 67029EF0A0421A8FDB35CFA8D5826ADB7B2FB55710F24892ED445EB290DB35DD81CB81

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 423 7156ec1-7156ec8 424 7156ed1-7156f5f GetCurrentProcess 423->424 425 7156eca-7156ed0 423->425 430 7156f61-7156f67 424->430 431 7156f68-7156f9c GetCurrentThread 424->431 425->424 430->431 432 7156fa5-7156fd9 GetCurrentProcess 431->432 433 7156f9e-7156fa4 431->433 434 7156fe2-7156ffd call 71570a0 432->434 435 7156fdb-7156fe1 432->435 433->432 439 7157003-7157032 GetCurrentThreadId 434->439 435->434 440 7157034-715703a 439->440 441 715703b-715709d 439->441 440->441
                      APIs
                      • GetCurrentProcess.KERNEL32 ref: 07156F4E
                      • GetCurrentThread.KERNEL32 ref: 07156F8B
                      • GetCurrentProcess.KERNEL32 ref: 07156FC8
                      • GetCurrentThreadId.KERNEL32 ref: 07157021
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162157991.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_7150000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: Current$ProcessThread
                      • String ID:
                      • API String ID: 2063062207-0
                      • Opcode ID: 58fa2f297eb1c8e223b6d54687645fdaab6e8c81107e8e30b4b7da06cce6c8b9
                      • Instruction ID: 08c0bb10186613220f8c047c5ed59ee875bb4dd30000477e7cd3415c05bb9597
                      • Opcode Fuzzy Hash: 58fa2f297eb1c8e223b6d54687645fdaab6e8c81107e8e30b4b7da06cce6c8b9
                      • Instruction Fuzzy Hash: C45155B090134ADFDB18DFA9D948B9EBBF1EF48314F20C859E419A7290DB355984CB61

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 448 7156ed0-7156f5f GetCurrentProcess 453 7156f61-7156f67 448->453 454 7156f68-7156f9c GetCurrentThread 448->454 453->454 455 7156fa5-7156fd9 GetCurrentProcess 454->455 456 7156f9e-7156fa4 454->456 457 7156fe2-7156ffd call 71570a0 455->457 458 7156fdb-7156fe1 455->458 456->455 462 7157003-7157032 GetCurrentThreadId 457->462 458->457 463 7157034-715703a 462->463 464 715703b-715709d 462->464 463->464
                      APIs
                      • GetCurrentProcess.KERNEL32 ref: 07156F4E
                      • GetCurrentThread.KERNEL32 ref: 07156F8B
                      • GetCurrentProcess.KERNEL32 ref: 07156FC8
                      • GetCurrentThreadId.KERNEL32 ref: 07157021
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162157991.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_7150000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: Current$ProcessThread
                      • String ID:
                      • API String ID: 2063062207-0
                      • Opcode ID: ef15ee19efd030f5a8ee495d61b77e7275baf36987a7ca92f81ebf66748d66c5
                      • Instruction ID: 9494ac3ba03f460486ee38b95e51a624abf6d1a2ca7e333cc2968e30afdec88a
                      • Opcode Fuzzy Hash: ef15ee19efd030f5a8ee495d61b77e7275baf36987a7ca92f81ebf66748d66c5
                      • Instruction Fuzzy Hash: 2C5135B0900309DFDB18DFA9D949B9EBBF1EF88314F20C859E419A7290DB359984CB65

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 471 71c8e10-71c8e35 472 71c8e37-71c8e3a 471->472 473 71c96f8-71c96fb 472->473 474 71c8e40-71c8e55 472->474 475 71c96fd-71c971c 473->475 476 71c9721-71c9723 473->476 481 71c8e6d-71c8e83 474->481 482 71c8e57-71c8e5d 474->482 475->476 477 71c972a-71c972d 476->477 478 71c9725 476->478 477->472 483 71c9733-71c973d 477->483 478->477 488 71c8e8e-71c8e90 481->488 484 71c8e5f 482->484 485 71c8e61-71c8e63 482->485 484->481 485->481 489 71c8ea8-71c8f19 488->489 490 71c8e92-71c8e98 488->490 501 71c8f1b-71c8f3e 489->501 502 71c8f45-71c8f61 489->502 491 71c8e9c-71c8e9e 490->491 492 71c8e9a 490->492 491->489 492->489 501->502 507 71c8f8d-71c8fa8 502->507 508 71c8f63-71c8f86 502->508 513 71c8faa-71c8fcc 507->513 514 71c8fd3-71c8fee 507->514 508->507 513->514 519 71c8ff0-71c900c 514->519 520 71c9013-71c9021 514->520 519->520 521 71c9031-71c90ab 520->521 522 71c9023-71c902c 520->522 528 71c90ad-71c90cb 521->528 529 71c90f8-71c910d 521->529 522->483 533 71c90cd-71c90dc 528->533 534 71c90e7-71c90f6 528->534 529->473 533->534 534->528 534->529
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID: $dq$$dq$$dq$$dq
                      • API String ID: 0-185584874
                      • Opcode ID: 4a90338e68882ccbd17b1676759269aec8edefc5d58a8713bee3a7a623a12776
                      • Instruction ID: 1c70cde3290e1e826985bc00b7f1f66e8f6ff4ee93ef6f45b40ad05d008ae05b
                      • Opcode Fuzzy Hash: 4a90338e68882ccbd17b1676759269aec8edefc5d58a8713bee3a7a623a12776
                      • Instruction Fuzzy Hash: DF915070B0021A9FDB65DF64D9507AEB7F6EB89710F108469D809EB384EF34AD428F91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 537 71cd000-71cd01b 538 71cd01d-71cd020 537->538 539 71cd069-71cd06c 538->539 540 71cd022-71cd064 538->540 541 71cd06e-71cd0b0 539->541 542 71cd0b5-71cd0b8 539->542 540->539 541->542 544 71cd0ba-71cd0fc 542->544 545 71cd101-71cd104 542->545 544->545 547 71cd14d-71cd150 545->547 548 71cd106-71cd115 545->548 549 71cd199-71cd19c 547->549 550 71cd152-71cd194 547->550 552 71cd124-71cd130 548->552 553 71cd117-71cd11c 548->553 556 71cd19e-71cd1e0 549->556 557 71cd1e5-71cd1e8 549->557 550->549 558 71cda19-71cda4e 552->558 559 71cd136-71cd148 552->559 553->552 556->557 562 71cd1ea-71cd22c 557->562 563 71cd231-71cd234 557->563 573 71cda50-71cda53 558->573 559->547 562->563 566 71cd236-71cd252 563->566 567 71cd257-71cd25a 563->567 566->567 574 71cd25c-71cd25e 567->574 575 71cd269-71cd26c 567->575 579 71cda55-71cda81 573->579 580 71cda86-71cda89 573->580 583 71cd264 574->583 584 71cd4e5 574->584 585 71cd26e-71cd284 575->585 586 71cd289-71cd28c 575->586 579->580 594 71cda98-71cda9b 580->594 595 71cda8b call 71cdb6d 580->595 583->575 592 71cd4e8-71cd4f4 584->592 585->586 587 71cd28e-71cd2d0 586->587 588 71cd2d5-71cd2d8 586->588 587->588 597 71cd2da-71cd2e9 588->597 598 71cd321-71cd324 588->598 592->548 599 71cd4fa-71cd7e7 592->599 602 71cda9d-71cdab9 594->602 603 71cdabe-71cdac0 594->603 615 71cda91-71cda93 595->615 610 71cd2f8-71cd304 597->610 611 71cd2eb-71cd2f0 597->611 612 71cd32f-71cd332 598->612 613 71cd326-71cd328 598->613 749 71cd7ed-71cd7f3 599->749 750 71cda0e-71cda18 599->750 602->603 605 71cdac7-71cdaca 603->605 606 71cdac2 603->606 605->573 617 71cdacc-71cdadb 605->617 606->605 610->558 619 71cd30a-71cd31c 610->619 611->610 623 71cd37b-71cd37e 612->623 624 71cd334-71cd376 612->624 620 71cd32a 613->620 621 71cd3a3-71cd3ac 613->621 615->594 642 71cdadd-71cdb40 call 71c6268 617->642 643 71cdb42-71cdb57 617->643 619->598 620->612 629 71cd3ae-71cd3b3 621->629 630 71cd3bb-71cd3c7 621->630 626 71cd388-71cd38b 623->626 627 71cd380-71cd385 623->627 624->623 626->592 635 71cd391-71cd393 626->635 627->626 629->630 636 71cd3cd-71cd3e1 630->636 637 71cd4d8-71cd4dd 630->637 644 71cd39a-71cd39d 635->644 645 71cd395 635->645 636->584 655 71cd3e7-71cd3f9 636->655 637->584 642->643 644->538 644->621 645->644 664 71cd41d-71cd41f 655->664 665 71cd3fb-71cd401 655->665 669 71cd429-71cd435 664->669 667 71cd405-71cd411 665->667 668 71cd403 665->668 672 71cd413-71cd41b 667->672 668->672 678 71cd437-71cd441 669->678 679 71cd443 669->679 672->669 681 71cd448-71cd44a 678->681 679->681 681->584 683 71cd450-71cd46c call 71c6268 681->683 691 71cd46e-71cd473 683->691 692 71cd47b-71cd487 683->692 691->692 692->637 694 71cd489-71cd4d6 692->694 694->584 751 71cd7f5-71cd7fa 749->751 752 71cd802-71cd80b 749->752 751->752 752->558 753 71cd811-71cd824 752->753 755 71cd9fe-71cda08 753->755 756 71cd82a-71cd830 753->756 755->749 755->750 757 71cd83f-71cd848 756->757 758 71cd832-71cd837 756->758 757->558 759 71cd84e-71cd86f 757->759 758->757 762 71cd87e-71cd887 759->762 763 71cd871-71cd876 759->763 762->558 764 71cd88d-71cd8aa 762->764 763->762 764->755 767 71cd8b0-71cd8b6 764->767 767->558 768 71cd8bc-71cd8d5 767->768 770 71cd8db-71cd902 768->770 771 71cd9f1-71cd9f8 768->771 770->558 774 71cd908-71cd912 770->774 771->755 771->767 774->558 775 71cd918-71cd92f 774->775 777 71cd93e-71cd959 775->777 778 71cd931-71cd93c 775->778 777->771 783 71cd95f-71cd978 call 71c6268 777->783 778->777 787 71cd97a-71cd97f 783->787 788 71cd987-71cd990 783->788 787->788 788->558 789 71cd996-71cd9ea 788->789 789->771
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID: $dq$$dq$$dq
                      • API String ID: 0-2861643491
                      • Opcode ID: bec1c12a92980fe413a2ea1116acb4e522d2f36f3f8a36aef8d5fcdd1e5451fb
                      • Instruction ID: cc138fcc1af14e54894c473118b2e24e3622fa5279d1418e95020d81d904d8c8
                      • Opcode Fuzzy Hash: bec1c12a92980fe413a2ea1116acb4e522d2f36f3f8a36aef8d5fcdd1e5451fb
                      • Instruction Fuzzy Hash: 116271B07002168FCB15DBA8E590A5EB7F2FF94311F209968D4499F368DB35ED86CB81

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 939 71c4830-71c4854 940 71c4856-71c4859 939->940 941 71c485f-71c4957 940->941 942 71c4f38-71c4f3b 940->942 962 71c495d-71c49aa call 71c50d9 941->962 963 71c49da-71c49e1 941->963 943 71c4f5c-71c4f5e 942->943 944 71c4f3d-71c4f57 942->944 946 71c4f65-71c4f68 943->946 947 71c4f60 943->947 944->943 946->940 949 71c4f6e-71c4f7b 946->949 947->946 976 71c49b0-71c49cc 962->976 964 71c4a65-71c4a6e 963->964 965 71c49e7-71c4a57 963->965 964->949 982 71c4a59 965->982 983 71c4a62 965->983 980 71c49ce 976->980 981 71c49d7 976->981 980->981 981->963 982->983 983->964
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID: fiq$XPiq$\Oiq
                      • API String ID: 0-1639307521
                      • Opcode ID: c069aae1674e90749cd0dc769db4613be852a75a309ecd958c35c4a9e7a39e7f
                      • Instruction ID: e29763b2cc9979e9aa3531df8736014fa253b468afb0612942fd1bec3b2286ec
                      • Opcode Fuzzy Hash: c069aae1674e90749cd0dc769db4613be852a75a309ecd958c35c4a9e7a39e7f
                      • Instruction Fuzzy Hash: B3616F70B002199FEF15DBE9C4147AEBAF6FB88710F208429D50AEB3D4DB748D458B95

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1903 71c8e01-71c8e35 1905 71c8e37-71c8e3a 1903->1905 1906 71c96f8-71c96fb 1905->1906 1907 71c8e40-71c8e55 1905->1907 1908 71c96fd-71c971c 1906->1908 1909 71c9721-71c9723 1906->1909 1914 71c8e6d-71c8e83 1907->1914 1915 71c8e57-71c8e5d 1907->1915 1908->1909 1910 71c972a-71c972d 1909->1910 1911 71c9725 1909->1911 1910->1905 1916 71c9733-71c973d 1910->1916 1911->1910 1921 71c8e8e-71c8e90 1914->1921 1917 71c8e5f 1915->1917 1918 71c8e61-71c8e63 1915->1918 1917->1914 1918->1914 1922 71c8ea8-71c8f19 1921->1922 1923 71c8e92-71c8e98 1921->1923 1934 71c8f1b-71c8f3e 1922->1934 1935 71c8f45-71c8f61 1922->1935 1924 71c8e9c-71c8e9e 1923->1924 1925 71c8e9a 1923->1925 1924->1922 1925->1922 1934->1935 1940 71c8f8d-71c8fa8 1935->1940 1941 71c8f63-71c8f86 1935->1941 1946 71c8faa-71c8fcc 1940->1946 1947 71c8fd3-71c8fee 1940->1947 1941->1940 1946->1947 1952 71c8ff0-71c900c 1947->1952 1953 71c9013-71c9021 1947->1953 1952->1953 1954 71c9031-71c90ab 1953->1954 1955 71c9023-71c902c 1953->1955 1961 71c90ad-71c90cb 1954->1961 1962 71c90f8-71c910d 1954->1962 1955->1916 1966 71c90cd-71c90dc 1961->1966 1967 71c90e7-71c90f6 1961->1967 1962->1906 1966->1967 1967->1961 1967->1962
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID: $dq$$dq
                      • API String ID: 0-2340669324
                      • Opcode ID: 9522c0aab68e5b98ca516bf25df95eb622ac01650d769373b302f61aed7116bd
                      • Instruction ID: 459d1e1fa88abd586e45f0c2c7733473d5d733319d3023157b01a006f184ebc6
                      • Opcode Fuzzy Hash: 9522c0aab68e5b98ca516bf25df95eb622ac01650d769373b302f61aed7116bd
                      • Instruction Fuzzy Hash: B8516370B0021A9FDB65DB74D990BAE77FAEB88710F108469D809DB394EB34DD428B91
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4148473065.00000000018E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018E0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_18e0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 82d817356f16dd4fdac3b40b96ffb57478ca1e98af8b896f80b29bd4118db94d
                      • Instruction ID: 28c5ee03dd9e1a16278ba6d6221965d2cc214c94bf2c4398f8f47a4e8cd0a6ec
                      • Opcode Fuzzy Hash: 82d817356f16dd4fdac3b40b96ffb57478ca1e98af8b896f80b29bd4118db94d
                      • Instruction Fuzzy Hash: A34143B2D043999FC704CFB9D80469EBFF0AF8A310F14856AD508E7291EB389945CBD1
                      APIs
                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 071535EA
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162157991.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_7150000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: CreateWindow
                      • String ID:
                      • API String ID: 716092398-0
                      • Opcode ID: 5e3dec64110568abe840ba4d20adaafae135d6ff8edcdd2f24e1e34d3e85c66c
                      • Instruction ID: 6c52eccd0d074df088824b7c847a91627b61956c32d49e74d7a7980cc3b48853
                      • Opcode Fuzzy Hash: 5e3dec64110568abe840ba4d20adaafae135d6ff8edcdd2f24e1e34d3e85c66c
                      • Instruction Fuzzy Hash: 9A51C4B5C00209EFDB15CF99D984ADDBFB5BF48354F24812AE828AB260D7719945CF50
                      APIs
                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 071535EA
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162157991.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_7150000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: CreateWindow
                      • String ID:
                      • API String ID: 716092398-0
                      • Opcode ID: 74e8578c1fc374c2d13d7967472a8a2b20e0aef12754805f06b209e4cc6ff8e8
                      • Instruction ID: c5b5c0788bfb520ab46649f0f5bc329a25766f487a15251084d55c566c2ea74e
                      • Opcode Fuzzy Hash: 74e8578c1fc374c2d13d7967472a8a2b20e0aef12754805f06b209e4cc6ff8e8
                      • Instruction Fuzzy Hash: F941B0B1D10309DFDB18CF9AC984ADEBBB5BF48314F24812AE829AB250D7759945CF90
                      APIs
                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 07158069
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162157991.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_7150000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: CallProcWindow
                      • String ID:
                      • API String ID: 2714655100-0
                      • Opcode ID: e46d3cb0ac870851245024cb621030ec5b0298b3a63aba1d8cef0e3ed93af086
                      • Instruction ID: 67e95b167a5a6665ddb65ddb9585d308b482a6afac45a67b6cda87f91e03f1c2
                      • Opcode Fuzzy Hash: e46d3cb0ac870851245024cb621030ec5b0298b3a63aba1d8cef0e3ed93af086
                      • Instruction Fuzzy Hash: E9416DB4900305DFCB18DF99C448AAABBF5FF88314F25C459D919AB3A1D375A840CFA0
                      APIs
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162157991.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_7150000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: Clipboard
                      • String ID:
                      • API String ID: 220874293-0
                      • Opcode ID: dfe7ecc0d1714636e14c8bb02dfdcae73a045176fbbf97c9d433369428b46a64
                      • Instruction ID: 609a976ae5fc278d111415dde6d8bfcef5185bda54bac585f27b3146972f5820
                      • Opcode Fuzzy Hash: dfe7ecc0d1714636e14c8bb02dfdcae73a045176fbbf97c9d433369428b46a64
                      • Instruction Fuzzy Hash: DF3102B0D01209DFDB14DF99D984BCEBBF5AB48314F208019E408BB290DBB4A985CF61
                      APIs
                      • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 018E7F5F
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4148473065.00000000018E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018E0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_18e0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: CheckDebuggerPresentRemote
                      • String ID:
                      • API String ID: 3662101638-0
                      • Opcode ID: 08e8c95a5b3f9f488656a0fe833d960b3f07f4a4b0a767d72c2bb4e88368c983
                      • Instruction ID: f900789e5c90b1264b9691648c8f3ef14daf920f0e02de3fe268c528fc9ca3ae
                      • Opcode Fuzzy Hash: 08e8c95a5b3f9f488656a0fe833d960b3f07f4a4b0a767d72c2bb4e88368c983
                      • Instruction Fuzzy Hash: 022169B58012198FCB00CF99D885BEEBBF4EF49310F14841AE859A3381D378AA44CFA1
                      APIs
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162157991.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_7150000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: Clipboard
                      • String ID:
                      • API String ID: 220874293-0
                      • Opcode ID: 308e96d17d02a432af8dce308f27a98ee1e7449e609ef8860f72b15085108fd2
                      • Instruction ID: 3b4aa1be60910c09861045dc04d7b4c5e8147e8facaf3c9836e8dac87efdef27
                      • Opcode Fuzzy Hash: 308e96d17d02a432af8dce308f27a98ee1e7449e609ef8860f72b15085108fd2
                      • Instruction Fuzzy Hash: 1131DFB0D01349EFDB18DF99C984B8EBBF5AF48314F248059E508BB290DBB5A945CF61
                      APIs
                      • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,071582B5), ref: 0715833F
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162157991.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_7150000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: CallbackDispatcherUser
                      • String ID:
                      • API String ID: 2492992576-0
                      • Opcode ID: e77f356c03d77ed081241986c449cb1d92af16e6601fa384d1f9ff2640ceb7ee
                      • Instruction ID: 1236e38f3cc65f2b6559bc8ae8a8371fda700c888408a2228136e2f3fc6995a0
                      • Opcode Fuzzy Hash: e77f356c03d77ed081241986c449cb1d92af16e6601fa384d1f9ff2640ceb7ee
                      • Instruction Fuzzy Hash: E4217CB5805398CFCB12DF99D8547DABFF4EF4A320F15448AD458AB292C3346948CBA6
                      APIs
                      • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 018E7F5F
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4148473065.00000000018E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018E0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_18e0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: CheckDebuggerPresentRemote
                      • String ID:
                      • API String ID: 3662101638-0
                      • Opcode ID: 45cd22f8915e098779444caf298f4a9b95b3841bc2260bb91f9e0ee1d9d076d7
                      • Instruction ID: 36a0d9d42b55ce49d2d0cf0dc36dd98b9b704a51630a457ef2e82df5875876ec
                      • Opcode Fuzzy Hash: 45cd22f8915e098779444caf298f4a9b95b3841bc2260bb91f9e0ee1d9d076d7
                      • Instruction Fuzzy Hash: AE2139B18002598FCB14CF9AD844BEEFBF4EF49310F14845AE559A7391D778AA44CFA1
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0715719F
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162157991.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_7150000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 49eb49f8752baf534760aa29f0edd70aa1f72b458b9113863ea2436b5ccab7e4
                      • Instruction ID: 011c75cb7f8b6701f34cb7e6f42ad56a6e1f0a65542eef6c332c5710f642cc96
                      • Opcode Fuzzy Hash: 49eb49f8752baf534760aa29f0edd70aa1f72b458b9113863ea2436b5ccab7e4
                      • Instruction Fuzzy Hash: F02107B5900348AFDB10CFA9D985ADEBFF4EB48310F14841AE954A7351D374A944CFA1
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0715719F
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162157991.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_7150000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: f99d932d7e3fe569b502d96d429ad4d66b6d7b35f5cf45d2115e7f0b63bc0a8c
                      • Instruction ID: 649b42ef67aeff5f0411645aa0ef7cd9a30bd37a6715731da550e86c97f3ba7a
                      • Opcode Fuzzy Hash: f99d932d7e3fe569b502d96d429ad4d66b6d7b35f5cf45d2115e7f0b63bc0a8c
                      • Instruction Fuzzy Hash: CA21E4B5900308AFDB10CFAAD985ADEBBF5FB48310F14841AE918A7350D374A944CFA1
                      APIs
                      • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 0715A863
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162157991.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_7150000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: HookWindows
                      • String ID:
                      • API String ID: 2559412058-0
                      • Opcode ID: 08eb74fdff12d81767b220d39404a367fb147e677f7295603c1c24782a67d1fb
                      • Instruction ID: 90e02aa93325b2d7b034e44167c1054724ae33e62d9c7ef54c21aa5612ced26a
                      • Opcode Fuzzy Hash: 08eb74fdff12d81767b220d39404a367fb147e677f7295603c1c24782a67d1fb
                      • Instruction Fuzzy Hash: 8221F5B59002099FCB14DF99D945ADEBBF5AF88310F10841AD419A7290C775A945CFA1
                      APIs
                      • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 0715A863
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162157991.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_7150000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: HookWindows
                      • String ID:
                      • API String ID: 2559412058-0
                      • Opcode ID: 8be6b7f41c5f6e278269bedbe615e6861c22c0c1dea6e381a9aa6fa4651b3d68
                      • Instruction ID: 6759e85685548415efafa6e6c6ba156d3683ced5edaa5db5e4c88513c8cbfee4
                      • Opcode Fuzzy Hash: 8be6b7f41c5f6e278269bedbe615e6861c22c0c1dea6e381a9aa6fa4651b3d68
                      • Instruction Fuzzy Hash: C52113B1D002099FCB14DF9AD945BEEFBF5EF88310F10842AD829A7290C774A945CFA1
                      APIs
                      • GlobalMemoryStatusEx.KERNEL32 ref: 018EF6F7
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4148473065.00000000018E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018E0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_18e0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: GlobalMemoryStatus
                      • String ID:
                      • API String ID: 1890195054-0
                      • Opcode ID: c2ec6f75ad066c20e1e19f728e5dada38c056eef06d422184e0d8615c2c9fc2b
                      • Instruction ID: 9bb6670caa04f5b08d86a691e26b4b37eab95f33acc62e98632ce571440fb14c
                      • Opcode Fuzzy Hash: c2ec6f75ad066c20e1e19f728e5dada38c056eef06d422184e0d8615c2c9fc2b
                      • Instruction Fuzzy Hash: 891114B1C006599BCB10DF9AD944A9EFBF4FF48320F11812AD518B7280D778A944CFA1
                      APIs
                      • GetModuleHandleW.KERNEL32(00000000), ref: 07152496
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162157991.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_7150000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: 28ecd096484b7a17d904ab796bdc0ceea25c7795a33ecf1872e8c48cb52e231c
                      • Instruction ID: 7f20b41581e70b1ef5880ebb3393ee5fe01d4ab4c362161a12218d446c071d0b
                      • Opcode Fuzzy Hash: 28ecd096484b7a17d904ab796bdc0ceea25c7795a33ecf1872e8c48cb52e231c
                      • Instruction Fuzzy Hash: F51120B6C007498ECB14DF9AD844ADEFBF4AB89320F14841AD828B7650C378A545CFA1
                      APIs
                      • GetModuleHandleW.KERNEL32(00000000), ref: 07152496
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162157991.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_7150000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: 9ec267c131d6b37968091fe9d71e54cbcbbee9bf10a8f7af51034432ac33ceab
                      • Instruction ID: 013e12ec1a2484ec267a6bf4f27e459eedf7d2473f27d6cd9ca40ebb967a13f6
                      • Opcode Fuzzy Hash: 9ec267c131d6b37968091fe9d71e54cbcbbee9bf10a8f7af51034432ac33ceab
                      • Instruction Fuzzy Hash: 7D1120F2C00309CFCB14DF9AC544A9EFBF4EB88220F10841AD829B7280C375A545CFA1
                      APIs
                      • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,071582B5), ref: 0715833F
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162157991.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_7150000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: CallbackDispatcherUser
                      • String ID:
                      • API String ID: 2492992576-0
                      • Opcode ID: ca93447c2e1890a58eb15534e80d7f535c8ddb74f6a2f77c650ba310e6bf91aa
                      • Instruction ID: 917109eaf9203969eb26b3d43e69ec4c6ad2f6612d334f5bc9adfafbbb4277b4
                      • Opcode Fuzzy Hash: ca93447c2e1890a58eb15534e80d7f535c8ddb74f6a2f77c650ba310e6bf91aa
                      • Instruction Fuzzy Hash: DB1133B58003498FCB20DF9AD949BDEBBF8EB48324F20841AD518B7780D774A544CFA1
                      APIs
                      • OleInitialize.OLE32(00000000), ref: 07158BFD
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162157991.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_7150000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: Initialize
                      • String ID:
                      • API String ID: 2538663250-0
                      • Opcode ID: 6a757bedf3d9d48f3a0f1ccc7499d9a020fe82cb197229c7592e3bef76ce9828
                      • Instruction ID: af986ce42fdf6c4fa1e1a1bc669e659d1be2e4e9d5e2a488b2e2f763507b948a
                      • Opcode Fuzzy Hash: 6a757bedf3d9d48f3a0f1ccc7499d9a020fe82cb197229c7592e3bef76ce9828
                      • Instruction Fuzzy Hash: 341103B1800748CFCB24DF9AD949BDEBBF8EB48324F108459D529B7280D379A944CFA5
                      APIs
                      • OleInitialize.OLE32(00000000), ref: 07158BFD
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162157991.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_7150000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: Initialize
                      • String ID:
                      • API String ID: 2538663250-0
                      • Opcode ID: de7588b0f888f0f09d9b075d365ccf0e70fb24d302c3da359eab7a1dc064fb48
                      • Instruction ID: 9e5304cb3abc45377a325017a37b7cc1f8f73c8d1b19d595cb0cb7843161c1bc
                      • Opcode Fuzzy Hash: de7588b0f888f0f09d9b075d365ccf0e70fb24d302c3da359eab7a1dc064fb48
                      • Instruction Fuzzy Hash: 351133B5C00348CFCB10DFA9D549BDEBBF4EB48324F24845AD568A7280C379A944CFA1
                      APIs
                      • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,071582B5), ref: 0715833F
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162157991.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_7150000_cYDnGbgU.jbxd
                      Similarity
                      • API ID: CallbackDispatcherUser
                      • String ID:
                      • API String ID: 2492992576-0
                      • Opcode ID: 519f5ab9b7c9c231f6c3c0405058492788737d0f706d46bb33660981873fa014
                      • Instruction ID: 1c1e93227546bbd376e66a468c8ebc9b70fdcbaddec00a07edb614d6db787d77
                      • Opcode Fuzzy Hash: 519f5ab9b7c9c231f6c3c0405058492788737d0f706d46bb33660981873fa014
                      • Instruction Fuzzy Hash: C1F0F4B5900209CFCB14DF99D44879EFBF4AF88324F24845AD529A7290C778A544CFA1
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID: PHdq
                      • API String ID: 0-2991842255
                      • Opcode ID: 51d7a8bb72420bfcecc8d6f48921e4f6378412d04668ba0a27c5a81c9e40f7fb
                      • Instruction ID: 79c3f5fd96c2ed007aafb093f30ba2b7ea2f8c9d8284be9e681210f811f28ae9
                      • Opcode Fuzzy Hash: 51d7a8bb72420bfcecc8d6f48921e4f6378412d04668ba0a27c5a81c9e40f7fb
                      • Instruction Fuzzy Hash: FB41A4B0B1034A9FDF25DFA4D8906AEBBB2BF96300F14452DD445E7284DB70D942CB91
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID: XPiq
                      • API String ID: 0-3497805733
                      • Opcode ID: 832a03b30df474a7e117e8013ce47cecf28e2b4446b66d70504405ec73b56d05
                      • Instruction ID: 817ff948996e2916f78be08ffdecc16087304114d71c45187427c4865de1165f
                      • Opcode Fuzzy Hash: 832a03b30df474a7e117e8013ce47cecf28e2b4446b66d70504405ec73b56d05
                      • Instruction Fuzzy Hash: D6414B71B002099FEB55DFA9C814BAEBBF6EF88700F20852AD505AB3D5DB748C418B55
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID: PHdq
                      • API String ID: 0-2991842255
                      • Opcode ID: 1d0f30c5c0f948f2a37149fdfe53ab7291e3d9d1b2b91bccc91ef1e764683c35
                      • Instruction ID: 74ac4ea5f36aa3e43bd86de9ed5c7f150bc27041ede14160a214c72d932cf8e1
                      • Opcode Fuzzy Hash: 1d0f30c5c0f948f2a37149fdfe53ab7291e3d9d1b2b91bccc91ef1e764683c35
                      • Instruction Fuzzy Hash: 6631CEB07003068FDB1AEBB4D45466E3BA6FB99610F14946DD806DB385DF34DD42CB91
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID: PHdq
                      • API String ID: 0-2991842255
                      • Opcode ID: 5656ce744defe787498a7b8484119b156e2e93a1d7ed8797fd2a35050d5d17e3
                      • Instruction ID: ad5fa32eaab656e491ad2a298d319ae9dda9fd164b202ef9499a458e80e2e86e
                      • Opcode Fuzzy Hash: 5656ce744defe787498a7b8484119b156e2e93a1d7ed8797fd2a35050d5d17e3
                      • Instruction Fuzzy Hash: 6731CF707002068FDB19EBB8C45466E3BA7FB89600F20942DD806DB384DF34DD42CB91
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID: $dq
                      • API String ID: 0-847773763
                      • Opcode ID: 17aa8f68dfd244d009bb3286ba85331000850d1b84e68ea0f40bc0b35f3624d4
                      • Instruction ID: cb062ba0e0c708a164efae8aa7695d92f2c64b2c0947fea1924143985ea66437
                      • Opcode Fuzzy Hash: 17aa8f68dfd244d009bb3286ba85331000850d1b84e68ea0f40bc0b35f3624d4
                      • Instruction Fuzzy Hash: 35F0E5B2704102CBEF3AC9D4E9C017973E8E764395F21006EDD05831D0D775C912CA50
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c429e9e94e03ccf7e21b6e526d5f972b936d8f60b38ddeff099bf588520982ae
                      • Instruction ID: ab90af7247bea1d50105bca6ca9667d7f08acb30cdfba5a293e0546da4d6c3da
                      • Opcode Fuzzy Hash: c429e9e94e03ccf7e21b6e526d5f972b936d8f60b38ddeff099bf588520982ae
                      • Instruction Fuzzy Hash: 25C180B4A002168FDF15DBA8D594AADBBF2FF98310F248429E805EB394DB34DD42CB51
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cf90dcb66bb2dc82cc64506f4c71c8fa7664cb4695c76ef64efcb5241928cdad
                      • Instruction ID: 4637b3d80fed216ea31b99bd9f38a934b80c00f6d00ac4e32a2b54b7c9cea494
                      • Opcode Fuzzy Hash: cf90dcb66bb2dc82cc64506f4c71c8fa7664cb4695c76ef64efcb5241928cdad
                      • Instruction Fuzzy Hash: 19A15C70B002168FDB29EB74C59076EB7B6EF88300F2045A9D809EB394DB35DD86CB91
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a191783e4279eaa470ac32f1017cf3e223a26471dd3ad1c58c863e87c0c5db51
                      • Instruction ID: 04eb8779dcd0f642028360ac14f1a6cacf4c36fd9c51620e274ff637727ebb50
                      • Opcode Fuzzy Hash: a191783e4279eaa470ac32f1017cf3e223a26471dd3ad1c58c863e87c0c5db51
                      • Instruction Fuzzy Hash: BF61B2B1F001224FDF15DA6DC84056FB6DBAFE4620B254439E80EDB364DE65ED4287D1
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f06533d358dd84af4c52e89218f37473b6e6f466d61dfbe6721249dd64c65039
                      • Instruction ID: 75373462d560b070ffd66ae576834aefd9f48333c68b58703c428bc6a6f5b30e
                      • Opcode Fuzzy Hash: f06533d358dd84af4c52e89218f37473b6e6f466d61dfbe6721249dd64c65039
                      • Instruction Fuzzy Hash: EA819D70B0024A9FDB14DBA8D5647AEBBF6EF98300F108429D81ADB394DB34DC428B81
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a6b4605383f5f95bf2b0e6d889b5c452d9b0c92db67c3413125eab5882f4a8fc
                      • Instruction ID: 04b0db5ac9b31a98cb267e12f5baaa28440a37cfed2cd6dd68228765201de4cd
                      • Opcode Fuzzy Hash: a6b4605383f5f95bf2b0e6d889b5c452d9b0c92db67c3413125eab5882f4a8fc
                      • Instruction Fuzzy Hash: 5B915F74E0021A8FDF21DFA8C850B9DBBB1FF99300F208599D509BB295DB70AA85CF51
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ea9ea141c5a5b6e4b204ec9e9673d1f0c6d94ee367ac0ae8443c932e9deafb26
                      • Instruction ID: ccad347d57b251e0feea5b249553155fdfc742142cf3f30c1f5d9a22ddb686c0
                      • Opcode Fuzzy Hash: ea9ea141c5a5b6e4b204ec9e9673d1f0c6d94ee367ac0ae8443c932e9deafb26
                      • Instruction Fuzzy Hash: 2D913274E0021A8BDF21DFA8C850B9DB7B1FF99310F208599D909BB395DB70AA85CF51
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b7d1ea9904b09c90b9737c5fa960124d3834e7ea30b63d887dcbdd21dadcd3c0
                      • Instruction ID: 5ff58c4a5fab1be96e68b1a091d92de5a127f896bbfe958dd93a1ba4345335e3
                      • Opcode Fuzzy Hash: b7d1ea9904b09c90b9737c5fa960124d3834e7ea30b63d887dcbdd21dadcd3c0
                      • Instruction Fuzzy Hash: 2E713EB0A002099FDB15DFA9D990AADBBF6FF98310F148529E405EB394DB30ED46CB51
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f96597f8b4578c2ea162f410225c13ee495c4f34ae59b3f6c82a4173ae755f40
                      • Instruction ID: bcf54a2a55a22235cf24da7525b09426c29a24a72cf4f909209c6e77014863c8
                      • Opcode Fuzzy Hash: f96597f8b4578c2ea162f410225c13ee495c4f34ae59b3f6c82a4173ae755f40
                      • Instruction Fuzzy Hash: 6D712EB0A002099FDB15DFA9D990AADBBF6FF98310F148529E405EB394DB30ED46CB51
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b30abd0b6003462deaa945fc57216a0e6a9119ed01b12331cde5624dec50ebbc
                      • Instruction ID: d433a722ad047a93632931dca0f99cca52abc0e2d50653bad7189a61cf28d6c7
                      • Opcode Fuzzy Hash: b30abd0b6003462deaa945fc57216a0e6a9119ed01b12331cde5624dec50ebbc
                      • Instruction Fuzzy Hash: 6A51E6B2A00106DFDB24EBB8E4546ADBBBAFF45311F10487DE005E7294DB358957CB81
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2a2a5fc9f06dd7015a34b770831ab153a33fac910853c01821383902d0b36823
                      • Instruction ID: 1803117e6e0a988d7e8e99e16a1dcdff46f3155d58da4bf4738e7372aa914569
                      • Opcode Fuzzy Hash: 2a2a5fc9f06dd7015a34b770831ab153a33fac910853c01821383902d0b36823
                      • Instruction Fuzzy Hash: E151FBF17102165BEF2196ACD85577E26AFDB9D711F20442AE10AD33E4CF2CCC8297A2
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c90a22538ae6af17b2143371193677456361f5b05948459e69d84f0721a53098
                      • Instruction ID: adf8d8e085a43b421c9af034bb2da305574e9c0d019c534ba4cbbf9306eecabe
                      • Opcode Fuzzy Hash: c90a22538ae6af17b2143371193677456361f5b05948459e69d84f0721a53098
                      • Instruction Fuzzy Hash: A451D6F17102165BEF2596ACD85473E269FDB9D721F20442AE50AD33E4CF6CCC8297A2
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1e206ed0d86bf8c0de918071dc028740048a8c196ab1a44a39a9956bcb4c9408
                      • Instruction ID: 8172ceb68e75b891f13d8b5868cd62da0f0cc14697a24d7f77954a60b28474a0
                      • Opcode Fuzzy Hash: 1e206ed0d86bf8c0de918071dc028740048a8c196ab1a44a39a9956bcb4c9408
                      • Instruction Fuzzy Hash: 7D4161B1A0060A8FCB21CFE9C8846AFFBF6FF65310F20492AD115D7691D334B9558B91
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2b9e72e7e6d047f1798dc93f9098d558cd9cf3e837a426e0e93238bf79b656d4
                      • Instruction ID: 6f8ff95e288c16194aa4a4438e4028e25d99e0d8434dd210ba1fb3a1de58dd97
                      • Opcode Fuzzy Hash: 2b9e72e7e6d047f1798dc93f9098d558cd9cf3e837a426e0e93238bf79b656d4
                      • Instruction Fuzzy Hash: C631A374A042169FCB1ADFA4D85469EB7F2FF99310F10852DE915EB390DB70AC82CB50
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f6f8959e1b8d7fcb410a696eff524036605cd0120968d694b62ed3b847f18500
                      • Instruction ID: 2ed2c84f6123866b01be0b54ad48f611c40ae2423fe9bcda4a5e6c961937d8df
                      • Opcode Fuzzy Hash: f6f8959e1b8d7fcb410a696eff524036605cd0120968d694b62ed3b847f18500
                      • Instruction Fuzzy Hash: DB316D70E1060A9FDB19DFA4C95469EB7F2FF99300F108529E916EB390DB70AC82CB40
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 626df5fb76969377f162d3171d65910df0cae75fa592a63c1a4b0c121f8a7092
                      • Instruction ID: 68569ac6dade9e4f2267cb75fa91a56ecec13a8137db0281eb158c08be3de8ae
                      • Opcode Fuzzy Hash: 626df5fb76969377f162d3171d65910df0cae75fa592a63c1a4b0c121f8a7092
                      • Instruction Fuzzy Hash: DE31E6B5B102058FDB11CFB8D880AEEBBF5FB48720F10802AE915E7390E734D9418B95
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 162dacf56f49ada69f95d5388c8a996bcd1e6b15dc1a85306ed279337fcd3e01
                      • Instruction ID: c9d6edafadaed38aa260d2702d23f28d94ac57a1753696ab98b2687f869ae52e
                      • Opcode Fuzzy Hash: 162dacf56f49ada69f95d5388c8a996bcd1e6b15dc1a85306ed279337fcd3e01
                      • Instruction Fuzzy Hash: 6C21AEB5F102058FEB14DFA9D980AAEB7F5FB88710F10802AE915E7390E734DD018B95
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4147989376.000000000189D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0189D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_189d000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8fdbdf3c713cae05de55013fe232b3e619908a5f9378ed30d1924c2b830b4eaf
                      • Instruction ID: f36378259db96b8bcad151e8c46255ccc9d5c7f7739c0da73302c540cc3082b6
                      • Opcode Fuzzy Hash: 8fdbdf3c713cae05de55013fe232b3e619908a5f9378ed30d1924c2b830b4eaf
                      • Instruction Fuzzy Hash: 152128B16042049FCF11CF58C9C4B16BB65FB84314F28C66DD8098B342C736D446CA65
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: caee7ec650ce1d73c871f148dd3a8d3bc62d9899d031e7f9fc88663f6538bd79
                      • Instruction ID: cf7f4f59d266ae1a81b4d62190f920a31adaede51bf6989cde37019999d172a7
                      • Opcode Fuzzy Hash: caee7ec650ce1d73c871f148dd3a8d3bc62d9899d031e7f9fc88663f6538bd79
                      • Instruction Fuzzy Hash: B921C3B1E042068FDB22CEE9C4C076EBBF2EB55311F25887ED059DB282D374E9508B91
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9c49d3a83e9935a12d8673afcd7bdb3a5063987953cedd21aa7d33401c8f5c54
                      • Instruction ID: 921493321dca0dad0c9336a793e36f16ad638c63a94402010c3f238fdafe7e5a
                      • Opcode Fuzzy Hash: 9c49d3a83e9935a12d8673afcd7bdb3a5063987953cedd21aa7d33401c8f5c54
                      • Instruction Fuzzy Hash: E20192717041111FDB22D6BDD85176BB7EADBC6720F14C82AF00EC7395DA65CD4283A2
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c5c310593f175c71ab76e30368c096eb997dd23e94d4c29ad95df71a3679a724
                      • Instruction ID: 82b089f1d9ebbc19df57e17fbaa036e43d01e8eeec24230fc603fba77aa22a65
                      • Opcode Fuzzy Hash: c5c310593f175c71ab76e30368c096eb997dd23e94d4c29ad95df71a3679a724
                      • Instruction Fuzzy Hash: 30118235B141195FDB58D668C8546AE77AAEBCD710F008039D40AE7388DF74DC024B92
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1be39d004c5730f1acdedbaeaf3b195f87bcbc711e9891b83ee4037c9dd046b3
                      • Instruction ID: dbb62cd44f849ac5397c61c27145327494092e7ac0b9011a026dc524c35f2a89
                      • Opcode Fuzzy Hash: 1be39d004c5730f1acdedbaeaf3b195f87bcbc711e9891b83ee4037c9dd046b3
                      • Instruction Fuzzy Hash: 2A11E535B002195FDF24DB68E9913AA77BAEB99311F1004BAD10DE7380EB34DD428B92
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cf259769db40108d2c73cacb78cf8f2ea7baff6c0bc6752ed5166358813d901e
                      • Instruction ID: f83bbb22e90fce322e8869624a58ed799da30f3a17227f10b1b905d39583338c
                      • Opcode Fuzzy Hash: cf259769db40108d2c73cacb78cf8f2ea7baff6c0bc6752ed5166358813d901e
                      • Instruction Fuzzy Hash: DF11F9B17001250FD712DABCE45075A7BDADB5AB20F14C42DE109CB3C0EB65DC428781
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4caa9d6eb53ca42779df549d44927ad489735f1def98fb9363efe0f1f3aab291
                      • Instruction ID: 954296ef3a46f1ebbc7ce61887bb23ddc022b204e0b34055ff1ee25a142678cf
                      • Opcode Fuzzy Hash: 4caa9d6eb53ca42779df549d44927ad489735f1def98fb9363efe0f1f3aab291
                      • Instruction Fuzzy Hash: C421E3B5D00259AFCB00DF9AD985ADEFFB4FB49310F10816AE518B7280C374A544CFA5
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 867ef87cbb07d9bf6112a67f588e48b14b115a4c8db73ca82247a2af7c3672bb
                      • Instruction ID: 154ba5bd0cdedb3730c97275d968d34974a393df320f86d584d70ba62897151d
                      • Opcode Fuzzy Hash: 867ef87cbb07d9bf6112a67f588e48b14b115a4c8db73ca82247a2af7c3672bb
                      • Instruction Fuzzy Hash: D201B136B1001A5FDB5996B8DC546EE77BADBC9A10F40813AD40AE7284EF24CD068B92
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 20f465be47c8f9052be20296457eed133ff8146e269c9164b809618fceef0807
                      • Instruction ID: 728c73e1299c2fa78ef279b18aeb88d99f9f6133774b9430dadfd81a52dcfc36
                      • Opcode Fuzzy Hash: 20f465be47c8f9052be20296457eed133ff8146e269c9164b809618fceef0807
                      • Instruction Fuzzy Hash: 6101DFB1B044111FCB22CABC945077E67E6EBDA651F14882AE00AD73D0EA69CC074385
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9770780942bc0c94ca430fc33ee66ca1c7eea47a6e7c31e4f767875bc2ed6242
                      • Instruction ID: bb5290854ad27b904a9bb0ba957c4a3f578f5868b43dac45632163667cf9e7a9
                      • Opcode Fuzzy Hash: 9770780942bc0c94ca430fc33ee66ca1c7eea47a6e7c31e4f767875bc2ed6242
                      • Instruction Fuzzy Hash: BF014C71E202265BCF14CAB5EC416ADBB79FB8A710F10456EE849E7341E725DC06CBD1
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4147989376.000000000189D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0189D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_189d000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5bc96cb8dbab4a459d35c79ebbe5ba2a9dff6c5f08df11ade35b896c854f64ae
                      • Instruction ID: 0bef0e27b12e5f60b1a2653fb79581297d820d2221e6178ad6b1a9da1eba6e55
                      • Opcode Fuzzy Hash: 5bc96cb8dbab4a459d35c79ebbe5ba2a9dff6c5f08df11ade35b896c854f64ae
                      • Instruction Fuzzy Hash: 5F11BE75504244CFDB12CF58C5C4B15FF62FB44314F28C6A9D8498B252C33AD44ACB61
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5ef224117f62558fb0a464827f92cd11994dc59a50fd3f8eac4cceaffb9d0fa1
                      • Instruction ID: 75bd1494db5a2df5ba00b2af95a3af250a4da1858bbad33eb5a4c85156ec69e8
                      • Opcode Fuzzy Hash: 5ef224117f62558fb0a464827f92cd11994dc59a50fd3f8eac4cceaffb9d0fa1
                      • Instruction Fuzzy Hash: 4311CFB1D01219AFCB00DF9AD985ACEFBB4FB48310F10852AE918B7280C374A954CFA5
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7c13d32d80ba872a4833f890a7786f88a85be4ec61e47a4e7b2419ce51198f09
                      • Instruction ID: 18edc6bf828cb7bc2dd631864ee3a022145f3a39c37aa0a5ad002a824d62cf15
                      • Opcode Fuzzy Hash: 7c13d32d80ba872a4833f890a7786f88a85be4ec61e47a4e7b2419ce51198f09
                      • Instruction Fuzzy Hash: 2D016D717001155BDB25D6ADD45072BB2DADBD9720F20C83EF11EC7394EA66DC428392
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cb0c2b62062e2a40300a8a6d6271cf5826db03a8f1577374c9db0773cf98205d
                      • Instruction ID: b37d6f626aad83595bc1b88cd436dd66b82673d44d5ee9857284859ebd330f0e
                      • Opcode Fuzzy Hash: cb0c2b62062e2a40300a8a6d6271cf5826db03a8f1577374c9db0773cf98205d
                      • Instruction Fuzzy Hash: 5801DCB17000261BCB22D6AD9450B2F73DADBC9A60F10883DE10AD7380EA69DC024385
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 32b1d22ce28cce47cc4f1a3aeb3b2656a27cc54e56cd0f89eae7e4c7e782419d
                      • Instruction ID: efd6f118288a36666fa7fd978368218f6d9ee374bea53b0424a02a32325a8a43
                      • Opcode Fuzzy Hash: 32b1d22ce28cce47cc4f1a3aeb3b2656a27cc54e56cd0f89eae7e4c7e782419d
                      • Instruction Fuzzy Hash: 530181707000290FDB26DABCD45072AB7DAEB89B20F10C838E50AC7380EB39EC028781
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72155f5dd77a33834b6642e64664258ac2545fc43a6ace87d31724ce0fc4d38d
                      • Instruction ID: 30ac842124023a8e7dba841acb2be8d435372c1433e86c6e8f6a008a956317db
                      • Opcode Fuzzy Hash: 72155f5dd77a33834b6642e64664258ac2545fc43a6ace87d31724ce0fc4d38d
                      • Instruction Fuzzy Hash: 28F06DB190928AABCB12CBB58D4575EBBA9DB43244F24849AD844D7283E23ACA158742
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID: $dq$$dq$$dq$$dq$$dq$$dq$$dq$$dq$$dq$$dq
                      • API String ID: 0-3623093008
                      • Opcode ID: 2c882c0a44f1d290257938ef16ba09009ba3226d1e29aca4661436582f2f0848
                      • Instruction ID: 9df1f06964ec65112ef4e0acdba46bc7c0ba01cc34f9b9394445818115815d8a
                      • Opcode Fuzzy Hash: 2c882c0a44f1d290257938ef16ba09009ba3226d1e29aca4661436582f2f0848
                      • Instruction Fuzzy Hash: A1123E70A002198FDB24DFA9C954A5EB7F2FF99311F2095ADD409AB3A4DB709D41CF81
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID: $dq$$dq$$dq$$dq$$dq$$dq$$dq$$dq
                      • API String ID: 0-634254105
                      • Opcode ID: 14a4c43b11cb1b3ffe5aa6bcdf882ab2ed21c8638ea05814a06fcfcc8478bcb9
                      • Instruction ID: fafe7ac77980199ec7c137e780a394326a2c7b2bf15f38e75abd4268d30b2ad3
                      • Opcode Fuzzy Hash: 14a4c43b11cb1b3ffe5aa6bcdf882ab2ed21c8638ea05814a06fcfcc8478bcb9
                      • Instruction Fuzzy Hash: CC919BB0A1020E9FDB2ADFA8D5547AEB7F6EF58311F20C42DE80197294CB749E41CB91
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID: .5|q$$dq$$dq$$dq$$dq$$dq$$dq
                      • API String ID: 0-3447281907
                      • Opcode ID: 688244a22a550014140c58a7ad9a44a5eb4f7c6222fd2267364b4aa153207edc
                      • Instruction ID: 9cc050b7b4fa25b2d1495a02de56673f1036089f6dc0327c79fc066e4f3b7f0c
                      • Opcode Fuzzy Hash: 688244a22a550014140c58a7ad9a44a5eb4f7c6222fd2267364b4aa153207edc
                      • Instruction Fuzzy Hash: 02F14B70B002098FDB19EFA8D454A6EB7F6FF99301F208928D4059B394CBB5ED42CB81
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID: $dq$$dq$$dq$$dq
                      • API String ID: 0-185584874
                      • Opcode ID: 00a71b7a5047fd905b07b88531cff765024c6e93a324259b6b543387c6d6df42
                      • Instruction ID: 3d5788c6becfcd46bd93549978126ebe4353b3725b985563d9c8836f245e402c
                      • Opcode Fuzzy Hash: 00a71b7a5047fd905b07b88531cff765024c6e93a324259b6b543387c6d6df42
                      • Instruction Fuzzy Hash: BDB13B70A0021ACFDB25EBA8D5946AEB7F2FF95311F248829D405DB394DB75DC82CB81
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID: LRdq$LRdq$$dq$$dq
                      • API String ID: 0-340319088
                      • Opcode ID: 402d3dfee498c7444931e7c2b37d15ea2c5eb0e3525662203eece0838dcd6584
                      • Instruction ID: f2c5f7572c166a23bf34ef7564aa20d45b138546059d140ab5f1f9c656f2eb9d
                      • Opcode Fuzzy Hash: 402d3dfee498c7444931e7c2b37d15ea2c5eb0e3525662203eece0838dcd6584
                      • Instruction Fuzzy Hash: 9851B1707002128FCB18EB68D584A6AB7F6FF99304F10896DE405DB3A4DB74EC41CB91
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.4162764784.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_71c0000_cYDnGbgU.jbxd
                      Similarity
                      • API ID:
                      • String ID: $dq$$dq$$dq$$dq
                      • API String ID: 0-185584874
                      • Opcode ID: 4e22ab2bd6fe78029a6c31419bfe8384b09a6febadacea5952b84844c94f9f4c
                      • Instruction ID: 92ca3c8421f073d5025021ff4159a9c17ca484df8e839b7d9f933250749d286c
                      • Opcode Fuzzy Hash: 4e22ab2bd6fe78029a6c31419bfe8384b09a6febadacea5952b84844c94f9f4c
                      • Instruction Fuzzy Hash: F45173B0A0020A8FCF27DBA8D5806AE77F6EF99311F24856ED405D7294DB35DD42CB91