Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Halkbank_Ekstre_20230426_075819_154085.exe

Overview

General Information

Sample name:Halkbank_Ekstre_20230426_075819_154085.exe
Analysis ID:1539976
MD5:c5f2f6abd7eec8c18df5ee086799e1e4
SHA1:94af18757c5f3b56ac72d1a58097752e56554e21
SHA256:a8ddfaf817218e3b0118156b2f66878b95771df5b236088b24d1f834253941f7
Tags:AgentTeslaexeuser-lowmal3
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected UAC Bypass using CMSTP
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to log keystrokes (.Net Source)
Contains functionality to register a low level keyboard hook
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file does not import any functions
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Halkbank_Ekstre_20230426_075819_154085.exe (PID: 6484 cmdline: "C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exe" MD5: C5F2F6ABD7EEC8C18DF5EE086799E1E4)
    • jsc.exe (PID: 5172 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe" MD5: 94C8E57A80DFCA2482DEDB87B93D4FD9)
    • jsc.exe (PID: 4596 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe" MD5: 94C8E57A80DFCA2482DEDB87B93D4FD9)
    • WerFault.exe (PID: 5896 cmdline: C:\Windows\system32\WerFault.exe -u -p 6484 -s 1008 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.alhoneycomb.com", "Username": "blog@alhoneycomb.com", "Password": "          WORTHwill3611!           "}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000002.4625900767.000000000285F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000002.00000002.4625900767.0000000002811000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000002.00000002.4625900767.0000000002811000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.2214230680.000001C6D5113000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000000.00000002.2214230680.000001C6D5113000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              Click to see the 12 entries
              SourceRuleDescriptionAuthorStrings
              0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d51134d0.2.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d51134d0.2.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d51134d0.2.raw.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x357aa:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x3581c:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x358a6:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x35938:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x359a2:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x35a14:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x35aaa:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x35b3a:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  2.2.jsc.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    2.2.jsc.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 13 entries

                      System Summary

                      barindex
                      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 74.119.238.7, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe, Initiated: true, ProcessId: 5172, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49716
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-23T09:34:52.440583+020020301711A Network Trojan was detected192.168.2.64971674.119.238.7587TCP
                      2024-10-23T09:34:54.420807+020020301711A Network Trojan was detected192.168.2.64973374.119.238.7587TCP
                      2024-10-23T09:36:29.625975+020020301711A Network Trojan was detected192.168.2.65599374.119.238.7587TCP
                      2024-10-23T09:36:31.829699+020020301711A Network Trojan was detected192.168.2.65599474.119.238.7587TCP
                      2024-10-23T09:36:46.078521+020020301711A Network Trojan was detected192.168.2.65599574.119.238.7587TCP
                      2024-10-23T09:36:53.202396+020020301711A Network Trojan was detected192.168.2.65599774.119.238.7587TCP
                      2024-10-23T09:38:13.676395+020020301711A Network Trojan was detected192.168.2.65599974.119.238.7587TCP
                      2024-10-23T09:38:39.731473+020020301711A Network Trojan was detected192.168.2.65600074.119.238.7587TCP
                      2024-10-23T09:38:42.744044+020020301711A Network Trojan was detected192.168.2.65600174.119.238.7587TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-23T09:34:52.440583+020028397231Malware Command and Control Activity Detected192.168.2.64971674.119.238.7587TCP
                      2024-10-23T09:34:54.420807+020028397231Malware Command and Control Activity Detected192.168.2.64973374.119.238.7587TCP
                      2024-10-23T09:36:29.625975+020028397231Malware Command and Control Activity Detected192.168.2.65599374.119.238.7587TCP
                      2024-10-23T09:36:31.829699+020028397231Malware Command and Control Activity Detected192.168.2.65599474.119.238.7587TCP
                      2024-10-23T09:36:46.078521+020028397231Malware Command and Control Activity Detected192.168.2.65599574.119.238.7587TCP
                      2024-10-23T09:36:53.202396+020028397231Malware Command and Control Activity Detected192.168.2.65599774.119.238.7587TCP
                      2024-10-23T09:38:13.676395+020028397231Malware Command and Control Activity Detected192.168.2.65599974.119.238.7587TCP
                      2024-10-23T09:38:39.731473+020028397231Malware Command and Control Activity Detected192.168.2.65600074.119.238.7587TCP
                      2024-10-23T09:38:42.744044+020028397231Malware Command and Control Activity Detected192.168.2.65600174.119.238.7587TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-23T09:36:29.625975+020028400321A Network Trojan was detected192.168.2.65599374.119.238.7587TCP
                      2024-10-23T09:36:31.829699+020028400321A Network Trojan was detected192.168.2.65599474.119.238.7587TCP
                      2024-10-23T09:36:46.078521+020028400321A Network Trojan was detected192.168.2.65599574.119.238.7587TCP
                      2024-10-23T09:36:53.202396+020028400321A Network Trojan was detected192.168.2.65599774.119.238.7587TCP
                      2024-10-23T09:38:13.676395+020028400321A Network Trojan was detected192.168.2.65599974.119.238.7587TCP
                      2024-10-23T09:38:39.731473+020028400321A Network Trojan was detected192.168.2.65600074.119.238.7587TCP
                      2024-10-23T09:38:42.744044+020028400321A Network Trojan was detected192.168.2.65600174.119.238.7587TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: Halkbank_Ekstre_20230426_075819_154085.exeAvira: detected
                      Source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d382d7e0.0.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.alhoneycomb.com", "Username": "blog@alhoneycomb.com", "Password": " WORTHwill3611! "}
                      Source: Halkbank_Ekstre_20230426_075819_154085.exeReversingLabs: Detection: 52%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: Halkbank_Ekstre_20230426_075819_154085.exeJoe Sandbox ML: detected

                      Exploits

                      barindex
                      Source: Yara matchFile source: 00000000.00000002.2213530683.000001C6C38EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Halkbank_Ekstre_20230426_075819_154085.exe PID: 6484, type: MEMORYSTR
                      Source: Halkbank_Ekstre_20230426_075819_154085.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: mscorlib.pdb source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: System.ni.pdbRSDS source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: mscorlib.ni.pdb source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: System.Core.pdb source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: Microsoft.VisualBasic.pdbH source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: mscorlib.pdb " source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: System.ni.pdb source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: System.pdb source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: System.Core.ni.pdbRSDS source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: Microsoft.VisualBasic.pdb source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: System.Core.ni.pdb source: WER9852.tmp.dmp.6.dr

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.6:49716 -> 74.119.238.7:587
                      Source: Network trafficSuricata IDS: 2839723 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla SMTP Activity : 192.168.2.6:49716 -> 74.119.238.7:587
                      Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.6:49733 -> 74.119.238.7:587
                      Source: Network trafficSuricata IDS: 2839723 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla SMTP Activity : 192.168.2.6:49733 -> 74.119.238.7:587
                      Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.6:55999 -> 74.119.238.7:587
                      Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.6:56000 -> 74.119.238.7:587
                      Source: Network trafficSuricata IDS: 2839723 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla SMTP Activity : 192.168.2.6:56000 -> 74.119.238.7:587
                      Source: Network trafficSuricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.6:56000 -> 74.119.238.7:587
                      Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.6:56001 -> 74.119.238.7:587
                      Source: Network trafficSuricata IDS: 2839723 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla SMTP Activity : 192.168.2.6:56001 -> 74.119.238.7:587
                      Source: Network trafficSuricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.6:56001 -> 74.119.238.7:587
                      Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.6:55994 -> 74.119.238.7:587
                      Source: Network trafficSuricata IDS: 2839723 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla SMTP Activity : 192.168.2.6:55994 -> 74.119.238.7:587
                      Source: Network trafficSuricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.6:55994 -> 74.119.238.7:587
                      Source: Network trafficSuricata IDS: 2839723 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla SMTP Activity : 192.168.2.6:55999 -> 74.119.238.7:587
                      Source: Network trafficSuricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.6:55999 -> 74.119.238.7:587
                      Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.6:55993 -> 74.119.238.7:587
                      Source: Network trafficSuricata IDS: 2839723 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla SMTP Activity : 192.168.2.6:55993 -> 74.119.238.7:587
                      Source: Network trafficSuricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.6:55993 -> 74.119.238.7:587
                      Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.6:55995 -> 74.119.238.7:587
                      Source: Network trafficSuricata IDS: 2839723 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla SMTP Activity : 192.168.2.6:55995 -> 74.119.238.7:587
                      Source: Network trafficSuricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.6:55995 -> 74.119.238.7:587
                      Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.6:55997 -> 74.119.238.7:587
                      Source: Network trafficSuricata IDS: 2839723 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla SMTP Activity : 192.168.2.6:55997 -> 74.119.238.7:587
                      Source: Network trafficSuricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.6:55997 -> 74.119.238.7:587
                      Source: global trafficTCP traffic: 192.168.2.6:49716 -> 74.119.238.7:587
                      Source: Joe Sandbox ViewASN Name: VPLSNETUS VPLSNETUS
                      Source: global trafficTCP traffic: 192.168.2.6:49716 -> 74.119.238.7:587
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficDNS traffic detected: DNS query: mail.alhoneycomb.com
                      Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
                      Source: jsc.exe, 00000002.00000002.4625900767.0000000002B5A000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000002.00000002.4625900767.0000000002BE5000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000002.00000002.4625900767.0000000002C73000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000002.00000002.4625900767.00000000029B3000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000002.00000002.4625900767.0000000002919000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000002.00000002.4625900767.0000000002A19000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000002.00000002.4625900767.00000000028F0000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000002.00000002.4625900767.0000000002867000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000002.00000002.4625900767.0000000002A7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.alhoneycomb.com
                      Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
                      Source: Halkbank_Ekstre_20230426_075819_154085.exe, 00000000.00000002.2214230680.000001C6D375F000.00000004.00000800.00020000.00000000.sdmp, Halkbank_Ekstre_20230426_075819_154085.exe, 00000000.00000002.2214230680.000001C6D5113000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000002.00000002.4610361547.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d382d7e0.0.raw.unpack, SKTzxzsJw.cs.Net Code: GhwkGV1Ll50
                      Source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d51134d0.2.raw.unpack, SKTzxzsJw.cs.Net Code: GhwkGV1Ll50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeCode function: 2_2_05EFDB08 SetWindowsHookExA 0000000D,00000000,?,?,?,?,?,?,?,?,?,05EFE9B0,00000000,000000002_2_05EFDB08
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                      System Summary

                      barindex
                      Source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d51134d0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 2.2.jsc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d51134d0.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d382d7e0.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d382d7e0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d375f160.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeCode function: 2_2_00CC43302_2_00CC4330
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeCode function: 2_2_00CC4C002_2_00CC4C00
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeCode function: 2_2_00CC3FE82_2_00CC3FE8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeCode function: 2_2_00CCBF122_2_00CCBF12
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeCode function: 2_2_00CCBF202_2_00CCBF20
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeCode function: 2_2_05EFB5302_2_05EFB530
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeCode function: 2_2_05EF47002_2_05EF4700
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeCode function: 2_2_05EF26F02_2_05EF26F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeCode function: 2_2_05EF7C082_2_05EF7C08
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeCode function: 2_2_061293D02_2_061293D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeCode function: 2_2_061244A02_2_061244A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeCode function: 2_2_0612F6582_2_0612F658
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeCode function: 2_2_0612F64A2_2_0612F64A
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6484 -s 1008
                      Source: Halkbank_Ekstre_20230426_075819_154085.exeStatic PE information: No import functions for PE file found
                      Source: Halkbank_Ekstre_20230426_075819_154085.exe, 00000000.00000000.2145915917.000001C6C17F6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNewcastle.exe4 vs Halkbank_Ekstre_20230426_075819_154085.exe
                      Source: Halkbank_Ekstre_20230426_075819_154085.exe, 00000000.00000002.2214230680.000001C6D375F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIkavihukixeyokibihoyF vs Halkbank_Ekstre_20230426_075819_154085.exe
                      Source: Halkbank_Ekstre_20230426_075819_154085.exe, 00000000.00000002.2214230680.000001C6D375F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameb17b300f-3107-4f0e-bd36-73672dc506a5.exe4 vs Halkbank_Ekstre_20230426_075819_154085.exe
                      Source: Halkbank_Ekstre_20230426_075819_154085.exe, 00000000.00000002.2214230680.000001C6D5113000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameb17b300f-3107-4f0e-bd36-73672dc506a5.exe4 vs Halkbank_Ekstre_20230426_075819_154085.exe
                      Source: Halkbank_Ekstre_20230426_075819_154085.exeBinary or memory string: OriginalFilenameNewcastle.exe4 vs Halkbank_Ekstre_20230426_075819_154085.exe
                      Source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d51134d0.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 2.2.jsc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d51134d0.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d382d7e0.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d382d7e0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d375f160.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: Halkbank_Ekstre_20230426_075819_154085.exe, .csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d382d7e0.0.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d382d7e0.0.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d382d7e0.0.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d382d7e0.0.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d382d7e0.0.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d382d7e0.0.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d382d7e0.0.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d382d7e0.0.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@6/5@3/1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeMutant created: NULL
                      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6484
                      Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\efa6dc6c-ca37-4ef1-93a9-1a86fff6ac01Jump to behavior
                      Source: Halkbank_Ekstre_20230426_075819_154085.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: Halkbank_Ekstre_20230426_075819_154085.exeReversingLabs: Detection: 52%
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeFile read: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exe "C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exe"
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6484 -s 1008
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                      Source: Halkbank_Ekstre_20230426_075819_154085.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: Halkbank_Ekstre_20230426_075819_154085.exeStatic file information: File size 1857125 > 1048576
                      Source: Halkbank_Ekstre_20230426_075819_154085.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: mscorlib.pdb source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: System.ni.pdbRSDS source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: mscorlib.ni.pdb source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: System.Core.pdb source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: Microsoft.VisualBasic.pdbH source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: mscorlib.pdb " source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: System.ni.pdb source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: System.pdb source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: System.Core.ni.pdbRSDS source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: Microsoft.VisualBasic.pdb source: WER9852.tmp.dmp.6.dr
                      Source: Binary string: System.Core.ni.pdb source: WER9852.tmp.dmp.6.dr
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeCode function: 2_2_00CC0BDD pushfd ; ret 2_2_00CC0BF1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeCode function: 2_2_00CC0BBA pushfd ; ret 2_2_00CC0BF1
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: Halkbank_Ekstre_20230426_075819_154085.exe PID: 6484, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: Halkbank_Ekstre_20230426_075819_154085.exe, 00000000.00000002.2213530683.000001C6C38EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                      Source: Halkbank_Ekstre_20230426_075819_154085.exe, 00000000.00000002.2213530683.000001C6C38EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeMemory allocated: 1C6C1B20000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeMemory allocated: 1C6DB590000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeMemory allocated: 1C6E3DC0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeMemory allocated: CC0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeMemory allocated: 2810000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeMemory allocated: 4810000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 1199953Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 1199844Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 1199734Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 1199625Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 1199514Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 1199406Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 1199297Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 1199188Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWindow / User API: threadDelayed 3287Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWindow / User API: threadDelayed 6522Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -31359464925306218s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -100000s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -99875s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -99413s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -99297s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -99188s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -99078s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -98969s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -98860s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -98735s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -98610s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -98485s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -98360s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -98235s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -98110s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -97985s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -97860s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -97735s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -97610s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -97488s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -97312s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -97157s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -96922s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -96719s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -96594s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -96465s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -96360s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -96250s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -99984s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -99872s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -99765s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -99656s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -99547s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -99437s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -99326s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -99218s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -99109s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -99000s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -98890s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -98780s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -98672s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -98562s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -98450s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -98340s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -98158s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -97984s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -97859s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -97750s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -1199953s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -1199844s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -1199734s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -1199625s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -1199514s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -1199406s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -1199297s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe TID: 828Thread sleep time: -1199188s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 99875Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 99413Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 99297Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 99188Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 99078Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 98969Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 98860Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 98735Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 98610Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 98485Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 98360Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 98235Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 98110Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 97985Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 97860Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 97735Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 97610Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 97488Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 97312Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 97157Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 96922Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 96719Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 96594Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 96465Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 96360Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 96250Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 99984Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 99872Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 99765Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 99656Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 99547Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 99437Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 99326Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 99218Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 99109Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 99000Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 98890Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 98780Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 98672Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 98562Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 98450Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 98340Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 98158Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 97984Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 97859Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 97750Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 1199953Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 1199844Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 1199734Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 1199625Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 1199514Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 1199406Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 1199297Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeThread delayed: delay time: 1199188Jump to behavior
                      Source: Amcache.hve.6.drBinary or memory string: VMware
                      Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
                      Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
                      Source: Halkbank_Ekstre_20230426_075819_154085.exe, 00000000.00000002.2213530683.000001C6C38EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
                      Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                      Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
                      Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Halkbank_Ekstre_20230426_075819_154085.exe, 00000000.00000002.2213530683.000001C6C38EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                      Source: Halkbank_Ekstre_20230426_075819_154085.exe, 00000000.00000002.2213530683.000001C6C38EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
                      Source: jsc.exe, 00000002.00000002.4654840415.0000000005A10000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll,
                      Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                      Source: Halkbank_Ekstre_20230426_075819_154085.exe, 00000000.00000002.2213530683.000001C6C38EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                      Source: Halkbank_Ekstre_20230426_075819_154085.exe, 00000000.00000002.2213530683.000001C6C38EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                      Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.6.drBinary or memory string: vmci.sys
                      Source: Halkbank_Ekstre_20230426_075819_154085.exe, 00000000.00000002.2213530683.000001C6C38EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
                      Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
                      Source: Halkbank_Ekstre_20230426_075819_154085.exe, 00000000.00000002.2213530683.000001C6C38EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                      Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
                      Source: Halkbank_Ekstre_20230426_075819_154085.exe, 00000000.00000002.2213530683.000001C6C38EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
                      Source: Halkbank_Ekstre_20230426_075819_154085.exe, 00000000.00000002.2213530683.000001C6C38EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                      Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.6.drBinary or memory string: VMware20,1
                      Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                      Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
                      Source: Halkbank_Ekstre_20230426_075819_154085.exe, 00000000.00000002.2213530683.000001C6C38EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
                      Source: Halkbank_Ekstre_20230426_075819_154085.exe, 00000000.00000002.2213530683.000001C6C38EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
                      Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
                      Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
                      Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: Halkbank_Ekstre_20230426_075819_154085.exe, .csReference to suspicious API methods: GetProcAddress(, )
                      Source: Halkbank_Ekstre_20230426_075819_154085.exe, .csReference to suspicious API methods: VirtualProtect(procAddress, (UIntPtr)(ulong)array.Length, 64u, out var )
                      Source: Halkbank_Ekstre_20230426_075819_154085.exe, .csReference to suspicious API methods: LoadLibrary([.ToInt32()])
                      Source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d382d7e0.0.raw.unpack, zOS.csReference to suspicious API methods: _120HqGy.OpenProcess(_2pIt.DuplicateHandle, bInheritHandle: true, (uint)iVE.ProcessID)
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe base: 400000 protect: page execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe base: 400000Jump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe base: 402000Jump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe base: 440000Jump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe base: 442000Jump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe base: 6BC008Jump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeQueries volume information: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                      Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
                      Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                      Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                      Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d51134d0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.jsc.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d51134d0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d382d7e0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d382d7e0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d375f160.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.4625900767.000000000285F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.4625900767.0000000002811000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2214230680.000001C6D5113000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.4625900767.0000000002867000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.4610361547.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2214230680.000001C6D375F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Halkbank_Ekstre_20230426_075819_154085.exe PID: 6484, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: jsc.exe PID: 5172, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqliteJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: Yara matchFile source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d51134d0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.jsc.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d51134d0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d382d7e0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d382d7e0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d375f160.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.4625900767.0000000002811000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2214230680.000001C6D5113000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.4610361547.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2214230680.000001C6D375F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Halkbank_Ekstre_20230426_075819_154085.exe PID: 6484, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: jsc.exe PID: 5172, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d51134d0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.jsc.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d51134d0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d382d7e0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d382d7e0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Halkbank_Ekstre_20230426_075819_154085.exe.1c6d375f160.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.4625900767.000000000285F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.4625900767.0000000002811000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2214230680.000001C6D5113000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.4625900767.0000000002867000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.4610361547.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2214230680.000001C6D375F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Halkbank_Ekstre_20230426_075819_154085.exe PID: 6484, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: jsc.exe PID: 5172, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      311
                      Process Injection
                      1
                      Disable or Modify Tools
                      2
                      OS Credential Dumping
                      231
                      Security Software Discovery
                      Remote Services1
                      Email Collection
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Native API
                      Boot or Logon Initialization Scripts1
                      DLL Side-Loading
                      151
                      Virtualization/Sandbox Evasion
                      31
                      Input Capture
                      1
                      Process Discovery
                      Remote Desktop Protocol31
                      Input Capture
                      1
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)311
                      Process Injection
                      1
                      Credentials in Registry
                      151
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin Shares11
                      Archive Collected Data
                      1
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                      Deobfuscate/Decode Files or Information
                      NTDS1
                      Application Window Discovery
                      Distributed Component Object Model2
                      Data from Local System
                      11
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Obfuscated Files or Information
                      LSA Secrets1
                      File and Directory Discovery
                      SSH1
                      Clipboard Data
                      Fallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      DLL Side-Loading
                      Cached Domain Credentials24
                      System Information Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      Halkbank_Ekstre_20230426_075819_154085.exe53%ReversingLabsWin32.Trojan.AgentTesla
                      Halkbank_Ekstre_20230426_075819_154085.exe100%AviraHEUR/AGEN.1313324
                      Halkbank_Ekstre_20230426_075819_154085.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://upx.sf.net0%URL Reputationsafe
                      https://account.dyn.com/0%URL Reputationsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      mail.alhoneycomb.com
                      74.119.238.7
                      truetrue
                        unknown
                        198.187.3.20.in-addr.arpa
                        unknown
                        unknownfalse
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://upx.sf.netAmcache.hve.6.drfalse
                          • URL Reputation: safe
                          unknown
                          https://account.dyn.com/Halkbank_Ekstre_20230426_075819_154085.exe, 00000000.00000002.2214230680.000001C6D375F000.00000004.00000800.00020000.00000000.sdmp, Halkbank_Ekstre_20230426_075819_154085.exe, 00000000.00000002.2214230680.000001C6D5113000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000002.00000002.4610361547.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://mail.alhoneycomb.comjsc.exe, 00000002.00000002.4625900767.0000000002B5A000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000002.00000002.4625900767.0000000002BE5000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000002.00000002.4625900767.0000000002C73000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000002.00000002.4625900767.00000000029B3000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000002.00000002.4625900767.0000000002919000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000002.00000002.4625900767.0000000002A19000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000002.00000002.4625900767.00000000028F0000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000002.00000002.4625900767.0000000002867000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 00000002.00000002.4625900767.0000000002A7B000.00000004.00000800.00020000.00000000.sdmpfalse
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            74.119.238.7
                            mail.alhoneycomb.comUnited States
                            35908VPLSNETUStrue
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1539976
                            Start date and time:2024-10-23 09:33:46 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 8m 2s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:11
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:Halkbank_Ekstre_20230426_075819_154085.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.expl.evad.winEXE@6/5@3/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 99%
                            • Number of executed functions: 46
                            • Number of non-executed functions: 7
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                            • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 52.168.117.173
                            • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, client.wns.windows.com, ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                            • Report size getting too big, too many NtSetInformationFile calls found.
                            • VT rate limit hit for: Halkbank_Ekstre_20230426_075819_154085.exe
                            TimeTypeDescription
                            03:34:46API Interceptor1x Sleep call for process: WerFault.exe modified
                            03:34:46API Interceptor11605933x Sleep call for process: jsc.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            74.119.238.7hesaphareketi-01.exeGet hashmaliciousAgentTeslaBrowse
                              New Purchase Order.exeGet hashmaliciousAgentTeslaBrowse
                                rPO_CW00402902400415.exeGet hashmaliciousAgentTeslaBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  mail.alhoneycomb.comhesaphareketi-01.exeGet hashmaliciousAgentTeslaBrowse
                                  • 74.119.238.7
                                  New Purchase Order.exeGet hashmaliciousAgentTeslaBrowse
                                  • 74.119.238.7
                                  rPO_CW00402902400415.exeGet hashmaliciousAgentTeslaBrowse
                                  • 74.119.238.7
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  VPLSNETUShesaphareketi-01.exeGet hashmaliciousAgentTeslaBrowse
                                  • 74.119.238.7
                                  la.bot.arm.elfGet hashmaliciousUnknownBrowse
                                  • 174.139.218.86
                                  na.elfGet hashmaliciousMiraiBrowse
                                  • 98.126.6.38
                                  New Purchase Order.exeGet hashmaliciousAgentTeslaBrowse
                                  • 74.119.238.7
                                  arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                  • 110.34.178.120
                                  SecuriteInfo.com.Linux.Siggen.9999.30976.5557.elfGet hashmaliciousMiraiBrowse
                                  • 96.62.177.176
                                  http://www.telegremapp.me/Get hashmaliciousUnknownBrowse
                                  • 74.119.238.102
                                  rPO_CW00402902400415.exeGet hashmaliciousAgentTeslaBrowse
                                  • 74.119.238.7
                                  LisectAVT_2403002B_466.exeGet hashmaliciousFormBookBrowse
                                  • 67.198.129.29
                                  SecuriteInfo.com.FileRepMalware.25505.20211.exeGet hashmaliciousUnknownBrowse
                                  • 66.186.50.50
                                  No context
                                  No context
                                  Process:C:\Windows\System32\WerFault.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):65536
                                  Entropy (8bit):1.013367888706515
                                  Encrypted:false
                                  SSDEEP:192:ypn1nC667n0UnUlaWhZJEzuiF0Z24lO8r:y5Q6+0UnUlauXEzuiF0Y4lO8r
                                  MD5:B4BB3A88C0852F7DF33C8BFEBAC114A8
                                  SHA1:B14942A07B61A5CA8C0050A7052A4DB737D559B2
                                  SHA-256:DEDE22094D011A87811CEEE81FF34560BBBC030C3E76927B0B54160A8ED89A26
                                  SHA-512:89DA92D34021C6AB9A74705EB0200F2DDC351683BCE1AFC66E3C65F1309A7A2D1EA720C31772E17A861652984EFB9671CB6FE9E3FFEB567F57D25FBFBAC1CF63
                                  Malicious:false
                                  Reputation:low
                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.1.4.2.4.8.3.4.7.2.6.6.8.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.1.4.2.4.8.3.9.8.8.2.9.6.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.1.3.9.5.9.b.a.-.c.1.c.8.-.4.8.9.b.-.8.f.1.4.-.c.0.6.a.6.f.7.6.d.d.3.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.4.1.8.7.8.2.4.-.3.5.0.a.-.4.b.c.8.-.8.c.c.e.-.0.4.9.c.8.b.f.5.7.1.d.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.H.a.l.k.b.a.n.k._.E.k.s.t.r.e._.2.0.2.3.0.4.2.6._.0.7.5.8.1.9._.1.5.4.0.8.5...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.N.e.w.c.a.s.t.l.e...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.5.4.-.0.0.0.1.-.0.0.1.5.-.d.b.5.b.-.f.e.0.4.1.e.2.5.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.2.6.7.9.a.4.9.b.f.0.2.9.4.6.1.8.7.d.d.7.5.f.4.d.4.0.1.7.4.2.e.4.0.0.0.0.0.0.0.0.!.0.0.0.0.9.4.a.f.1.8.7.5.7.c.5.f.3.b.5.6.a.c.7.2.d.1.
                                  Process:C:\Windows\System32\WerFault.exe
                                  File Type:Mini DuMP crash report, 16 streams, Wed Oct 23 07:34:43 2024, 0x1205a4 type
                                  Category:dropped
                                  Size (bytes):376503
                                  Entropy (8bit):3.3360529140982145
                                  Encrypted:false
                                  SSDEEP:3072:8k+Q9s4eM02Czthr4zxlBDJO7cSlsdeR1fMxb1CCqlzE3+vNPcY4v0:8k+Q9sf2CxhrQavXk5q+3QxcY
                                  MD5:AF9FA5D53111E25F951EE8598BA50499
                                  SHA1:414ACFF68A0B698A0B7CE6A27A027A6B612BFD97
                                  SHA-256:B2279CCA8A6472E2498104616E1937071E01CA4AC8D26943F9FA53CF56710C85
                                  SHA-512:87CD9B9A33651A11A632B63DDB278D6BDC8CF25D88E4A672F86643E5DC9E24C4A2E8989F64006D912213EB15C830E1A861061990C6B075A04904BCCA7B6D6E0F
                                  Malicious:false
                                  Reputation:low
                                  Preview:MDMP..a..... ..........g....................................$...h.......|...........$E..ln..........l.......8...........T...........8(...............6...........7..............................................................................eJ.......8......Lw......................T.......T......g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\WerFault.exe
                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):8724
                                  Entropy (8bit):3.7175979314273557
                                  Encrypted:false
                                  SSDEEP:192:R6l7wVeJleMX6Y2DfaXgmfZL1prB89bpyMfMDm:R6lXJsk6YiaXgmfZLmpxf1
                                  MD5:BE73B8D13CF95C38CFFF1A99E79CF89E
                                  SHA1:D534E16168F2D3B2E077E81207A50CFCA566305F
                                  SHA-256:A00E4522B9DB63A97F8DFFB4B642C416E7EBD5D6D2C6E1AE41DA7DA8FEFE25DD
                                  SHA-512:AD9EE27BFDF9BB21C759F46440B086DFF77D61572CD6B271D74C4CEB589E4C1BD0C9CF8518936B7B4B18372A2015120821993A27464A1225D22B0ED375247203
                                  Malicious:false
                                  Reputation:low
                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.4.8.4.<./.P.i.
                                  Process:C:\Windows\System32\WerFault.exe
                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):4897
                                  Entropy (8bit):4.569744491719452
                                  Encrypted:false
                                  SSDEEP:48:cvIwWl8zscJg771I9XxjCWpW8VYhNYm8M4JmjCDF4zyq85ilaHn8QAQekd:uIjfaI76xjD7V0MJy2p9hd
                                  MD5:9041F83CBB72155088E85DC4C6FA9D8C
                                  SHA1:E56A00ACC3068B5F31146450D1BA9C249D6D5E67
                                  SHA-256:4B2350D9F923C8330A1EF35703D1AA9129DDBA080C0ADFF073CC9AFBF147ED11
                                  SHA-512:38E2DD324F723D61C7ADF5DABACC585F01E515FAFFA49BBC7B8FED34FA3C3A9F9CC6DFFAD567A62E2FA2CF15D6F0CAED564E11DC97AE2C6FA5F00F62CC63472D
                                  Malicious:false
                                  Reputation:low
                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="555757" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                  Process:C:\Windows\System32\WerFault.exe
                                  File Type:MS Windows registry file, NT/2000 or above
                                  Category:dropped
                                  Size (bytes):1835008
                                  Entropy (8bit):4.468969820086887
                                  Encrypted:false
                                  SSDEEP:6144:nzZfpi6ceLPx9skLmb0fTZWSP3aJG8nAgeiJRMMhA2zX4WABluuNEjDH5S:zZHtTZWOKnMM6bFpej4
                                  MD5:CF3C1C3B2F2724073BABF8C812631890
                                  SHA1:3ACD31F0AE0669CAC9A11F7B32D3829FCC8A8E68
                                  SHA-256:BDB8D424764E693ABF77C47D2F1721AC83BCE97AC05AB6818992FD3C58EABB44
                                  SHA-512:79B490C1718A31274C988E4B5B8B466F2F568A52B0EF7E4C5265A5BF8409BFA9381DFBAF6B9FE4F1943300B1ABA05E93A75437A8A28213B6863570837872A2D1
                                  Malicious:false
                                  Reputation:low
                                  Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.>...%..............................................................................................................................................................................................................................................................................................................................................Rq.2........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):5.299556155132872
                                  TrID:
                                  • Win64 Executable GUI (202006/5) 92.65%
                                  • Win64 Executable (generic) (12005/4) 5.51%
                                  • Generic Win/DOS Executable (2004/3) 0.92%
                                  • DOS Executable Generic (2002/1) 0.92%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:Halkbank_Ekstre_20230426_075819_154085.exe
                                  File size:1'857'125 bytes
                                  MD5:c5f2f6abd7eec8c18df5ee086799e1e4
                                  SHA1:94af18757c5f3b56ac72d1a58097752e56554e21
                                  SHA256:a8ddfaf817218e3b0118156b2f66878b95771df5b236088b24d1f834253941f7
                                  SHA512:2d97b7bd18f1e514be0138d660fc99cedd38c343652be72f48f75edae30c67184967834ad00c16a3923e7259683aaf1e51f6e23537d13dd6dc903b2f5db11efd
                                  SSDEEP:12288:m9yO+7eNjgDgLHtPo8EHPfVw1GI/2PiGEXbzQdFRM9Bz34Acjc:m4OCeRHtlEddiG4n9BzIAcY
                                  TLSH:8385124235571D6BFE2AA9BACCC2B4F56DFC9D4776F6142FDF909C2618020BC41248B4
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...w..g.........."...0..$............... ....@...... ....................................`................................
                                  Icon Hash:00928e8e8686b000
                                  Entrypoint:0x400000
                                  Entrypoint Section:
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x6717F777 [Tue Oct 22 19:05:27 2024 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:
                                  Instruction
                                  dec ebp
                                  pop edx
                                  nop
                                  add byte ptr [ebx], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax+eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x60000x4d6.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000x24a60x26001408a5d00f9bfa1e79593e4da46e9a22False0.5680509868421053data5.586864766001203IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0x60000x4d60x600d00c518c8aafea247960e1f782645af5False0.3743489583333333data3.718432686235799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_VERSION0x60a00x24cdata0.46598639455782315
                                  RT_MANIFEST0x62ec0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2024-10-23T09:34:52.440583+02002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.64971674.119.238.7587TCP
                                  2024-10-23T09:34:52.440583+02002839723ETPRO MALWARE Win32/Agent Tesla SMTP Activity1192.168.2.64971674.119.238.7587TCP
                                  2024-10-23T09:34:54.420807+02002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.64973374.119.238.7587TCP
                                  2024-10-23T09:34:54.420807+02002839723ETPRO MALWARE Win32/Agent Tesla SMTP Activity1192.168.2.64973374.119.238.7587TCP
                                  2024-10-23T09:36:29.625975+02002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.65599374.119.238.7587TCP
                                  2024-10-23T09:36:29.625975+02002839723ETPRO MALWARE Win32/Agent Tesla SMTP Activity1192.168.2.65599374.119.238.7587TCP
                                  2024-10-23T09:36:29.625975+02002840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M21192.168.2.65599374.119.238.7587TCP
                                  2024-10-23T09:36:31.829699+02002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.65599474.119.238.7587TCP
                                  2024-10-23T09:36:31.829699+02002839723ETPRO MALWARE Win32/Agent Tesla SMTP Activity1192.168.2.65599474.119.238.7587TCP
                                  2024-10-23T09:36:31.829699+02002840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M21192.168.2.65599474.119.238.7587TCP
                                  2024-10-23T09:36:46.078521+02002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.65599574.119.238.7587TCP
                                  2024-10-23T09:36:46.078521+02002839723ETPRO MALWARE Win32/Agent Tesla SMTP Activity1192.168.2.65599574.119.238.7587TCP
                                  2024-10-23T09:36:46.078521+02002840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M21192.168.2.65599574.119.238.7587TCP
                                  2024-10-23T09:36:53.202396+02002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.65599774.119.238.7587TCP
                                  2024-10-23T09:36:53.202396+02002839723ETPRO MALWARE Win32/Agent Tesla SMTP Activity1192.168.2.65599774.119.238.7587TCP
                                  2024-10-23T09:36:53.202396+02002840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M21192.168.2.65599774.119.238.7587TCP
                                  2024-10-23T09:38:13.676395+02002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.65599974.119.238.7587TCP
                                  2024-10-23T09:38:13.676395+02002839723ETPRO MALWARE Win32/Agent Tesla SMTP Activity1192.168.2.65599974.119.238.7587TCP
                                  2024-10-23T09:38:13.676395+02002840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M21192.168.2.65599974.119.238.7587TCP
                                  2024-10-23T09:38:39.731473+02002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.65600074.119.238.7587TCP
                                  2024-10-23T09:38:39.731473+02002839723ETPRO MALWARE Win32/Agent Tesla SMTP Activity1192.168.2.65600074.119.238.7587TCP
                                  2024-10-23T09:38:39.731473+02002840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M21192.168.2.65600074.119.238.7587TCP
                                  2024-10-23T09:38:42.744044+02002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.65600174.119.238.7587TCP
                                  2024-10-23T09:38:42.744044+02002839723ETPRO MALWARE Win32/Agent Tesla SMTP Activity1192.168.2.65600174.119.238.7587TCP
                                  2024-10-23T09:38:42.744044+02002840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M21192.168.2.65600174.119.238.7587TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Oct 23, 2024 09:34:48.837810040 CEST49716587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:49.842765093 CEST49716587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:49.856193066 CEST5874971674.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:49.856271982 CEST5874971674.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:49.856295109 CEST49716587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:49.856322050 CEST49716587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:50.664674997 CEST5874971674.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:50.665560007 CEST49716587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:50.670871973 CEST5874971674.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:50.832675934 CEST5874971674.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:50.833610058 CEST49716587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:50.839075089 CEST5874971674.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:50.995043039 CEST5874971674.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:50.996041059 CEST49716587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:51.001440048 CEST5874971674.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:51.214087009 CEST5874971674.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:51.218091011 CEST49716587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:51.223671913 CEST5874971674.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:51.466455936 CEST5874971674.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:51.501578093 CEST49716587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:51.507131100 CEST5874971674.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:51.696908951 CEST5874971674.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:51.697120905 CEST49716587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:51.702510118 CEST5874971674.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:51.854585886 CEST5874971674.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:51.855077982 CEST49716587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:51.855176926 CEST49716587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:51.855178118 CEST49716587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:51.855178118 CEST49716587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:51.860384941 CEST5874971674.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:51.860449076 CEST5874971674.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:51.860618114 CEST5874971674.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:51.860626936 CEST5874971674.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:52.030633926 CEST5874971674.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:52.077047110 CEST49716587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:52.077249050 CEST49716587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:52.082546949 CEST5874971674.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:52.439352989 CEST5874971674.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:52.440582991 CEST49716587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:52.441374063 CEST49733587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:52.446330070 CEST5874971674.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:52.446703911 CEST5874973374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:52.446774960 CEST49716587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:52.446793079 CEST49733587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:53.122579098 CEST5874973374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:53.122786999 CEST49733587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:53.128493071 CEST5874973374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:53.293791056 CEST5874973374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:53.294028997 CEST49733587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:53.300241947 CEST5874973374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:53.470329046 CEST5874973374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:53.470580101 CEST49733587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:53.475893021 CEST5874973374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:53.646017075 CEST5874973374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:53.646497011 CEST49733587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:53.651798964 CEST5874973374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:53.817094088 CEST5874973374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:53.837891102 CEST49733587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:53.843477011 CEST5874973374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:54.040395975 CEST5874973374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:54.044706106 CEST49733587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:54.050184965 CEST5874973374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:54.209640026 CEST5874973374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:54.214323044 CEST49733587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:54.214374065 CEST49733587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:54.214401007 CEST49733587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:54.214423895 CEST49733587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:54.214473963 CEST49733587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:54.214504957 CEST49733587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:54.214531898 CEST49733587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:54.214551926 CEST49733587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:54.214565992 CEST49733587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:54.214585066 CEST49733587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:34:54.220149994 CEST5874973374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:54.220160961 CEST5874973374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:54.220170021 CEST5874973374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:54.220530033 CEST5874973374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:54.220540047 CEST5874973374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:54.220549107 CEST5874973374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:54.378796101 CEST5874973374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:34:54.420806885 CEST49733587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:27.145580053 CEST49733587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:27.151031017 CEST5874973374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:27.505106926 CEST5874973374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:27.510484934 CEST49733587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:27.516309023 CEST5874973374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:27.516485929 CEST49733587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:27.801795959 CEST55993587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:27.807964087 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:27.808712006 CEST55993587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:28.467101097 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:28.467272043 CEST55993587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:28.473525047 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:28.631742954 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:28.631973982 CEST55993587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:28.637559891 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:28.798243999 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:28.798563957 CEST55993587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:28.803975105 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.088635921 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.088840008 CEST55993587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:29.094388962 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.252393007 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.252583027 CEST55993587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:29.259032011 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.440741062 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.440953970 CEST55993587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:29.446332932 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.614624023 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.616925955 CEST55993587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:29.617007971 CEST55993587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:29.617053032 CEST55993587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:29.617136002 CEST55993587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:29.620460987 CEST55993587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:29.622364044 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.622380972 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.622394085 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.622503996 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.622539043 CEST55993587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:29.625849009 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.625864983 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.625901937 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.625915051 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.625927925 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.625940084 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.625974894 CEST55993587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:29.626019955 CEST55993587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:29.626065969 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.626395941 CEST55993587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:29.627839088 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.627963066 CEST55993587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:29.631387949 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.631484032 CEST55993587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:29.631597042 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.631705046 CEST55993587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:29.631830931 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.631934881 CEST55993587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:29.633389950 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.633512974 CEST55993587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:29.637053967 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.637067080 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.637078047 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.637362957 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.637384892 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.637398958 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.637412071 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.637424946 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.637439966 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.638565063 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.638578892 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.638602018 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.638614893 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.638648033 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.638670921 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.638684988 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.638696909 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.638802052 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.642138958 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.642152071 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.642246008 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.642258883 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.642302990 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:29.642364979 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:30.015037060 CEST55993587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:30.021030903 CEST5875599374.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:30.021145105 CEST55993587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:30.070221901 CEST55994587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:30.075606108 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:30.078454971 CEST55994587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:30.822942972 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:30.823061943 CEST55994587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:30.828438997 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:30.980664968 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:30.980825901 CEST55994587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:30.986150026 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.146948099 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.147164106 CEST55994587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:31.152523994 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.315697908 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.315876961 CEST55994587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:31.321360111 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.474538088 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.474908113 CEST55994587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:31.480279922 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.659137964 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.662075043 CEST55994587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:31.667414904 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.822236061 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.822622061 CEST55994587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:31.822679996 CEST55994587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:31.822679996 CEST55994587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:31.822746992 CEST55994587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:31.823858023 CEST55994587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:31.828027964 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.828105927 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.828119993 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.828135967 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.828249931 CEST55994587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:31.829390049 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.829560041 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.829576015 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.829699039 CEST55994587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:31.833616018 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.833770990 CEST55994587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:31.835295916 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.835443020 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.835483074 CEST55994587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:31.835580111 CEST55994587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:31.839539051 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.839693069 CEST55994587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:31.841161966 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.841260910 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.841275930 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.841288090 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.841304064 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.841315985 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.845403910 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.845489025 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.845503092 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.845515966 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:31.846478939 CEST55994587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:31.851906061 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:32.254528046 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:32.296034098 CEST55994587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:43.948760033 CEST55994587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:43.954046965 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:44.308825970 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:44.342024088 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:44.344470024 CEST55994587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:44.344790936 CEST55994587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:44.348697901 CEST55995587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:44.350089073 CEST5875599474.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:44.354212046 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:44.354342937 CEST55995587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:45.055084944 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:45.055463076 CEST55995587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:45.060878038 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:45.213294029 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:45.213589907 CEST55995587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:45.219166994 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:45.374181032 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:45.374454021 CEST55995587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:45.379853010 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:45.539664984 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:45.540694952 CEST55995587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:45.546952963 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:45.709001064 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:45.709322929 CEST55995587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:45.714864016 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:45.889579058 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:45.892833948 CEST55995587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:45.898272038 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.059427023 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.062638998 CEST55995587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:46.062679052 CEST55995587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:46.062679052 CEST55995587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:46.063458920 CEST55995587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:46.065445900 CEST55995587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:46.068125963 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.068145037 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.068157911 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.068806887 CEST55995587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:46.068831921 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.074297905 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.078521013 CEST55995587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:46.083996058 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.084014893 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.084151030 CEST55995587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:46.084175110 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.084188938 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.084485054 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.084501982 CEST55995587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:46.084743977 CEST55995587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:46.089694023 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.089730978 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.089745045 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.089776039 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.089802980 CEST55995587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:46.089874029 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.089971066 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.089994907 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.090076923 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.090090036 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.090126038 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.090137959 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.090148926 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.090173960 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.090184927 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.090306044 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.090320110 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.090380907 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.090393066 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.090743065 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.090756893 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.091371059 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.095226049 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.095369101 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.491482019 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:46.546040058 CEST55995587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:51.052896976 CEST55995587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:51.158761978 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:51.523443937 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:51.523580074 CEST55995587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:51.524669886 CEST55997587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:51.529623985 CEST5875599574.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:51.529706001 CEST55995587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:51.530170918 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:51.530262947 CEST55997587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:52.202752113 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:52.202919006 CEST55997587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:52.208357096 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:52.359030962 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:52.359246016 CEST55997587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:52.364705086 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:52.515794039 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:52.516072989 CEST55997587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:52.521533012 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:52.690432072 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:52.690643072 CEST55997587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:52.696088076 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:52.846632957 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:52.846966982 CEST55997587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:52.852327108 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.020541906 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.020791054 CEST55997587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:53.026302099 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.187532902 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.187832117 CEST55997587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:53.187832117 CEST55997587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:53.187946081 CEST55997587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:53.187984943 CEST55997587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:53.189116001 CEST55997587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:53.193464994 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.193490982 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.193501949 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.193593979 CEST55997587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:53.193599939 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.194603920 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.194663048 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.194715023 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.198688030 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.198877096 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.202395916 CEST55997587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:53.208033085 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.208125114 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.208164930 CEST55997587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:53.208178043 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.208206892 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.208256006 CEST55997587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:53.208256960 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.208285093 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.208328009 CEST55997587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:53.208369017 CEST55997587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:36:53.213757038 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.213917017 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.213944912 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.213978052 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.214059114 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.214090109 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.214145899 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.214174986 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.214226007 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.214256048 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.214284897 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.214313030 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.214365005 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.214391947 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.214421988 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.214448929 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.214478016 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.214504004 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.214531898 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.214581966 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.214608908 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.214637041 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.214665890 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.606861115 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:36:53.717966080 CEST55997587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:07.171387911 CEST55997587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:07.176748991 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:07.537468910 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:07.537622929 CEST55997587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:07.543571949 CEST5875599774.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:07.543627024 CEST55997587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:11.534753084 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:11.540342093 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:11.540412903 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:12.542751074 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:12.553690910 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:12.559546947 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:12.726495981 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:12.730195045 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:12.737612963 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:12.908417940 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:12.908835888 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:12.914668083 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.163093090 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.163268089 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:13.169234991 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.325546026 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.325719118 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:13.331679106 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.510472059 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.510618925 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:13.516093969 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.668811083 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.669219017 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:13.669333935 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:13.669333935 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:13.669397116 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:13.670813084 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:13.674861908 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.674911976 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.674952030 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.674999952 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:13.675677061 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.676335096 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.676373005 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.676394939 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:13.676413059 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.676444054 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:13.676448107 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.676470995 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:13.676485062 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.676493883 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:13.676513910 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.676527977 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:13.676547050 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.676553965 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:13.676600933 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:13.681303978 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.681368113 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:13.683470964 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.683506012 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.683535099 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:13.683547020 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.683578968 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.683605909 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.683610916 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:13.683633089 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:13.683672905 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:13.687875032 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.687925100 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:13.688433886 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.690232992 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.690303087 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.690335035 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.690385103 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.690444946 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.690474033 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.690510035 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.690536976 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.690866947 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.690903902 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.690936089 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.691051960 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.691080093 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.691107988 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.691134930 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.691170931 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.691196918 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.691224098 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.693191051 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.693217993 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:13.693737030 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:14.080749989 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:14.126609087 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:37.674104929 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:37.679694891 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:38.035000086 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:38.037113905 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:38.039428949 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:38.042886972 CEST5875599974.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:38.044856071 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:38.044977903 CEST55999587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:38.044977903 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:38.722461939 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:38.722821951 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:38.728296995 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:38.878746033 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:38.878977060 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:38.884381056 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.043225050 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.043505907 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:39.049019098 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.203700066 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.203840971 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:39.211611986 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.373205900 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.373373985 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:39.378737926 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.552675962 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.552823067 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:39.558109045 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.724376917 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.724600077 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:39.724726915 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:39.724823952 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:39.724890947 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:39.726030111 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:39.729870081 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.730024099 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.730036974 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.730103970 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:39.730185032 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.731411934 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.731472969 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:39.731528044 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.731581926 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:39.735302925 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.735368967 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:39.735378027 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.735421896 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:39.736812115 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.736859083 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:39.736891031 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.736934900 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:39.736934900 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.737010002 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.737020016 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.737035990 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:39.737036943 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.737052917 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:39.737070084 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:39.737097025 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:39.740787029 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.740834951 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:39.740886927 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.740896940 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.740912914 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.740940094 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:39.742173910 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.742296934 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.742357016 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.742409945 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.742475986 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.742551088 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.742582083 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.742592096 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.746328115 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.746370077 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.746380091 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.746413946 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.746424913 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.746433973 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.746493101 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.746534109 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:39.746543884 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:40.135756969 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:40.186877966 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:40.572648048 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:40.578141928 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:40.936165094 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:40.936273098 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:40.937558889 CEST56001587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:40.941957951 CEST5875600074.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:40.942012072 CEST56000587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:40.942934990 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:40.942995071 CEST56001587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:41.729005098 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:41.729188919 CEST56001587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:41.734816074 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:41.885580063 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:41.887034893 CEST56001587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:41.892431974 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:42.047859907 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:42.063683033 CEST56001587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:42.069319010 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:42.232436895 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:42.233834982 CEST56001587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:42.239415884 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:42.389841080 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:42.402275085 CEST56001587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:42.407763004 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:42.572793961 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:42.572969913 CEST56001587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:42.578489065 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:42.728801966 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:42.732986927 CEST56001587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:42.733043909 CEST56001587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:42.733043909 CEST56001587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:42.733135939 CEST56001587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:42.737754107 CEST56001587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:42.738466024 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:42.738501072 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:42.738532066 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:42.738595009 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:42.738595963 CEST56001587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:42.743347883 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:42.743653059 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:42.743895054 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:42.744044065 CEST56001587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:42.749479055 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:42.749567032 CEST56001587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:42.749684095 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:42.749739885 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:42.749756098 CEST56001587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:42.749808073 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:42.749823093 CEST56001587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:42.749838114 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:42.749888897 CEST56001587192.168.2.674.119.238.7
                                  Oct 23, 2024 09:38:42.755235910 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:42.755906105 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:43.146905899 CEST5875600174.119.238.7192.168.2.6
                                  Oct 23, 2024 09:38:43.343111038 CEST56001587192.168.2.674.119.238.7
                                  TimestampSource PortDest PortSource IPDest IP
                                  Oct 23, 2024 09:34:48.270061970 CEST6109753192.168.2.61.1.1.1
                                  Oct 23, 2024 09:34:48.579580069 CEST53610971.1.1.1192.168.2.6
                                  Oct 23, 2024 09:35:11.897332907 CEST5360284162.159.36.2192.168.2.6
                                  Oct 23, 2024 09:35:12.579189062 CEST4917453192.168.2.61.1.1.1
                                  Oct 23, 2024 09:35:12.587115049 CEST53491741.1.1.1192.168.2.6
                                  Oct 23, 2024 09:36:27.513391972 CEST5347653192.168.2.61.1.1.1
                                  Oct 23, 2024 09:36:27.799129009 CEST53534761.1.1.1192.168.2.6
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Oct 23, 2024 09:34:48.270061970 CEST192.168.2.61.1.1.10x8e14Standard query (0)mail.alhoneycomb.comA (IP address)IN (0x0001)false
                                  Oct 23, 2024 09:35:12.579189062 CEST192.168.2.61.1.1.10xb807Standard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                  Oct 23, 2024 09:36:27.513391972 CEST192.168.2.61.1.1.10x8156Standard query (0)mail.alhoneycomb.comA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Oct 23, 2024 09:34:48.579580069 CEST1.1.1.1192.168.2.60x8e14No error (0)mail.alhoneycomb.com74.119.238.7A (IP address)IN (0x0001)false
                                  Oct 23, 2024 09:35:12.587115049 CEST1.1.1.1192.168.2.60xb807Name error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                  Oct 23, 2024 09:36:27.799129009 CEST1.1.1.1192.168.2.60x8156No error (0)mail.alhoneycomb.com74.119.238.7A (IP address)IN (0x0001)false
                                  TimestampSource PortDest PortSource IPDest IPCommands
                                  Oct 23, 2024 09:34:50.664674997 CEST5874971674.119.238.7192.168.2.6220-md-la-5.webhostbox.net ESMTP Exim 4.96.2 #2 Wed, 23 Oct 2024 13:04:50 +0530
                                  220-We do not authorize the use of this system to transport unsolicited,
                                  220 and/or bulk e-mail.
                                  Oct 23, 2024 09:34:50.665560007 CEST49716587192.168.2.674.119.238.7EHLO 609290
                                  Oct 23, 2024 09:34:50.832675934 CEST5874971674.119.238.7192.168.2.6250-md-la-5.webhostbox.net Hello 609290 [173.254.250.90]
                                  250-SIZE 52428800
                                  250-8BITMIME
                                  250-PIPELINING
                                  250-PIPECONNECT
                                  250-AUTH PLAIN LOGIN
                                  250-STARTTLS
                                  250 HELP
                                  Oct 23, 2024 09:34:50.833610058 CEST49716587192.168.2.674.119.238.7AUTH login YmxvZ0BhbGhvbmV5Y29tYi5jb20=
                                  Oct 23, 2024 09:34:50.995043039 CEST5874971674.119.238.7192.168.2.6334 UGFzc3dvcmQ6
                                  Oct 23, 2024 09:34:51.214087009 CEST5874971674.119.238.7192.168.2.6235 Authentication succeeded
                                  Oct 23, 2024 09:34:51.218091011 CEST49716587192.168.2.674.119.238.7MAIL FROM:<blog@alhoneycomb.com>
                                  Oct 23, 2024 09:34:51.466455936 CEST5874971674.119.238.7192.168.2.6250 OK
                                  Oct 23, 2024 09:34:51.501578093 CEST49716587192.168.2.674.119.238.7RCPT TO:<blog@alhoneycomb.com>
                                  Oct 23, 2024 09:34:51.696908951 CEST5874971674.119.238.7192.168.2.6250 Accepted
                                  Oct 23, 2024 09:34:51.697120905 CEST49716587192.168.2.674.119.238.7DATA
                                  Oct 23, 2024 09:34:51.854585886 CEST5874971674.119.238.7192.168.2.6354 Enter message, ending with "." on a line by itself
                                  Oct 23, 2024 09:34:51.855178118 CEST49716587192.168.2.674.119.238.7.
                                  Oct 23, 2024 09:34:52.030633926 CEST5874971674.119.238.7192.168.2.6250 OK id=1t3VtL-001KCJ-2U
                                  Oct 23, 2024 09:34:52.077249050 CEST49716587192.168.2.674.119.238.7QUIT
                                  Oct 23, 2024 09:34:52.439352989 CEST5874971674.119.238.7192.168.2.6221 md-la-5.webhostbox.net closing connection
                                  Oct 23, 2024 09:34:53.122579098 CEST5874973374.119.238.7192.168.2.6220-md-la-5.webhostbox.net ESMTP Exim 4.96.2 #2 Wed, 23 Oct 2024 13:04:53 +0530
                                  220-We do not authorize the use of this system to transport unsolicited,
                                  220 and/or bulk e-mail.
                                  Oct 23, 2024 09:34:53.122786999 CEST49733587192.168.2.674.119.238.7EHLO 609290
                                  Oct 23, 2024 09:34:53.293791056 CEST5874973374.119.238.7192.168.2.6250-md-la-5.webhostbox.net Hello 609290 [173.254.250.90]
                                  250-SIZE 52428800
                                  250-8BITMIME
                                  250-PIPELINING
                                  250-PIPECONNECT
                                  250-AUTH PLAIN LOGIN
                                  250-STARTTLS
                                  250 HELP
                                  Oct 23, 2024 09:34:53.294028997 CEST49733587192.168.2.674.119.238.7AUTH login YmxvZ0BhbGhvbmV5Y29tYi5jb20=
                                  Oct 23, 2024 09:34:53.470329046 CEST5874973374.119.238.7192.168.2.6334 UGFzc3dvcmQ6
                                  Oct 23, 2024 09:34:53.646017075 CEST5874973374.119.238.7192.168.2.6235 Authentication succeeded
                                  Oct 23, 2024 09:34:53.646497011 CEST49733587192.168.2.674.119.238.7MAIL FROM:<blog@alhoneycomb.com>
                                  Oct 23, 2024 09:34:53.817094088 CEST5874973374.119.238.7192.168.2.6250 OK
                                  Oct 23, 2024 09:34:53.837891102 CEST49733587192.168.2.674.119.238.7RCPT TO:<blog@alhoneycomb.com>
                                  Oct 23, 2024 09:34:54.040395975 CEST5874973374.119.238.7192.168.2.6250 Accepted
                                  Oct 23, 2024 09:34:54.044706106 CEST49733587192.168.2.674.119.238.7DATA
                                  Oct 23, 2024 09:34:54.209640026 CEST5874973374.119.238.7192.168.2.6354 Enter message, ending with "." on a line by itself
                                  Oct 23, 2024 09:34:54.214585066 CEST49733587192.168.2.674.119.238.7.
                                  Oct 23, 2024 09:34:54.378796101 CEST5874973374.119.238.7192.168.2.6250 OK id=1t3VtO-001KDl-0P
                                  Oct 23, 2024 09:36:27.145580053 CEST49733587192.168.2.674.119.238.7QUIT
                                  Oct 23, 2024 09:36:27.505106926 CEST5874973374.119.238.7192.168.2.6221 md-la-5.webhostbox.net closing connection
                                  Oct 23, 2024 09:36:28.467101097 CEST5875599374.119.238.7192.168.2.6220-md-la-5.webhostbox.net ESMTP Exim 4.96.2 #2 Wed, 23 Oct 2024 13:06:28 +0530
                                  220-We do not authorize the use of this system to transport unsolicited,
                                  220 and/or bulk e-mail.
                                  Oct 23, 2024 09:36:28.467272043 CEST55993587192.168.2.674.119.238.7EHLO 609290
                                  Oct 23, 2024 09:36:28.631742954 CEST5875599374.119.238.7192.168.2.6250-md-la-5.webhostbox.net Hello 609290 [173.254.250.90]
                                  250-SIZE 52428800
                                  250-8BITMIME
                                  250-PIPELINING
                                  250-PIPECONNECT
                                  250-AUTH PLAIN LOGIN
                                  250-STARTTLS
                                  250 HELP
                                  Oct 23, 2024 09:36:28.631973982 CEST55993587192.168.2.674.119.238.7AUTH login YmxvZ0BhbGhvbmV5Y29tYi5jb20=
                                  Oct 23, 2024 09:36:28.798243999 CEST5875599374.119.238.7192.168.2.6334 UGFzc3dvcmQ6
                                  Oct 23, 2024 09:36:29.088635921 CEST5875599374.119.238.7192.168.2.6235 Authentication succeeded
                                  Oct 23, 2024 09:36:29.088840008 CEST55993587192.168.2.674.119.238.7MAIL FROM:<blog@alhoneycomb.com>
                                  Oct 23, 2024 09:36:29.252393007 CEST5875599374.119.238.7192.168.2.6250 OK
                                  Oct 23, 2024 09:36:29.252583027 CEST55993587192.168.2.674.119.238.7RCPT TO:<blog@alhoneycomb.com>
                                  Oct 23, 2024 09:36:29.440741062 CEST5875599374.119.238.7192.168.2.6250 Accepted
                                  Oct 23, 2024 09:36:29.440953970 CEST55993587192.168.2.674.119.238.7DATA
                                  Oct 23, 2024 09:36:29.614624023 CEST5875599374.119.238.7192.168.2.6354 Enter message, ending with "." on a line by itself
                                  Oct 23, 2024 09:36:30.822942972 CEST5875599474.119.238.7192.168.2.6220-md-la-5.webhostbox.net ESMTP Exim 4.96.2 #2 Wed, 23 Oct 2024 13:06:30 +0530
                                  220-We do not authorize the use of this system to transport unsolicited,
                                  220 and/or bulk e-mail.
                                  Oct 23, 2024 09:36:30.823061943 CEST55994587192.168.2.674.119.238.7EHLO 609290
                                  Oct 23, 2024 09:36:30.980664968 CEST5875599474.119.238.7192.168.2.6250-md-la-5.webhostbox.net Hello 609290 [173.254.250.90]
                                  250-SIZE 52428800
                                  250-8BITMIME
                                  250-PIPELINING
                                  250-PIPECONNECT
                                  250-AUTH PLAIN LOGIN
                                  250-STARTTLS
                                  250 HELP
                                  Oct 23, 2024 09:36:30.980825901 CEST55994587192.168.2.674.119.238.7AUTH login YmxvZ0BhbGhvbmV5Y29tYi5jb20=
                                  Oct 23, 2024 09:36:31.146948099 CEST5875599474.119.238.7192.168.2.6334 UGFzc3dvcmQ6
                                  Oct 23, 2024 09:36:31.315697908 CEST5875599474.119.238.7192.168.2.6235 Authentication succeeded
                                  Oct 23, 2024 09:36:31.315876961 CEST55994587192.168.2.674.119.238.7MAIL FROM:<blog@alhoneycomb.com>
                                  Oct 23, 2024 09:36:31.474538088 CEST5875599474.119.238.7192.168.2.6250 OK
                                  Oct 23, 2024 09:36:31.474908113 CEST55994587192.168.2.674.119.238.7RCPT TO:<blog@alhoneycomb.com>
                                  Oct 23, 2024 09:36:31.659137964 CEST5875599474.119.238.7192.168.2.6250 Accepted
                                  Oct 23, 2024 09:36:31.662075043 CEST55994587192.168.2.674.119.238.7DATA
                                  Oct 23, 2024 09:36:31.822236061 CEST5875599474.119.238.7192.168.2.6354 Enter message, ending with "." on a line by itself
                                  Oct 23, 2024 09:36:31.846478939 CEST55994587192.168.2.674.119.238.7.
                                  Oct 23, 2024 09:36:32.254528046 CEST5875599474.119.238.7192.168.2.6250 OK id=1t3Vux-001LUq-2N
                                  Oct 23, 2024 09:36:43.948760033 CEST55994587192.168.2.674.119.238.7QUIT
                                  Oct 23, 2024 09:36:44.308825970 CEST5875599474.119.238.7192.168.2.6221 md-la-5.webhostbox.net closing connection
                                  Oct 23, 2024 09:36:45.055084944 CEST5875599574.119.238.7192.168.2.6220-md-la-5.webhostbox.net ESMTP Exim 4.96.2 #2 Wed, 23 Oct 2024 13:06:44 +0530
                                  220-We do not authorize the use of this system to transport unsolicited,
                                  220 and/or bulk e-mail.
                                  Oct 23, 2024 09:36:45.055463076 CEST55995587192.168.2.674.119.238.7EHLO 609290
                                  Oct 23, 2024 09:36:45.213294029 CEST5875599574.119.238.7192.168.2.6250-md-la-5.webhostbox.net Hello 609290 [173.254.250.90]
                                  250-SIZE 52428800
                                  250-8BITMIME
                                  250-PIPELINING
                                  250-PIPECONNECT
                                  250-AUTH PLAIN LOGIN
                                  250-STARTTLS
                                  250 HELP
                                  Oct 23, 2024 09:36:45.213589907 CEST55995587192.168.2.674.119.238.7AUTH login YmxvZ0BhbGhvbmV5Y29tYi5jb20=
                                  Oct 23, 2024 09:36:45.374181032 CEST5875599574.119.238.7192.168.2.6334 UGFzc3dvcmQ6
                                  Oct 23, 2024 09:36:45.539664984 CEST5875599574.119.238.7192.168.2.6235 Authentication succeeded
                                  Oct 23, 2024 09:36:45.540694952 CEST55995587192.168.2.674.119.238.7MAIL FROM:<blog@alhoneycomb.com>
                                  Oct 23, 2024 09:36:45.709001064 CEST5875599574.119.238.7192.168.2.6250 OK
                                  Oct 23, 2024 09:36:45.709322929 CEST55995587192.168.2.674.119.238.7RCPT TO:<blog@alhoneycomb.com>
                                  Oct 23, 2024 09:36:45.889579058 CEST5875599574.119.238.7192.168.2.6250 Accepted
                                  Oct 23, 2024 09:36:45.892833948 CEST55995587192.168.2.674.119.238.7DATA
                                  Oct 23, 2024 09:36:46.059427023 CEST5875599574.119.238.7192.168.2.6354 Enter message, ending with "." on a line by itself
                                  Oct 23, 2024 09:36:46.491482019 CEST5875599574.119.238.7192.168.2.6250 OK id=1t3VvB-001LgD-38
                                  Oct 23, 2024 09:36:51.052896976 CEST55995587192.168.2.674.119.238.7QUIT
                                  Oct 23, 2024 09:36:51.523443937 CEST5875599574.119.238.7192.168.2.6221 md-la-5.webhostbox.net closing connection
                                  Oct 23, 2024 09:36:52.202752113 CEST5875599774.119.238.7192.168.2.6220-md-la-5.webhostbox.net ESMTP Exim 4.96.2 #2 Wed, 23 Oct 2024 13:06:52 +0530
                                  220-We do not authorize the use of this system to transport unsolicited,
                                  220 and/or bulk e-mail.
                                  Oct 23, 2024 09:36:52.202919006 CEST55997587192.168.2.674.119.238.7EHLO 609290
                                  Oct 23, 2024 09:36:52.359030962 CEST5875599774.119.238.7192.168.2.6250-md-la-5.webhostbox.net Hello 609290 [173.254.250.90]
                                  250-SIZE 52428800
                                  250-8BITMIME
                                  250-PIPELINING
                                  250-PIPECONNECT
                                  250-AUTH PLAIN LOGIN
                                  250-STARTTLS
                                  250 HELP
                                  Oct 23, 2024 09:36:52.359246016 CEST55997587192.168.2.674.119.238.7AUTH login YmxvZ0BhbGhvbmV5Y29tYi5jb20=
                                  Oct 23, 2024 09:36:52.515794039 CEST5875599774.119.238.7192.168.2.6334 UGFzc3dvcmQ6
                                  Oct 23, 2024 09:36:52.690432072 CEST5875599774.119.238.7192.168.2.6235 Authentication succeeded
                                  Oct 23, 2024 09:36:52.690643072 CEST55997587192.168.2.674.119.238.7MAIL FROM:<blog@alhoneycomb.com>
                                  Oct 23, 2024 09:36:52.846632957 CEST5875599774.119.238.7192.168.2.6250 OK
                                  Oct 23, 2024 09:36:52.846966982 CEST55997587192.168.2.674.119.238.7RCPT TO:<blog@alhoneycomb.com>
                                  Oct 23, 2024 09:36:53.020541906 CEST5875599774.119.238.7192.168.2.6250 Accepted
                                  Oct 23, 2024 09:36:53.020791054 CEST55997587192.168.2.674.119.238.7DATA
                                  Oct 23, 2024 09:36:53.187532902 CEST5875599774.119.238.7192.168.2.6354 Enter message, ending with "." on a line by itself
                                  Oct 23, 2024 09:36:53.606861115 CEST5875599774.119.238.7192.168.2.6250 OK id=1t3VvJ-001Lk0-0I
                                  Oct 23, 2024 09:38:07.171387911 CEST55997587192.168.2.674.119.238.7QUIT
                                  Oct 23, 2024 09:38:07.537468910 CEST5875599774.119.238.7192.168.2.6221 md-la-5.webhostbox.net closing connection
                                  Oct 23, 2024 09:38:12.542751074 CEST5875599974.119.238.7192.168.2.6220-md-la-5.webhostbox.net ESMTP Exim 4.96.2 #2 Wed, 23 Oct 2024 13:08:12 +0530
                                  220-We do not authorize the use of this system to transport unsolicited,
                                  220 and/or bulk e-mail.
                                  Oct 23, 2024 09:38:12.553690910 CEST55999587192.168.2.674.119.238.7EHLO 609290
                                  Oct 23, 2024 09:38:12.726495981 CEST5875599974.119.238.7192.168.2.6250-md-la-5.webhostbox.net Hello 609290 [173.254.250.90]
                                  250-SIZE 52428800
                                  250-8BITMIME
                                  250-PIPELINING
                                  250-PIPECONNECT
                                  250-AUTH PLAIN LOGIN
                                  250-STARTTLS
                                  250 HELP
                                  Oct 23, 2024 09:38:12.730195045 CEST55999587192.168.2.674.119.238.7AUTH login YmxvZ0BhbGhvbmV5Y29tYi5jb20=
                                  Oct 23, 2024 09:38:12.908417940 CEST5875599974.119.238.7192.168.2.6334 UGFzc3dvcmQ6
                                  Oct 23, 2024 09:38:13.163093090 CEST5875599974.119.238.7192.168.2.6235 Authentication succeeded
                                  Oct 23, 2024 09:38:13.163268089 CEST55999587192.168.2.674.119.238.7MAIL FROM:<blog@alhoneycomb.com>
                                  Oct 23, 2024 09:38:13.325546026 CEST5875599974.119.238.7192.168.2.6250 OK
                                  Oct 23, 2024 09:38:13.325719118 CEST55999587192.168.2.674.119.238.7RCPT TO:<blog@alhoneycomb.com>
                                  Oct 23, 2024 09:38:13.510472059 CEST5875599974.119.238.7192.168.2.6250 Accepted
                                  Oct 23, 2024 09:38:13.510618925 CEST55999587192.168.2.674.119.238.7DATA
                                  Oct 23, 2024 09:38:13.668811083 CEST5875599974.119.238.7192.168.2.6354 Enter message, ending with "." on a line by itself
                                  Oct 23, 2024 09:38:14.080749989 CEST5875599974.119.238.7192.168.2.6250 OK id=1t3Vwb-001MIQ-1s
                                  Oct 23, 2024 09:38:37.674104929 CEST55999587192.168.2.674.119.238.7QUIT
                                  Oct 23, 2024 09:38:38.035000086 CEST5875599974.119.238.7192.168.2.6221 md-la-5.webhostbox.net closing connection
                                  Oct 23, 2024 09:38:38.722461939 CEST5875600074.119.238.7192.168.2.6220-md-la-5.webhostbox.net ESMTP Exim 4.96.2 #2 Wed, 23 Oct 2024 13:08:38 +0530
                                  220-We do not authorize the use of this system to transport unsolicited,
                                  220 and/or bulk e-mail.
                                  Oct 23, 2024 09:38:38.722821951 CEST56000587192.168.2.674.119.238.7EHLO 609290
                                  Oct 23, 2024 09:38:38.878746033 CEST5875600074.119.238.7192.168.2.6250-md-la-5.webhostbox.net Hello 609290 [173.254.250.90]
                                  250-SIZE 52428800
                                  250-8BITMIME
                                  250-PIPELINING
                                  250-PIPECONNECT
                                  250-AUTH PLAIN LOGIN
                                  250-STARTTLS
                                  250 HELP
                                  Oct 23, 2024 09:38:38.878977060 CEST56000587192.168.2.674.119.238.7AUTH login YmxvZ0BhbGhvbmV5Y29tYi5jb20=
                                  Oct 23, 2024 09:38:39.043225050 CEST5875600074.119.238.7192.168.2.6334 UGFzc3dvcmQ6
                                  Oct 23, 2024 09:38:39.203700066 CEST5875600074.119.238.7192.168.2.6235 Authentication succeeded
                                  Oct 23, 2024 09:38:39.203840971 CEST56000587192.168.2.674.119.238.7MAIL FROM:<blog@alhoneycomb.com>
                                  Oct 23, 2024 09:38:39.373205900 CEST5875600074.119.238.7192.168.2.6250 OK
                                  Oct 23, 2024 09:38:39.373373985 CEST56000587192.168.2.674.119.238.7RCPT TO:<blog@alhoneycomb.com>
                                  Oct 23, 2024 09:38:39.552675962 CEST5875600074.119.238.7192.168.2.6250 Accepted
                                  Oct 23, 2024 09:38:39.552823067 CEST56000587192.168.2.674.119.238.7DATA
                                  Oct 23, 2024 09:38:39.724376917 CEST5875600074.119.238.7192.168.2.6354 Enter message, ending with "." on a line by itself
                                  Oct 23, 2024 09:38:40.135756969 CEST5875600074.119.238.7192.168.2.6250 OK id=1t3Vx1-001MWG-22
                                  Oct 23, 2024 09:38:40.572648048 CEST56000587192.168.2.674.119.238.7QUIT
                                  Oct 23, 2024 09:38:40.936165094 CEST5875600074.119.238.7192.168.2.6221 md-la-5.webhostbox.net closing connection
                                  Oct 23, 2024 09:38:41.729005098 CEST5875600174.119.238.7192.168.2.6220-md-la-5.webhostbox.net ESMTP Exim 4.96.2 #2 Wed, 23 Oct 2024 13:08:41 +0530
                                  220-We do not authorize the use of this system to transport unsolicited,
                                  220 and/or bulk e-mail.
                                  Oct 23, 2024 09:38:41.729188919 CEST56001587192.168.2.674.119.238.7EHLO 609290
                                  Oct 23, 2024 09:38:41.885580063 CEST5875600174.119.238.7192.168.2.6250-md-la-5.webhostbox.net Hello 609290 [173.254.250.90]
                                  250-SIZE 52428800
                                  250-8BITMIME
                                  250-PIPELINING
                                  250-PIPECONNECT
                                  250-AUTH PLAIN LOGIN
                                  250-STARTTLS
                                  250 HELP
                                  Oct 23, 2024 09:38:41.887034893 CEST56001587192.168.2.674.119.238.7AUTH login YmxvZ0BhbGhvbmV5Y29tYi5jb20=
                                  Oct 23, 2024 09:38:42.047859907 CEST5875600174.119.238.7192.168.2.6334 UGFzc3dvcmQ6
                                  Oct 23, 2024 09:38:42.232436895 CEST5875600174.119.238.7192.168.2.6235 Authentication succeeded
                                  Oct 23, 2024 09:38:42.233834982 CEST56001587192.168.2.674.119.238.7MAIL FROM:<blog@alhoneycomb.com>
                                  Oct 23, 2024 09:38:42.389841080 CEST5875600174.119.238.7192.168.2.6250 OK
                                  Oct 23, 2024 09:38:42.402275085 CEST56001587192.168.2.674.119.238.7RCPT TO:<blog@alhoneycomb.com>
                                  Oct 23, 2024 09:38:42.572793961 CEST5875600174.119.238.7192.168.2.6250 Accepted
                                  Oct 23, 2024 09:38:42.572969913 CEST56001587192.168.2.674.119.238.7DATA
                                  Oct 23, 2024 09:38:42.728801966 CEST5875600174.119.238.7192.168.2.6354 Enter message, ending with "." on a line by itself
                                  Oct 23, 2024 09:38:43.146905899 CEST5875600174.119.238.7192.168.2.6250 OK id=1t3Vx4-001MXT-25

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:03:34:40
                                  Start date:23/10/2024
                                  Path:C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154085.exe"
                                  Imagebase:0x1c6c17f0000
                                  File size:1'857'125 bytes
                                  MD5 hash:C5F2F6ABD7EEC8C18DF5EE086799E1E4
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2214230680.000001C6D5113000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2214230680.000001C6D5113000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2213530683.000001C6C38EE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2214230680.000001C6D375F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2214230680.000001C6D375F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:true

                                  Target ID:2
                                  Start time:03:34:43
                                  Start date:23/10/2024
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
                                  Imagebase:0x480000
                                  File size:47'584 bytes
                                  MD5 hash:94C8E57A80DFCA2482DEDB87B93D4FD9
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4625900767.000000000285F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4625900767.0000000002811000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4625900767.0000000002811000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4625900767.0000000002867000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4610361547.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4610361547.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:moderate
                                  Has exited:false

                                  Target ID:3
                                  Start time:03:34:43
                                  Start date:23/10/2024
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
                                  Imagebase:0x730000
                                  File size:47'584 bytes
                                  MD5 hash:94C8E57A80DFCA2482DEDB87B93D4FD9
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:6
                                  Start time:03:34:43
                                  Start date:23/10/2024
                                  Path:C:\Windows\System32\WerFault.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\WerFault.exe -u -p 6484 -s 1008
                                  Imagebase:0x7ff65a070000
                                  File size:570'736 bytes
                                  MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:10.5%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:2.2%
                                    Total number of Nodes:317
                                    Total number of Limit Nodes:37
                                    execution_graph 44736 cc09cd 44738 cc084e 44736->44738 44737 cc091b 44738->44736 44738->44737 44742 cc14d7 44738->44742 44751 5eff1d8 44738->44751 44755 5eff1c8 44738->44755 44744 cc14e4 44742->44744 44743 cc15e8 44743->44738 44744->44743 44759 5efe8e0 44744->44759 44765 5efe8d0 44744->44765 44771 cc70e0 44744->44771 44775 cc7043 44744->44775 44779 5ef8ed8 44744->44779 44783 5ef8ecb 44744->44783 44752 5eff1da 44751->44752 44842 5efdca8 44752->44842 44756 5eff1d8 44755->44756 44757 5efdca8 5 API calls 44756->44757 44758 5eff207 44757->44758 44758->44738 44760 5efe8e8 44759->44760 44761 5efe92d 44760->44761 44787 5efe9c2 44760->44787 44791 5efe940 44760->44791 44795 5efe931 44760->44795 44761->44744 44766 5efe8e0 44765->44766 44767 5efe92d 44766->44767 44768 5efe9c2 SetWindowsHookExA 44766->44768 44769 5efe931 SetWindowsHookExA 44766->44769 44770 5efe940 SetWindowsHookExA 44766->44770 44767->44744 44768->44766 44769->44766 44770->44766 44773 cc70ea 44771->44773 44772 cc717f 44772->44744 44773->44772 44803 cc9d92 44773->44803 44777 cc7068 44775->44777 44776 cc70ac 44776->44744 44777->44776 44778 cc9d92 2 API calls 44777->44778 44778->44777 44781 5ef8eea 44779->44781 44780 5ef8f9b 44780->44744 44781->44780 44834 5ef8b8c 44781->44834 44784 5ef8ed8 44783->44784 44785 5ef8b8c KiUserCallbackDispatcher 44784->44785 44786 5ef8f9b 44784->44786 44785->44786 44786->44744 44789 5efe97d 44787->44789 44788 5efe9d0 44788->44760 44789->44788 44799 5efdb08 44789->44799 44793 5efe95d 44791->44793 44792 5efe9d0 44792->44760 44793->44792 44794 5efdb08 SetWindowsHookExA 44793->44794 44794->44793 44797 5efe940 44795->44797 44796 5efe9d0 44796->44760 44797->44796 44798 5efdb08 SetWindowsHookExA 44797->44798 44798->44797 44802 5efeb48 SetWindowsHookExA 44799->44802 44801 5efebd2 44801->44789 44802->44801 44805 cc9e03 44803->44805 44804 cc9fb7 44804->44773 44805->44804 44806 cc9f17 GetActiveWindow 44805->44806 44807 cc9f45 44805->44807 44806->44807 44807->44804 44810 cca7c0 44807->44810 44814 cca7b0 44807->44814 44811 cca7c9 44810->44811 44818 cc9cb8 44811->44818 44815 cca7c0 44814->44815 44816 cc9cb8 OleInitialize 44815->44816 44817 cca7d4 44816->44817 44817->44804 44819 cc9bf1 44818->44819 44822 cc9bb5 44819->44822 44823 ccb81c 44819->44823 44821 ccba32 44821->44821 44824 ccb827 44823->44824 44826 ccbb11 44824->44826 44827 ccb904 44824->44827 44826->44821 44829 ccb90f 44827->44829 44828 ccbe4b 44828->44826 44829->44828 44831 ccb920 44829->44831 44832 ccbe80 OleInitialize 44831->44832 44833 ccbee4 44832->44833 44833->44828 44835 5ef8b97 44834->44835 44837 5efc5cb 44835->44837 44838 5ef9d2c 44835->44838 44837->44780 44839 5efc5e0 KiUserCallbackDispatcher 44838->44839 44841 5efc64e 44839->44841 44841->44835 44844 5efdcb3 44842->44844 44846 5eff220 44844->44846 44845 5eff6cd 44845->44845 44849 5eff22b 44846->44849 44847 5eff918 44848 5eff973 44847->44848 44864 61293d0 44847->44864 44869 61293c1 44847->44869 44848->44845 44849->44847 44849->44848 44854 6120681 44849->44854 44859 61206c8 44849->44859 44856 612068b 44854->44856 44855 6120696 44855->44847 44856->44855 44874 6120878 44856->44874 44879 6120868 44856->44879 44860 61206e9 44859->44860 44861 612070d 44860->44861 44862 6120878 2 API calls 44860->44862 44863 6120868 2 API calls 44860->44863 44861->44847 44862->44861 44863->44861 44866 6129435 44864->44866 44865 6129482 44865->44848 44866->44865 44867 6129898 WaitMessage 44866->44867 44966 612889c 44866->44966 44867->44866 44872 6129435 44869->44872 44870 6129898 WaitMessage 44870->44872 44871 612889c DispatchMessageW 44871->44872 44872->44870 44872->44871 44873 6129482 44872->44873 44873->44848 44875 6120885 44874->44875 44876 61208be 44875->44876 44884 61208d0 44875->44884 44890 61208e0 44875->44890 44876->44855 44881 6120878 44879->44881 44880 61208be 44880->44855 44881->44880 44882 61208d0 2 API calls 44881->44882 44883 61208e0 2 API calls 44881->44883 44882->44880 44883->44880 44885 61208e0 44884->44885 44886 6120930 44885->44886 44896 6120990 44885->44896 44904 61209dc 44885->44904 44913 6120978 44885->44913 44886->44886 44891 6120908 44890->44891 44892 6120930 44891->44892 44893 6120990 2 API calls 44891->44893 44894 6120978 2 API calls 44891->44894 44895 61209dc 2 API calls 44891->44895 44892->44892 44893->44892 44894->44892 44895->44892 44897 612099a 44896->44897 44921 6121790 44897->44921 44925 6121780 44897->44925 44898 612099f 44929 6125370 44898->44929 44935 6125367 44898->44935 44899 61209d9 44899->44886 44905 612099a 44904->44905 44906 61209ea 44904->44906 44911 6121790 2 API calls 44905->44911 44912 6121780 2 API calls 44905->44912 44907 612099f 44909 6125370 2 API calls 44907->44909 44910 6125367 2 API calls 44907->44910 44908 61209d9 44908->44886 44909->44908 44910->44908 44911->44907 44912->44907 44914 6120990 44913->44914 44919 6121790 2 API calls 44914->44919 44920 6121780 2 API calls 44914->44920 44915 61209d9 44915->44886 44916 612099f 44917 6125370 2 API calls 44916->44917 44918 6125367 2 API calls 44916->44918 44917->44915 44918->44915 44919->44916 44920->44916 44922 61217c0 44921->44922 44923 6121a98 44922->44923 44924 61206c8 2 API calls 44922->44924 44923->44898 44924->44923 44928 6121790 44925->44928 44926 6121a98 44926->44898 44927 61206c8 2 API calls 44927->44926 44928->44926 44928->44927 44931 61253a1 44929->44931 44932 61253ed 44929->44932 44930 61253ad 44930->44899 44931->44930 44941 61255da 44931->44941 44946 61255e8 44931->44946 44932->44899 44937 61253a1 44935->44937 44938 61253ed 44935->44938 44936 61253ad 44936->44899 44937->44936 44939 61255da 2 API calls 44937->44939 44940 61255e8 2 API calls 44937->44940 44938->44899 44939->44938 44940->44938 44942 61255e3 44941->44942 44950 6125618 44942->44950 44958 6125628 44942->44958 44943 61255f2 44943->44932 44948 6125618 2 API calls 44946->44948 44949 6125628 2 API calls 44946->44949 44947 61255f2 44947->44932 44948->44947 44949->44947 44951 6125639 44950->44951 44953 6125654 44950->44953 44954 5efaa58 GetModuleHandleW 44951->44954 44955 5efaa60 GetModuleHandleW 44951->44955 44952 6125644 44952->44953 44956 6125618 GetModuleHandleW GetModuleHandleW 44952->44956 44957 6125628 GetModuleHandleW GetModuleHandleW 44952->44957 44953->44943 44954->44952 44955->44952 44956->44953 44957->44953 44959 6125639 44958->44959 44961 6125654 44958->44961 44964 5efaa58 GetModuleHandleW 44959->44964 44965 5efaa60 GetModuleHandleW 44959->44965 44960 6125644 44960->44961 44962 6125618 GetModuleHandleW GetModuleHandleW 44960->44962 44963 6125628 GetModuleHandleW GetModuleHandleW 44960->44963 44961->44943 44962->44961 44963->44961 44964->44960 44965->44960 44967 612a140 DispatchMessageW 44966->44967 44968 612a1ac 44967->44968 44968->44866 44975 ccba6f 44978 ccb82c 44975->44978 44979 ccb837 44978->44979 44983 cccc40 44979->44983 44987 cccc30 44979->44987 44980 ccba7c 44984 cccc8f 44983->44984 44991 ccb98c 44984->44991 44988 cccc36 44987->44988 44989 ccb98c EnumThreadWindows 44988->44989 44990 cccd10 44989->44990 44990->44980 44993 cccd30 EnumThreadWindows 44991->44993 44994 cccd10 44993->44994 44994->44980 44995 c7d0f0 44996 c7d108 44995->44996 44997 c7d162 44996->44997 45002 5ef9bbc 44996->45002 45011 5efc010 44996->45011 45020 5efb338 44996->45020 45024 5efb348 44996->45024 45003 5ef9bc7 45002->45003 45004 5efc081 45003->45004 45006 5efc071 45003->45006 45007 5efc07f 45004->45007 45052 5ef9cd4 45004->45052 45006->45007 45028 5efc299 45006->45028 45040 5efc1a8 45006->45040 45046 5efc198 45006->45046 45014 5efc04d 45011->45014 45012 5efc081 45013 5ef9cd4 3 API calls 45012->45013 45016 5efc07f 45012->45016 45013->45016 45014->45012 45015 5efc071 45014->45015 45015->45016 45017 5efc299 3 API calls 45015->45017 45018 5efc1a8 3 API calls 45015->45018 45019 5efc198 3 API calls 45015->45019 45017->45016 45018->45016 45019->45016 45021 5efb348 45020->45021 45022 5ef9bbc 3 API calls 45021->45022 45023 5efb38f 45022->45023 45023->44997 45025 5efb36e 45024->45025 45026 5ef9bbc 3 API calls 45025->45026 45027 5efb38f 45026->45027 45027->44997 45029 5efc2a2 45028->45029 45034 5efc1b6 45028->45034 45030 5efc2ea 45029->45030 45031 5efc394 45029->45031 45032 5efc342 CallWindowProcW 45030->45032 45036 5efc2f1 45030->45036 45033 5ef9bbc 2 API calls 45031->45033 45032->45036 45033->45036 45035 5efc28e 45034->45035 45037 5ef9cd4 2 API calls 45034->45037 45059 5efca80 45034->45059 45064 5efca71 45034->45064 45035->45007 45036->45007 45037->45034 45042 5efc1b6 45040->45042 45041 5ef9cd4 3 API calls 45041->45042 45042->45041 45043 5efc28e 45042->45043 45044 5efca71 OleGetClipboard 45042->45044 45045 5efca80 OleGetClipboard 45042->45045 45043->45007 45044->45042 45045->45042 45048 5efc1aa 45046->45048 45047 5ef9cd4 3 API calls 45047->45048 45048->45047 45049 5efc28e 45048->45049 45050 5efca71 OleGetClipboard 45048->45050 45051 5efca80 OleGetClipboard 45048->45051 45049->45007 45050->45048 45051->45048 45053 5ef9cdf 45052->45053 45054 5efc2ea 45053->45054 45055 5efc394 45053->45055 45056 5efc342 CallWindowProcW 45054->45056 45058 5efc2f1 45054->45058 45057 5ef9bbc 2 API calls 45055->45057 45056->45058 45057->45058 45058->45007 45060 5efca9f 45059->45060 45061 5efcb47 45060->45061 45069 5efcc28 45060->45069 45075 5efcc38 45060->45075 45061->45034 45065 5efca78 45064->45065 45066 5efcb47 45065->45066 45067 5efcc28 OleGetClipboard 45065->45067 45068 5efcc38 OleGetClipboard 45065->45068 45066->45034 45067->45065 45068->45065 45070 5efcc38 45069->45070 45071 5efcc54 45070->45071 45081 5efcc80 45070->45081 45092 5efcc70 45070->45092 45071->45060 45072 5efcc69 45072->45060 45077 5efcc40 45075->45077 45076 5efcc54 45076->45060 45077->45076 45079 5efcc80 OleGetClipboard 45077->45079 45080 5efcc70 OleGetClipboard 45077->45080 45078 5efcc69 45078->45060 45079->45078 45080->45078 45082 5efcc92 45081->45082 45083 5efccad 45082->45083 45085 5efccf1 45082->45085 45088 5efcc80 OleGetClipboard 45083->45088 45089 5efcc70 OleGetClipboard 45083->45089 45084 5efccb3 45084->45072 45087 5efcd71 45085->45087 45103 5efce48 45085->45103 45107 5efce58 45085->45107 45086 5efcd8f 45086->45072 45087->45072 45088->45084 45089->45084 45093 5efcc80 45092->45093 45094 5efccad 45093->45094 45095 5efccf1 45093->45095 45099 5efcc80 OleGetClipboard 45094->45099 45100 5efcc70 OleGetClipboard 45094->45100 45098 5efcd71 45095->45098 45101 5efce48 OleGetClipboard 45095->45101 45102 5efce58 OleGetClipboard 45095->45102 45096 5efccb3 45096->45072 45097 5efcd8f 45097->45072 45098->45072 45099->45096 45100->45096 45101->45097 45102->45097 45105 5efce58 45103->45105 45106 5efce93 45105->45106 45111 5efc8ec 45105->45111 45106->45086 45109 5efce6d 45107->45109 45108 5efc8ec OleGetClipboard 45108->45109 45109->45108 45110 5efce93 45109->45110 45110->45086 45112 5efcf00 OleGetClipboard 45111->45112 45114 5efcf9a 45112->45114 45115 5ef4b98 45116 5ef4bcd 45115->45116 45117 5ef4ba5 45115->45117 45123 5ef3f7c 45116->45123 45119 5ef4bee 45121 5ef4cb6 GlobalMemoryStatusEx 45122 5ef4ce6 45121->45122 45124 5ef4c70 GlobalMemoryStatusEx 45123->45124 45126 5ef4bea 45124->45126 45126->45119 45126->45121 44969 ccd4c0 44970 ccd505 MessageBoxW 44969->44970 44972 ccd54c 44970->44972 44973 ccb050 DuplicateHandle 44974 ccb0e6 44973->44974 45127 5efb190 45128 5efb1f8 CreateWindowExW 45127->45128 45130 5efb2b4 45128->45130

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 103 61293d0-6129433 104 6129462-6129480 103->104 105 6129435-612945f 103->105 110 6129482-6129484 104->110 111 6129489-61294c0 104->111 105->104 112 6129942-6129957 110->112 115 61298f1 111->115 116 61294c6-61294da 111->116 119 61298f6-612990c 115->119 117 6129509-6129528 116->117 118 61294dc-6129506 116->118 125 6129540-6129542 117->125 126 612952a-6129530 117->126 118->117 119->112 129 6129561-612956a 125->129 130 6129544-612955c 125->130 127 6129532 126->127 128 6129534-6129536 126->128 127->125 128->125 132 6129572-6129579 129->132 130->119 133 6129583-612958a 132->133 134 612957b-6129581 132->134 136 6129594 133->136 137 612958c-6129592 133->137 135 6129597-61295b4 call 6128850 134->135 140 61295ba-61295c1 135->140 141 6129709-612970d 135->141 136->135 137->135 140->115 142 61295c7-6129604 140->142 143 6129713-6129717 141->143 144 61298dc-61298ef 141->144 152 61298d2-61298d6 142->152 153 612960a-612960f 142->153 145 6129731-612973a 143->145 146 6129719-612972c 143->146 144->119 148 6129769-6129770 145->148 149 612973c-6129766 145->149 146->119 150 6129776-612977d 148->150 151 612980f-6129824 148->151 149->148 154 612977f-61297a9 150->154 155 61297ac-61297ce 150->155 151->152 163 612982a-612982c 151->163 152->132 152->144 156 6129641-6129656 call 6128874 153->156 157 6129611-612961f call 612885c 153->157 154->155 155->151 191 61297d0-61297da 155->191 167 612965b-612965f 156->167 157->156 172 6129621-612963f call 6128868 157->172 170 6129879-6129896 call 6128850 163->170 171 612982e-6129867 163->171 168 61296d0-61296dd 167->168 169 6129661-6129673 call 6128880 167->169 168->152 189 61296e3-61296ed call 6128890 168->189 196 61296b3-61296cb 169->196 197 6129675-61296a5 169->197 170->152 188 6129898-61298c4 WaitMessage 170->188 185 6129870-6129877 171->185 186 6129869-612986f 171->186 172->167 185->152 186->185 193 61298c6 188->193 194 61298cb 188->194 199 61296ef-61296f2 call 612889c 189->199 200 61296fc-6129704 call 61288a8 189->200 204 61297f2-612980d 191->204 205 61297dc-61297e2 191->205 193->194 194->152 196->119 211 61296a7 197->211 212 61296ac 197->212 207 61296f7 199->207 200->152 204->151 204->191 209 61297e6-61297e8 205->209 210 61297e4 205->210 207->152 209->204 210->204 211->212 212->196
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4662311392.0000000006120000.00000040.00000800.00020000.00000000.sdmp, Offset: 06120000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6120000_jsc.jbxd
                                    Similarity
                                    • API ID: DispatchMessage
                                    • String ID:
                                    • API String ID: 2061451462-0
                                    • Opcode ID: 7e2156a243b6a66faca43043106e13b7dad108b2962b25c6d0563adbd4b095a6
                                    • Instruction ID: f0c1baf8e194b18893c79c469a35cd0d3feeb4be252ac7d53c1c0cc0ab026688
                                    • Opcode Fuzzy Hash: 7e2156a243b6a66faca43043106e13b7dad108b2962b25c6d0563adbd4b095a6
                                    • Instruction Fuzzy Hash: 48F15C30E0021ACFEB54DFAAC984B9DBBF1BF88314F158969D405AB265DB70E955CB80
                                    APIs
                                    • SetWindowsHookExA.USER32(0000000D,00000000,?,?,?,?,?,?,?,?,?,05EFE9B0,00000000,00000000), ref: 05EFEBC3
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4661269198.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5ef0000_jsc.jbxd
                                    Similarity
                                    • API ID: HookWindows
                                    • String ID:
                                    • API String ID: 2559412058-0
                                    • Opcode ID: ed7cf1c1235f83fd811607dfa4755469d8100249e277272b4fa6eacc2f523f25
                                    • Instruction ID: 7409b94acaab82c9150dc6995db17cba578ba5a8a638d0143cc16a0e469ff548
                                    • Opcode Fuzzy Hash: ed7cf1c1235f83fd811607dfa4755469d8100249e277272b4fa6eacc2f523f25
                                    • Instruction Fuzzy Hash: 062138759042099FDB64CF99C844BEEFBF9FB88310F108429E559A7250CBB4A944CFA1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4623132733.0000000000CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_cc0000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \V4m
                                    • API String ID: 0-1082643222
                                    • Opcode ID: 5b1a4cb071c59e7708c55eb82b988cd8d4bb3390e8eef674bba70b095b538f88
                                    • Instruction ID: 7c30f6aa0468c912724e60c33bb9dbc6a51545636f9eb4a595da22ae22b2442f
                                    • Opcode Fuzzy Hash: 5b1a4cb071c59e7708c55eb82b988cd8d4bb3390e8eef674bba70b095b538f88
                                    • Instruction Fuzzy Hash: 8FB13C70E00219CFDB18CFA9D995BADBBF2AF88714F24C12DE415A7294EB749941CF81
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4623132733.0000000000CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_cc0000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \V4m
                                    • API String ID: 0-1082643222
                                    • Opcode ID: db7dad486784258061d14cdf0e1196b14ef357fd8c1757153415423f02acd850
                                    • Instruction ID: 469e15cbda597fb6223956711a17a3ffd7667ec798dfaf73459c20a08d2ab23c
                                    • Opcode Fuzzy Hash: db7dad486784258061d14cdf0e1196b14ef357fd8c1757153415423f02acd850
                                    • Instruction Fuzzy Hash: 54914971E00209CFDF18CFA9C991BADBBF2AF88314F14C12DE455A7294EB749985CB81
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4661269198.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5ef0000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d4cefbfe4feef132a386fb615a1696664bb84048704f7850e49cb66132c0d23c
                                    • Instruction ID: de8e93e113ca48cd1a466577008ac74525eaf06c31587f4f98ed52d871847535
                                    • Opcode Fuzzy Hash: d4cefbfe4feef132a386fb615a1696664bb84048704f7850e49cb66132c0d23c
                                    • Instruction Fuzzy Hash: FFB1C031B002588BDF18EB78985477F7AA7BFC8710B18846EE157D7388EE349C068795
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4623132733.0000000000CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_cc0000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bde8fa3bd2d13c404b0cabf1b1f5e6104f0af5ee85343b818bc7af2e77d79ad8
                                    • Instruction ID: 9d4047ee573125bd4bdc575394369f3b5ac2f62d8bc88af2722a76b67415fbd5
                                    • Opcode Fuzzy Hash: bde8fa3bd2d13c404b0cabf1b1f5e6104f0af5ee85343b818bc7af2e77d79ad8
                                    • Instruction Fuzzy Hash: 23B14C70E00209CFDB18DFA9D8A1B9DBBF2BF88714F14C52DD815A7294EB749941CB81
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4661269198.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5ef0000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f7e2639fddc43694a05fa8ac86ca548a4346a34cbe65a685281ad6adc94de739
                                    • Instruction ID: 760ed0f8b4b610f24f6735b9602f61e5200e57f4067fbc3cd0f31974e97e2c0f
                                    • Opcode Fuzzy Hash: f7e2639fddc43694a05fa8ac86ca548a4346a34cbe65a685281ad6adc94de739
                                    • Instruction Fuzzy Hash: 60819235E0035A8FCB04DFA0DC949DDBBBAFF89310F258619E516AB2A4DF30A945CB50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 215 cc9d92-cc9e22 219 cc9e28-cc9e4d 215->219 220 cca066-cca099 215->220 225 cca0a0-cca0d5 219->225 226 cc9e53-cc9e78 219->226 220->225 233 cca0dc-cca111 225->233 226->233 234 cc9e7e-cc9e8e 226->234 239 cca118-cca144 233->239 234->239 240 cc9e94-cc9e98 234->240 244 cca14b-cca189 239->244 241 cc9e9a-cc9ea0 240->241 242 cc9ea6-cc9eab 240->242 241->242 241->244 245 cc9ead-cc9eb3 242->245 246 cc9eb9-cc9ebf 242->246 248 cca190-cca1ce 244->248 245->246 245->248 250 cc9ed0-cc9ee4 246->250 251 cc9ec1-cc9ec9 246->251 284 cca1d5-cca25e 248->284 263 cc9eea 250->263 264 cc9ee6-cc9ee8 250->264 251->250 267 cc9eef-cc9f07 263->267 264->267 268 cc9f09-cc9f0f 267->268 269 cc9f11-cc9f15 267->269 268->269 271 cc9f64-cc9f71 268->271 272 cc9f58-cc9f61 269->272 273 cc9f17-cc9f43 GetActiveWindow 269->273 282 cc9fb1 271->282 283 cc9f73-cc9f89 call cc9aa0 271->283 272->271 275 cc9f4c-cc9f56 273->275 276 cc9f45-cc9f4b 273->276 275->271 276->275 314 cc9fb1 call cca7e8 282->314 315 cc9fb1 call cca7c0 282->315 316 cc9fb1 call cca7b0 282->316 291 cc9fa8-cc9fae 283->291 292 cc9f8b-cc9fa2 283->292 311 cca26b 284->311 312 cca260-cca269 284->312 286 cc9fb7-cca00b call cc9aac 306 cca014 286->306 291->282 292->284 292->291 306->220 313 cca26d-cca273 311->313 312->313 314->286 315->286 316->286
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4623132733.0000000000CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_cc0000_jsc.jbxd
                                    Similarity
                                    • API ID: ActiveWindow
                                    • String ID:
                                    • API String ID: 2558294473-0
                                    • Opcode ID: 13f8d0a6f1528a458778e9629064e3b59d0218369d5ea78dd9b04b373e971596
                                    • Instruction ID: d64ff6b3f553e6dcc4f2e5777b6f86f744a8aa7bb211cffd9ab3ad818cbbb497
                                    • Opcode Fuzzy Hash: 13f8d0a6f1528a458778e9629064e3b59d0218369d5ea78dd9b04b373e971596
                                    • Instruction Fuzzy Hash: 4AC1AF30B402099FDB18AFA5D858BAE7AA2EFC8300F24846CE506EB381DF349D45CB55

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 317 5ef4b98-5ef4ba3 318 5ef4bcd-5ef4bec call 5ef3f7c 317->318 319 5ef4ba5-5ef4bcc call 5ef3f70 317->319 325 5ef4bee-5ef4bf1 318->325 326 5ef4bf2-5ef4c51 318->326 333 5ef4c57-5ef4ce4 GlobalMemoryStatusEx 326->333 334 5ef4c53-5ef4c56 326->334 338 5ef4ced-5ef4d15 333->338 339 5ef4ce6-5ef4cec 333->339 339->338
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4661269198.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5ef0000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f37de89e63778abf7bfd6f541ddb3d9ab68aed001cfd93345e186c8ee4cffd22
                                    • Instruction ID: 2a196e161c431041a02068c5d40ee67e0d136dda8af6339ab15aa8615abc2b96
                                    • Opcode Fuzzy Hash: f37de89e63778abf7bfd6f541ddb3d9ab68aed001cfd93345e186c8ee4cffd22
                                    • Instruction Fuzzy Hash: 01412632E043598FDB14DFAAD84479EBBF5BF89214F14856AD544A7281DF78A840CBD0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 342 5efb185-5efb1f6 343 5efb1f8-5efb1fe 342->343 344 5efb201-5efb208 342->344 343->344 345 5efb20a-5efb210 344->345 346 5efb213-5efb24b 344->346 345->346 347 5efb253-5efb2b2 CreateWindowExW 346->347 348 5efb2bb-5efb2f3 347->348 349 5efb2b4-5efb2ba 347->349 353 5efb2f5-5efb2f8 348->353 354 5efb300 348->354 349->348 353->354 355 5efb301 354->355 355->355
                                    APIs
                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05EFB2A2
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4661269198.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5ef0000_jsc.jbxd
                                    Similarity
                                    • API ID: CreateWindow
                                    • String ID:
                                    • API String ID: 716092398-0
                                    • Opcode ID: 52171e3ebd00743b8f0b85ff6d2a9957af30bbf8bafbc018294d01bee5dfd592
                                    • Instruction ID: 2c5a15ad1c2a4bc470ed2b909b8d703035bcd147a15936c1ea82dcab578222ac
                                    • Opcode Fuzzy Hash: 52171e3ebd00743b8f0b85ff6d2a9957af30bbf8bafbc018294d01bee5dfd592
                                    • Instruction Fuzzy Hash: C751D0B5D003499FEB14CF99C884ADEBBB5BF88314F24912AE919AB210DB759845CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 356 5efb190-5efb1f6 357 5efb1f8-5efb1fe 356->357 358 5efb201-5efb208 356->358 357->358 359 5efb20a-5efb210 358->359 360 5efb213-5efb2b2 CreateWindowExW 358->360 359->360 362 5efb2bb-5efb2f3 360->362 363 5efb2b4-5efb2ba 360->363 367 5efb2f5-5efb2f8 362->367 368 5efb300 362->368 363->362 367->368 369 5efb301 368->369 369->369
                                    APIs
                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05EFB2A2
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4661269198.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5ef0000_jsc.jbxd
                                    Similarity
                                    • API ID: CreateWindow
                                    • String ID:
                                    • API String ID: 716092398-0
                                    • Opcode ID: d52ad9251d8c195ebd3dfbedc3909d50ce24171f8ca41bb63279b557864cf493
                                    • Instruction ID: 13ff7153b9f6640fde51aac368d0b1531732e70dc970649c704007ce516efc07
                                    • Opcode Fuzzy Hash: d52ad9251d8c195ebd3dfbedc3909d50ce24171f8ca41bb63279b557864cf493
                                    • Instruction Fuzzy Hash: B141C1B5D003499FEB14CF9AC984ADEBFB5BF48314F24912AE919AB210DB719845CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 370 5ef9cd4-5efc2e4 373 5efc2ea-5efc2ef 370->373 374 5efc394-5efc3b4 call 5ef9bbc 370->374 375 5efc342-5efc37a CallWindowProcW 373->375 376 5efc2f1-5efc328 373->376 381 5efc3b7-5efc3c4 374->381 378 5efc37c-5efc382 375->378 379 5efc383-5efc392 375->379 384 5efc32a-5efc330 376->384 385 5efc331-5efc340 376->385 378->379 379->381 384->385 385->381
                                    APIs
                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 05EFC369
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4661269198.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5ef0000_jsc.jbxd
                                    Similarity
                                    • API ID: CallProcWindow
                                    • String ID:
                                    • API String ID: 2714655100-0
                                    • Opcode ID: f2da1f3c811313148b3314cf7209b2fd2d66a90fd3898541b9901f6449dbcb62
                                    • Instruction ID: 912f8e1539c3715f0930ca7fee49d0abfaf89c9c44a384686e7c22adebc66a5b
                                    • Opcode Fuzzy Hash: f2da1f3c811313148b3314cf7209b2fd2d66a90fd3898541b9901f6449dbcb62
                                    • Instruction Fuzzy Hash: B74129B5A04309CFDB14CF99C488AAEBBF5FF88314F24C499D559A7361D774A841CBA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 515 5efcef4-5efcf50 517 5efcf5a-5efcf98 OleGetClipboard 515->517 518 5efcf9a-5efcfa0 517->518 519 5efcfa1-5efcfef 517->519 518->519 524 5efcfff 519->524 525 5efcff1-5efcff5 519->525 527 5efd000 524->527 525->524 526 5efcff7 525->526 526->524 527->527
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4661269198.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5ef0000_jsc.jbxd
                                    Similarity
                                    • API ID: Clipboard
                                    • String ID:
                                    • API String ID: 220874293-0
                                    • Opcode ID: 2c72d81314f447a7c1e11aeb8fcb0f6ce2a7aca738fd8a01c9e5d7bfc3551660
                                    • Instruction ID: f01f196c8884fe264135338ae1dad068026a3577d35da12e8ce0df200465db0f
                                    • Opcode Fuzzy Hash: 2c72d81314f447a7c1e11aeb8fcb0f6ce2a7aca738fd8a01c9e5d7bfc3551660
                                    • Instruction Fuzzy Hash: 0F3110B190521CEFEB10CF99C984BCEBBF5BB48714F209059E508AB290DBB4A844CB90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 502 5efc8ec-5efcf98 OleGetClipboard 505 5efcf9a-5efcfa0 502->505 506 5efcfa1-5efcfef 502->506 505->506 511 5efcfff 506->511 512 5efcff1-5efcff5 506->512 514 5efd000 511->514 512->511 513 5efcff7 512->513 513->511 514->514
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4661269198.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5ef0000_jsc.jbxd
                                    Similarity
                                    • API ID: Clipboard
                                    • String ID:
                                    • API String ID: 220874293-0
                                    • Opcode ID: f4d2582d3d5d7c7d276cb3099c0bf74d55d846be8c8afe9dc60baa6fe147d670
                                    • Instruction ID: c41eff6a198121954038017b3e18f577b12a3435e044a0785119c12e107932f0
                                    • Opcode Fuzzy Hash: f4d2582d3d5d7c7d276cb3099c0bf74d55d846be8c8afe9dc60baa6fe147d670
                                    • Instruction Fuzzy Hash: 783111B190521CEFDB10CF99C984BCEBBF1BB48714F209059E509AB390DBB46844CB90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 528 ccb04b 529 ccb050-ccb0e4 DuplicateHandle 528->529 530 ccb0ed-ccb10a 529->530 531 ccb0e6-ccb0ec 529->531 531->530
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00CCB0D7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4623132733.0000000000CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_cc0000_jsc.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 23ae858dbe1968dfa70bbd9ec5fcadb0e6849db3e8cb668057deff72a6de5e46
                                    • Instruction ID: 9058d2fc9c2b1d5d8f879b9071e71286c0799c22552ace1df86a6b5aea0c0e24
                                    • Opcode Fuzzy Hash: 23ae858dbe1968dfa70bbd9ec5fcadb0e6849db3e8cb668057deff72a6de5e46
                                    • Instruction Fuzzy Hash: DC21E3B59002599FDB10CFAAD985ADEFBF4EB48320F14801AE954A3350D375A950CFA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 548 cccd28-cccd72 550 cccd7e-cccdae EnumThreadWindows 548->550 551 cccd74 548->551 552 cccdb7-cccde4 550->552 553 cccdb0-cccdb6 550->553 554 cccd7c 551->554 553->552 554->550
                                    APIs
                                    • EnumThreadWindows.USER32(?,00000000,?,?,?,?,00000E20,?,?,00CCCD10,038160D8,0283614C), ref: 00CCCDA1
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4623132733.0000000000CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_cc0000_jsc.jbxd
                                    Similarity
                                    • API ID: EnumThreadWindows
                                    • String ID:
                                    • API String ID: 2941952884-0
                                    • Opcode ID: 2f254d785de7d0faa943a721a82962255e23e7f4f48a83d9de819da4fd33aa6f
                                    • Instruction ID: faf8a2d96259a1e9bd0baac06b52ee82eaa74267855ea88e19c826699f3a92f6
                                    • Opcode Fuzzy Hash: 2f254d785de7d0faa943a721a82962255e23e7f4f48a83d9de819da4fd33aa6f
                                    • Instruction Fuzzy Hash: 63213E75D002098FDB14CF9AC884BEEFBF5FB88320F14842AD459A7250D778A945CF61

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 534 ccb050-ccb0e4 DuplicateHandle 535 ccb0ed-ccb10a 534->535 536 ccb0e6-ccb0ec 534->536 536->535
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00CCB0D7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4623132733.0000000000CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_cc0000_jsc.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 383e360db4a169e9c9bf22311713723f2a08886fc0e9b669c443cfb27171bbbe
                                    • Instruction ID: d137f520810c37122dec5b928c25971b3f09afe4030ac5c17a34ef5b8c750a84
                                    • Opcode Fuzzy Hash: 383e360db4a169e9c9bf22311713723f2a08886fc0e9b669c443cfb27171bbbe
                                    • Instruction Fuzzy Hash: C421E3B59002499FDB10CFAAD984ADEFBF4EB48320F14801AE954A3250D375A950CFA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 539 ccb98c-cccd72 541 cccd7e-cccdae EnumThreadWindows 539->541 542 cccd74 539->542 543 cccdb7-cccde4 541->543 544 cccdb0-cccdb6 541->544 545 cccd7c 542->545 544->543 545->541
                                    APIs
                                    • EnumThreadWindows.USER32(?,00000000,?,?,?,?,00000E20,?,?,00CCCD10,038160D8,0283614C), ref: 00CCCDA1
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4623132733.0000000000CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_cc0000_jsc.jbxd
                                    Similarity
                                    • API ID: EnumThreadWindows
                                    • String ID:
                                    • API String ID: 2941952884-0
                                    • Opcode ID: d15709ecf92d11013586151f1c9d158a0ffefe52f2169abbc8fea28d9ffacf27
                                    • Instruction ID: a6d78d9f780c770215ab3b3864de1037b857008e91f9beceae914941e55c35c2
                                    • Opcode Fuzzy Hash: d15709ecf92d11013586151f1c9d158a0ffefe52f2169abbc8fea28d9ffacf27
                                    • Instruction Fuzzy Hash: 56213BB1D0021A8FDB14CF9AC884BEEFBF5FB88320F14842AD459A7250D774A944CFA5
                                    APIs
                                    • MessageBoxW.USER32(?,00000000,00000000,?), ref: 00CCD53D
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4623132733.0000000000CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_cc0000_jsc.jbxd
                                    Similarity
                                    • API ID: Message
                                    • String ID:
                                    • API String ID: 2030045667-0
                                    • Opcode ID: 57df263cfc61c299171615cbd1aeb2bee0278c729a9fc8d8c896f62a4b24fdd1
                                    • Instruction ID: b1115ec21f202db4ec9a6174be451f6b099d680897b4bdd0ff6c6fd5b2aa4720
                                    • Opcode Fuzzy Hash: 57df263cfc61c299171615cbd1aeb2bee0278c729a9fc8d8c896f62a4b24fdd1
                                    • Instruction Fuzzy Hash: 942102B68003099FDB14CF9AD884BDEFBB4FB48314F10852EE819A7200C375AA45CFA0
                                    APIs
                                    • SetWindowsHookExA.USER32(0000000D,00000000,?,?,?,?,?,?,?,?,?,05EFE9B0,00000000,00000000), ref: 05EFEBC3
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4661269198.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5ef0000_jsc.jbxd
                                    Similarity
                                    • API ID: HookWindows
                                    • String ID:
                                    • API String ID: 2559412058-0
                                    • Opcode ID: 163ed643e8ef7c31b81fd6af7b7eb50d7af73636ba09d819007c2389cecdeb60
                                    • Instruction ID: bb34234e4ae8fd9576660eaf912763f40349c42056af8b5f9058793aa1370c37
                                    • Opcode Fuzzy Hash: 163ed643e8ef7c31b81fd6af7b7eb50d7af73636ba09d819007c2389cecdeb60
                                    • Instruction Fuzzy Hash: 702134B59042099FDB54CF9AC844BDEFBF5BB88320F108429E459A7250CBB4A944CFA1
                                    APIs
                                    • MessageBoxW.USER32(?,00000000,00000000,?), ref: 00CCD53D
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4623132733.0000000000CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_cc0000_jsc.jbxd
                                    Similarity
                                    • API ID: Message
                                    • String ID:
                                    • API String ID: 2030045667-0
                                    • Opcode ID: 39fa97cc55f9b44e876cc3b0e635725e2381a5b3d4a7ac4f22806a6f72bc3d49
                                    • Instruction ID: 13015c75222607d0c7d95feb544b8363b35af09bbfeb7e68dd33276e09a59f94
                                    • Opcode Fuzzy Hash: 39fa97cc55f9b44e876cc3b0e635725e2381a5b3d4a7ac4f22806a6f72bc3d49
                                    • Instruction Fuzzy Hash: DF21E2B69003499FDB14CF9AD884BDEFBB5FB48314F10852ED519A7200D375AA44CBA0
                                    APIs
                                    • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,05EF4BEA), ref: 05EF4CD7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4661269198.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5ef0000_jsc.jbxd
                                    Similarity
                                    • API ID: GlobalMemoryStatus
                                    • String ID:
                                    • API String ID: 1890195054-0
                                    • Opcode ID: 2678f35350bb21974e4764e66f0f047e5f55ab02c7e0d4a105db43e7385facc5
                                    • Instruction ID: 3172f7614501ff568156704ab60c3e8a9fdf043dc232339ad3fcf6777c9f327a
                                    • Opcode Fuzzy Hash: 2678f35350bb21974e4764e66f0f047e5f55ab02c7e0d4a105db43e7385facc5
                                    • Instruction Fuzzy Hash: 351133B6C0065A9BDB10CF9AC544BDEFBF4BF48224F10816AE918A7240D778A950CFA1
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 05EFAAC6
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4661269198.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5ef0000_jsc.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 90faf49aa59c8ab2cbdfdddfbd325306003833bae286764c4725da118067f7ae
                                    • Instruction ID: 1f30ebe27f85b4fbce3cad47400191ca16071a3a1192169e1259a1f71feee699
                                    • Opcode Fuzzy Hash: 90faf49aa59c8ab2cbdfdddfbd325306003833bae286764c4725da118067f7ae
                                    • Instruction Fuzzy Hash: 941120B6C007098FDB10CF9AC544BCEFBF4EB88224F10846AD969A7200C779A509CFA1
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 05EFAAC6
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4661269198.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5ef0000_jsc.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 9620bd0a6199ae305e8571da487ad970d03190518e8116fe5cd992badfedf092
                                    • Instruction ID: 4f9df795c74ea920782af6679c5e2ef0d9cc8daf025a72d7da96c6ad42e18af2
                                    • Opcode Fuzzy Hash: 9620bd0a6199ae305e8571da487ad970d03190518e8116fe5cd992badfedf092
                                    • Instruction Fuzzy Hash: 1B110FB6C006498FDB10CF9AD544BDEFBF4AB88224F10846AD569A7200C779A545CFA1
                                    APIs
                                    • OleInitialize.OLE32(00000000), ref: 00CCBED5
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4623132733.0000000000CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_cc0000_jsc.jbxd
                                    Similarity
                                    • API ID: Initialize
                                    • String ID:
                                    • API String ID: 2538663250-0
                                    • Opcode ID: 010ae0cc38ad4190326130aadade462a5dad59c218f9fdf7730e688c5f129948
                                    • Instruction ID: 7579e579c4fefe223c61a835f9d48eab37df7a59ce42acde09a52d70c3023c9a
                                    • Opcode Fuzzy Hash: 010ae0cc38ad4190326130aadade462a5dad59c218f9fdf7730e688c5f129948
                                    • Instruction Fuzzy Hash: 9C1133B58003498FCB20DF9AC485BDEFBF4EB48724F208459E618A7200C3B5A940CFA5
                                    APIs
                                    • OleInitialize.OLE32(00000000), ref: 00CCBED5
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4623132733.0000000000CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_cc0000_jsc.jbxd
                                    Similarity
                                    • API ID: Initialize
                                    • String ID:
                                    • API String ID: 2538663250-0
                                    • Opcode ID: 914b20395cb634b5305440ffe630208c2e4512f6b808d96b349f7e771af38615
                                    • Instruction ID: abe306a9a0c5eb092b78958bea0d4dee96bf8e340b2602f0a448f39b996dd018
                                    • Opcode Fuzzy Hash: 914b20395cb634b5305440ffe630208c2e4512f6b808d96b349f7e771af38615
                                    • Instruction Fuzzy Hash: 6F1103B58002498FDB20DF9AD585BDEBBF4EB48324F248459D659A7200C379A944CFA5
                                    APIs
                                    • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,061296F7), ref: 0612A19D
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4662311392.0000000006120000.00000040.00000800.00020000.00000000.sdmp, Offset: 06120000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6120000_jsc.jbxd
                                    Similarity
                                    • API ID: DispatchMessage
                                    • String ID:
                                    • API String ID: 2061451462-0
                                    • Opcode ID: dc381ff9f7004a422a580d8358cb5582784d583cb652c09840af1d44c303a8c2
                                    • Instruction ID: 2a06dd50a5dfac70fe2ebc3a2e911926a4193c40d5815c5358fc69b5ddef8b00
                                    • Opcode Fuzzy Hash: dc381ff9f7004a422a580d8358cb5582784d583cb652c09840af1d44c303a8c2
                                    • Instruction Fuzzy Hash: 69112EB5C0465A8FCB20DF9AD944BDEFBF4EF48320F10846AE818A3200D378A544CFA5
                                    APIs
                                    • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,05EFC5B5), ref: 05EFC63F
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4661269198.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5ef0000_jsc.jbxd
                                    Similarity
                                    • API ID: CallbackDispatcherUser
                                    • String ID:
                                    • API String ID: 2492992576-0
                                    • Opcode ID: 90f3c4c633b3e5bd3ee6c5dbda6edbdb563feec02d000bce78bcb94f30fddc39
                                    • Instruction ID: b56dee5f53a9cb0b6f017ced0b6a5801d2869bd5662f8852dae461dc9f8ad7a2
                                    • Opcode Fuzzy Hash: 90f3c4c633b3e5bd3ee6c5dbda6edbdb563feec02d000bce78bcb94f30fddc39
                                    • Instruction Fuzzy Hash: 411148B5804349CFCB10CF99C484BDEFBF4EB48724F209459D659A7200D774A944CFA5
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00CCB0D7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4623132733.0000000000CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_cc0000_jsc.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: a82b0fa2401de8f96095b3b2c6bc0d5908c439caf3d779b3c70c7ff5625b4369
                                    • Instruction ID: 7bf4bfc528c036c1838dd0354b059977a542b77dcecd533628e1606b9249cb74
                                    • Opcode Fuzzy Hash: a82b0fa2401de8f96095b3b2c6bc0d5908c439caf3d779b3c70c7ff5625b4369
                                    • Instruction Fuzzy Hash: 751105B6900209DFDB10CFAAD845BEEBBF4EF48314F14800AE954A7250C3799A50DF61
                                    APIs
                                    • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,05EFC5B5), ref: 05EFC63F
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4661269198.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5ef0000_jsc.jbxd
                                    Similarity
                                    • API ID: CallbackDispatcherUser
                                    • String ID:
                                    • API String ID: 2492992576-0
                                    • Opcode ID: 451f5aa932f958813b75f85982d923a249b1d9243888facc850ee66e79e66684
                                    • Instruction ID: 0fe060dfaf7e76e11248b91ba7c8eecbf040c43f6045fab592423892485c7cfb
                                    • Opcode Fuzzy Hash: 451f5aa932f958813b75f85982d923a249b1d9243888facc850ee66e79e66684
                                    • Instruction Fuzzy Hash: 2D1133B98043498FCB10CF9AD444BDEFBF8FB48724F20841AD658A7200C778A940CFA5
                                    APIs
                                    • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,05EFC5B5), ref: 05EFC63F
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4661269198.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5ef0000_jsc.jbxd
                                    Similarity
                                    • API ID: CallbackDispatcherUser
                                    • String ID:
                                    • API String ID: 2492992576-0
                                    • Opcode ID: 5297ce735fdf12d297fe585378c37045786c7d0e11c9612bbbc89ae026a7d43a
                                    • Instruction ID: 4eb939a4c3326af74a8ddb05e0dfdfd0737b8832c81f1fafa8245ec1a059594f
                                    • Opcode Fuzzy Hash: 5297ce735fdf12d297fe585378c37045786c7d0e11c9612bbbc89ae026a7d43a
                                    • Instruction Fuzzy Hash: 16F0F0B280C3888EEB108B99C4593DABFF0EF40218F34948AC29E9B251D7BD5505CB51
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4663986139.00000000085D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_85d0000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1bfd6bd5db2f3f5cf71feefc7e867887e26d8d1d602415b173b80ac62ce3d6c6
                                    • Instruction ID: 9c1535f103ff248737bb7a0180b5f0355095f1a36681e6e4943c63f06b045870
                                    • Opcode Fuzzy Hash: 1bfd6bd5db2f3f5cf71feefc7e867887e26d8d1d602415b173b80ac62ce3d6c6
                                    • Instruction Fuzzy Hash: 8BD17C70E003499FDB24DFA9C8546AEBBF2FF88310F148569E805AB351DB74A985CB91
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4663986139.00000000085D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_85d0000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f479f8f0afbac044d2b352ace3580f60446b0a9d6856778bffc52a67c44dea96
                                    • Instruction ID: 21485e28d787f28c5c2d0c3e51725be5be1f252371bff0dc1dd8a1bb1588b762
                                    • Opcode Fuzzy Hash: f479f8f0afbac044d2b352ace3580f60446b0a9d6856778bffc52a67c44dea96
                                    • Instruction Fuzzy Hash: 3441E221B043455FDB59AB78982066FBFF6AFC5200B1484AED80ADB382EE34CD06C791
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4663986139.00000000085D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_85d0000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ba2e911fb32f82ede84a89c790595af0b088cda7b6bc72957dccedf25a153030
                                    • Instruction ID: 5ad0d1298fc496f4cd30f5767db098bb650f12967d43fdea4d7f1b1382ca1d9f
                                    • Opcode Fuzzy Hash: ba2e911fb32f82ede84a89c790595af0b088cda7b6bc72957dccedf25a153030
                                    • Instruction Fuzzy Hash: D8415E31E007099FCB24DFA9C45469DFBB1FF88311F14C669E849BB264EB70A981CB90
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4663986139.00000000085D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_85d0000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0e0ecf2be9cf07e073ff2e0c0513ab597d56ef2850458723d81e744351cf6d2b
                                    • Instruction ID: 3d7564e097fd3c3a27b0213918f3f7291b25df06ff537d84c4f328954e5d38a8
                                    • Opcode Fuzzy Hash: 0e0ecf2be9cf07e073ff2e0c0513ab597d56ef2850458723d81e744351cf6d2b
                                    • Instruction Fuzzy Hash: 2B319070A00206CFCF11EB68D890AAEBBB5EF89300F50856DD505EB355EB35AD06CB91
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4663986139.00000000085D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_85d0000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 809b0092cc11f05756770eb74b744e516afd56576ae15ec85366ce03e4c43099
                                    • Instruction ID: a2bd6f99baf0f0a0160c93b225cafa8b038b1f44ab17ba6d9e794c1340c0f0e8
                                    • Opcode Fuzzy Hash: 809b0092cc11f05756770eb74b744e516afd56576ae15ec85366ce03e4c43099
                                    • Instruction Fuzzy Hash: A2318D70A00206CFDF10EB68D890AAEBBB5FF89300F50956CD505EB354EB35AD06CB91
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4663986139.00000000085D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_85d0000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8c2f5b939732d3d2c4863539521fda4b2f098bab57b20ddaae05d911ca7c0f47
                                    • Instruction ID: 1e4bb5d8fe67fa15d85386124d6f0770f22c43799933b543f8c214210cf5cc9b
                                    • Opcode Fuzzy Hash: 8c2f5b939732d3d2c4863539521fda4b2f098bab57b20ddaae05d911ca7c0f47
                                    • Instruction Fuzzy Hash: 1331DEB5C01318DFDB20DF99C985BCEBBF4BF48710F24805AE804AB250C7B56885CBA1
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4663986139.00000000085D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_85d0000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 60f8963eb6e722a1703bcb495b4d7a295b89d629f714f9e66565a5dfc742b2e4
                                    • Instruction ID: d4ca7a380cd44a9b9df030eaca2e3cca5006c24c4fb5a958c5a9ed3330dfe744
                                    • Opcode Fuzzy Hash: 60f8963eb6e722a1703bcb495b4d7a295b89d629f714f9e66565a5dfc742b2e4
                                    • Instruction Fuzzy Hash: 8231FEB1C00318DFDB20DF99C988BDEBFF4BB48310F24845AE805AB250C7B5A845CBA0
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4622268639.0000000000C7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C7D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_c7d000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 73b6a70a8dc28dee8615a2b028bb40e9ea9d3ebe021fa25b0a9414ab53310fe1
                                    • Instruction ID: c044a60d9cecffc5cb378bf78552d627550f97af506cbf41c0d9d110314172d2
                                    • Opcode Fuzzy Hash: 73b6a70a8dc28dee8615a2b028bb40e9ea9d3ebe021fa25b0a9414ab53310fe1
                                    • Instruction Fuzzy Hash: 1621F2B5504204EFDB04DF24D5C0B26BB75FF84318F24C56DE90E4B256C37AE846CA61
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4622268639.0000000000C7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C7D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_c7d000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 051eed398ca852d8ccb59f1703d4e365de8014b3fbe2ecd6e8fea7557dfa741c
                                    • Instruction ID: 2d473c4a2315872a5100a9eaacbfff2f316eba8e6bca22c7ecc2cb300cbffb3d
                                    • Opcode Fuzzy Hash: 051eed398ca852d8ccb59f1703d4e365de8014b3fbe2ecd6e8fea7557dfa741c
                                    • Instruction Fuzzy Hash: 6621F2B5604244EFDB04DF24D9C0B2ABB75FF84324F64C56DE90E4B256C376D846CA61
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4622268639.0000000000C7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C7D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_c7d000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b161141f1c86b6c974aa38c1413ceaacd1b915c3402ca8207e557227ad852c89
                                    • Instruction ID: adca0fdd534d00ec297b0fc7c5bac8c021d3cc599122c19b68bc01946e58b8b3
                                    • Opcode Fuzzy Hash: b161141f1c86b6c974aa38c1413ceaacd1b915c3402ca8207e557227ad852c89
                                    • Instruction Fuzzy Hash: 662126B2504244DFDB04DF15D9C4B2ABB75FF84324F24C56DD90E0B262C37AD846CA62
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4663986139.00000000085D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_85d0000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f8d38dca9fc7f0acb69ae3d3e04e5ad983322b18125683c1706bbb47d3f12feb
                                    • Instruction ID: 99f5ddcdf054c8530111b89c57b8419d8187cc70b9d7a98d855790436c2132b3
                                    • Opcode Fuzzy Hash: f8d38dca9fc7f0acb69ae3d3e04e5ad983322b18125683c1706bbb47d3f12feb
                                    • Instruction Fuzzy Hash: C431DFB1D01318DFDB24DF9AC588BDEBBF4BB48710F24845AE805BB250C7B5A845CBA1
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4622268639.0000000000C7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C7D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_c7d000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                    • Instruction ID: f6673d4c543522e119a297a48a7013dad0c848ac8121b77fba75af09e47dc6a4
                                    • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                    • Instruction Fuzzy Hash: 40118BB6504284DFCB15CF24D5C4B15BBB1FB84318F28C6AAD84A4B656C33AD94ACB62
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4622268639.0000000000C7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C7D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_c7d000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                    • Instruction ID: 2a6011f44ad9f681ad3dd4557b07befc4e3183c3a186edaa37270be823c7a8f3
                                    • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                    • Instruction Fuzzy Hash: F2118E75504284DFDB15CF10D9C4B19BF71FB84324F24C6A9D84E4B656C33AD94ACB61
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4622268639.0000000000C7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C7D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_c7d000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ecf76333c4857edb0cae155a2ed822a1bfe38db2c40391184a4fb299c42cee64
                                    • Instruction ID: 2cdbd338ea4352ed0d16639ac86461d014194d58292f453666cc640f5c5cd7d2
                                    • Opcode Fuzzy Hash: ecf76333c4857edb0cae155a2ed822a1bfe38db2c40391184a4fb299c42cee64
                                    • Instruction Fuzzy Hash: C811B276504284CFCB11CF14D5C4B19FB71FB84324F28C6AAD84E4B666C33AD946CBA2
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4663986139.00000000085D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 085D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_85d0000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 77aec62879bb75120cdc3446f8668efcccdbe89b6bbcf6b1d9d999fbacf110e9
                                    • Instruction ID: 33353baed3ff72e8d75df5f3c760a31d621629a00cd27143710a5249f2fe98f3
                                    • Opcode Fuzzy Hash: 77aec62879bb75120cdc3446f8668efcccdbe89b6bbcf6b1d9d999fbacf110e9
                                    • Instruction Fuzzy Hash: D0F0FC69F006156BDB54D6AE9C1069FAFBF8FC5511B14806F9C19D3384DB74CD024791
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4623132733.0000000000CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_cc0000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \
                                    • API String ID: 0-2967466578
                                    • Opcode ID: d3cc6a231c11158204839edfde6edb053ee47a89525d63679f22d339f1b6f313
                                    • Instruction ID: 1cb14d28903d0d8991d5cda64aa8641f85eb94f51a494e52b693f4982682ea1a
                                    • Opcode Fuzzy Hash: d3cc6a231c11158204839edfde6edb053ee47a89525d63679f22d339f1b6f313
                                    • Instruction Fuzzy Hash: E2C1FBB0CD17468BD710CF66EC881897BB1BB85314FB2CB09DA616B2D1EBB4146ACF54
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4661269198.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5ef0000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b126621e727e64272b7736f98d5dbaaf86298ef28b1ec48281a7f7e318b8c105
                                    • Instruction ID: 74053fa94a4b2da763eb5c1d19cca99a2ef3a3faaf3dd7de7c543da975456257
                                    • Opcode Fuzzy Hash: b126621e727e64272b7736f98d5dbaaf86298ef28b1ec48281a7f7e318b8c105
                                    • Instruction Fuzzy Hash: 6822DF34B001058FEB24DB68D894AADBBB2FF89314F2495A9D646DB3A1DF35DC418B90
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4623132733.0000000000CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CC0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_cc0000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e9d8fd6e22d48aef6f6253ec63b9fe0353e4bb2468dcc440c6050f27ec51bcee
                                    • Instruction ID: d4a0dfcfc1e9ef15ea0bf22fb6129e1ceea64819125bad6b0e5a34870438a830
                                    • Opcode Fuzzy Hash: e9d8fd6e22d48aef6f6253ec63b9fe0353e4bb2468dcc440c6050f27ec51bcee
                                    • Instruction Fuzzy Hash: 961296B4CC27468AD710CF66EC8C1897BB1B741314BF2CB09DA616B2E1E7B4156ACF54
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4662311392.0000000006120000.00000040.00000800.00020000.00000000.sdmp, Offset: 06120000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6120000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a7c0625e4441f70f01ff7bf390e695cc24c971a04396e817030c62fd74197cd7
                                    • Instruction ID: 7728e0dd4d5c45f80bc0f1beb0892ea0798b981d679b33cd80ebf6185c486f7f
                                    • Opcode Fuzzy Hash: a7c0625e4441f70f01ff7bf390e695cc24c971a04396e817030c62fd74197cd7
                                    • Instruction Fuzzy Hash: E2D1F831C20B6ACACB11EB64D990AA9B7B5FFD5300F10979AD14A37211EF706AC5CF91
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4662311392.0000000006120000.00000040.00000800.00020000.00000000.sdmp, Offset: 06120000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6120000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9a99ceb260f0972d633b3dd30bf597d3122daf870288eb92f2f540d14401627c
                                    • Instruction ID: e2894adea9e9b8fa69e40f5b6cae8fd5cd22b371e408a8ba32e13e0d4251c4c9
                                    • Opcode Fuzzy Hash: 9a99ceb260f0972d633b3dd30bf597d3122daf870288eb92f2f540d14401627c
                                    • Instruction Fuzzy Hash: 5CA16B36E102168FCF49DFA4D8804EEBBF2FF84300B15456AE915AB225EB31D925CF80
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4662311392.0000000006120000.00000040.00000800.00020000.00000000.sdmp, Offset: 06120000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6120000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e2c05f1035d6c46e52ce2c9953c997d807cdf47b60889a5533181f024f478d58
                                    • Instruction ID: 9ecc0b7afac8277ccbeebbe265959852b1837a1c0d417586f78216a3c9509b22
                                    • Opcode Fuzzy Hash: e2c05f1035d6c46e52ce2c9953c997d807cdf47b60889a5533181f024f478d58
                                    • Instruction Fuzzy Hash: FCD1E731C20B6ACACB10EB64D990AA9B7B5FFD5300F10979AD14A37215EF706AC5CF91
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4661269198.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5ef0000_jsc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9989f1ecbd28e6979cb4d674290b5aed0b358659470f44ba7ed7f285f2ca9573
                                    • Instruction ID: 4de6215dcf88e5894a25c2bd0cdb118e29521f11f4a62808cfc296c2853f79d2
                                    • Opcode Fuzzy Hash: 9989f1ecbd28e6979cb4d674290b5aed0b358659470f44ba7ed7f285f2ca9573
                                    • Instruction Fuzzy Hash: 62815F71E002098FEF24CF99C880AEEBBF2FB49318F54952AE659E7210D735D941CB51